When: Apr 29 2010 12:00 pm
Presenting: Ken Liao; Proofpoint, Encryption Specialist
Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners.
When: May 25 2010 6:00 am
Presenting: Frank Rejwan, Group Chief Operating Officer
Join Frank Rejwan who will his discussing the successful adoption of cloud computing.
When: May 25 2010 8:00am
Presenting: Peter Judge, Editor, eWeek Europe
Join Peter Judge, UK Editor of eWeek Euorpe, hosting a roundtable session to discuss how we can understand the factors behind cloud adoption.
When: May 25 2010 12:00 pm
Presenting: Lynda Stadtmueller, Senior Research Analyst, Stratecast
Private or public? On-prem or hosted? Dedicated or shared? For most businesses, the decision isn't whether to embrace cloud computing, but how to choose the best data center environment for each application.
When: May 25 2010 4:00 pm
Presenting: Mark Carlson, Val Bercovici and Winston Bumpus
Join Mark Carlson as he hosts this panel discussion on Accelerating Cloud Adoption via Standards & Collaboration along with Val Bercovici, Chair of the SNIA CSI Governing Board & Winston Bumpus, President of DMTF
When: May 19 2010 4:00 am
Presenting: Diane Stow, Service Transition Manager, Bank of England
One of the challenges of service management has always been project management and how it fits, or doesn't, with change. How and when should projects engage with Service Management?
When: May 19 2010 12:00 pm
Presenting: Tulio Quinones, Core Media Technologies & Chuck Darst, HP
The reality is-change is complex. In additional to challenges of change in a distributed CAB environment, CMT faced pressures of speed and risk - to be more responsive to business needs and more consistent on risk and impact analysis.
When: May 19 2010 2:00 pm
Presenting: Thomas Dosedel, BlueCross BlueShield & Mike O'Grady, HP
The Infrastructure and interdependencies between resources just keep getting more complex.
When: May 06 2010 6:00 am
Presenting: Steven Furnell, Head of School of Computing, Plymouth University
As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.
When: May 06 2010 11:00 am
Presenting: David Temoshok; Federal Identity Management GSA, Director
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.
When: Apr 29 2010 11:00 am
Presenting: Brandon Dunlap; Brightfly, Managing Director
Companies invest significant amounts of resources in developing, marketing and positioning their products or services within a given market, yet when it comes to promoting the protection of the business and the identities of their employees and customers, many companies fail to drive the same level of marketing internally.
When: Apr 29 2010 12:00 pm
Presenting: Michael Black, ISO - Americas, Travelex Holding Limited
With the proliferation of powerful mobile devices ranging from laptops to Smartphones, securing email in a mobile environment is never an easy task.
When: Apr 29 2010 1:00 pm
Presenting: Ben Isaacson CIPP; Experian, Privacy & Compliance Leader
This session will give you a summary of global anti-spam laws and requirements for senders to maintain compliance. In addition, the session will provide education on industry self-regulatory efforts, including best communications practices developed by leading industry organizations.
When: Apr 09 2010 8:00 am
Presenting: Marc Sel, PwC Enterprise Advisory Services, Director of Information Protection
Marc Sel is a Director at PricewaterhouseCoopers 'Advisory Services' in Belgium, specializing in IT Performance Improvement. He joined the firm in January 1989 as a Consultant. Over time, he specialised in the field of security.
When: Apr 08 2010 3:00 pm
Presenting: D. Reed Freeman; Partner, Morrison & Foerster;LLP
Online tracking first sparked regulatory interest over a decade ago. Interest in to topic waned following the burst of the .com bubble and in the few years following it, but it's now back. The Federal Trade Commission, the Privacy Commissioner of Canada, the CNIL, the Article 29 Working Party, and data protection regulators around the world are now expressing interest in the topic.
When: Apr 08 2010 1:00 pm
Presenting: Melinda L. McLellan, Associate, Hunton & Williams LLP
In recent years, new internet technologies have revolutionized the way companies do business online by offering access to previously untapped markets and allowing for significant cost savings through the more efficient use of resources. But many of the advantages associated with these innovations are accompanied by privacy risks to consumers and potential legal and reputational risks for companies.
When: Apr 08 2010 10:00 am
Presenting: Michael Spadea, Head of Privacy, Barclays Wealth
Michael presents a case study on achieving global privacy which won the 2009 IAPP award for innovation, he will also demonstrate how this framework can be applied by any other company navigating their way through ambiguity.