REGISTER

www.proofpoint.com

When: Apr 29 2010 12:00 pm

Presenting: Ken Liao; Proofpoint, Encryption Specialist

Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners.

Quintessentially

When: May 25 2010 6:00 am

Presenting: Frank Rejwan, Group Chief Operating Officer

Join Frank Rejwan who will his discussing the successful adoption of cloud computing.

eWeek

When: May 25 2010 8:00am

Presenting: Peter Judge, Editor, eWeek Europe

Join Peter Judge, UK Editor of eWeek Euorpe, hosting a roundtable session to discuss how we can understand the factors behind cloud adoption.

Stratecast

When: May 25 2010 12:00 pm

Presenting: Lynda Stadtmueller, Senior Research Analyst, Stratecast

Private or public? On-prem or hosted? Dedicated or shared? For most businesses, the decision isn't whether to embrace cloud computing, but how to choose the best data center environment for each application.

burton Group

When: May 25 2010 2:00 pm

Presenting: Dan Blum, SVP & Principal Analyst, Burton Group

Dan Blum will moderate a panel on cloud computing.

Accelerating Cloud

When: May 25 2010 4:00 pm

Presenting: Mark Carlson, Val Bercovici and Winston Bumpus

Join Mark Carlson as he hosts this panel discussion on Accelerating Cloud Adoption via Standards & Collaboration along with Val Bercovici, Chair of the SNIA CSI Governing Board & Winston Bumpus, President of DMTF

Integrating Change

When: May 19 2010 4:00 am

Presenting: Diane Stow, Service Transition Manager, Bank of England

One of the challenges of service management has always been project management and how it fits, or doesn't, with change. How and when should projects engage with Service Management?

cmt

When: May 19 2010 12:00 pm

Presenting: Tulio Quinones, Core Media Technologies & Chuck Darst, HP

The reality is-change is complex. In additional to challenges of change in a distributed CAB environment, CMT faced pressures of speed and risk - to be more responsive to business needs and more consistent on risk and impact analysis.

BCBS

When: May 19 2010 2:00 pm

Presenting: Thomas Dosedel, BlueCross BlueShield & Mike O'Grady, HP

The Infrastructure and interdependencies between resources just keep getting more complex.

ValueAddIT

When: May 06 2010 3:00 am

Presenting: Peter Cummings, CEO, ValueAddIT

Peter Cummings, presents a case study on Identity Management 2.0

Online Identity Verification

When: May 06 2010 6:00 am

Presenting: Steven Furnell, Head of School of Computing, Plymouth University

As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.

Federal

When: May 06 2010 11:00 am

Presenting: David Temoshok; Federal Identity Management GSA, Director

This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.

MassMutual

When: May 06 2010 2:00 pm

Presenting: Randall Gamby; MassMutual Financial Group, Enterprise Security Architect

The Realities of Emerging Technologies for IAM

NSA

When: May 06 2010 4:00 pm

Presenting: Dickie George; (NSA) National Security Agency

Cyber Coldwar

Ponemon Institute

When: May 06 2010 5:00 pm

Presenting: Dr. Larry Ponemon; Ponemon Institute, Chairman and Brian Cleary, Aveksa

Trends in Access Governance

Brightfly

When: Apr 29 2010 11:00 am

Presenting: Brandon Dunlap; Brightfly, Managing Director

Companies invest significant amounts of resources in developing, marketing and positioning their products or services within a given market, yet when it comes to promoting the protection of the business and the identities of their employees and customers, many companies fail to drive the same level of marketing internally.

Travelex

When: Apr 29 2010 12:00 pm

Presenting: Michael Black, ISO - Americas, Travelex Holding Limited

With the proliferation of powerful mobile devices ranging from laptops to Smartphones, securing email in a mobile environment is never an easy task.

Experian

When: Apr 29 2010 1:00 pm

Presenting: Ben Isaacson CIPP; Experian, Privacy & Compliance Leader

This session will give you a summary of global anti-spam laws and requirements for senders to maintain compliance. In addition, the session will provide education on industry self-regulatory efforts, including best communications practices developed by leading industry organizations.

SonicWALL

When: Apr 29 2010 @ 2:00 pm

Presenting: Jan Sijp and Allen Schoonmaker; SonicWALL

Powering Regulatory and Corporate Compliance with an Email Security Strategy.

Mimecast

When: Apr 29 2010 @ 9:00am

Presenting: Peter Bauer, CEO, Mimecast

Guidance on security, continuity, compliance and archiving.

PwC

When: Apr 09 2010 8:00 am

Presenting: Marc Sel, PwC Enterprise Advisory Services, Director of Information Protection

Marc Sel is a Director at PricewaterhouseCoopers 'Advisory Services' in Belgium, specializing in IT Performance Improvement. He joined the firm in January 1989 as a Consultant. Over time, he specialised in the field of security.

Morrison & Foerster

When: Apr 08 2010 3:00 pm

Presenting: D. Reed Freeman; Partner, Morrison & Foerster;LLP

Online tracking first sparked regulatory interest over a decade ago. Interest in to topic waned following the burst of the .com bubble and in the few years following it, but it's now back. The Federal Trade Commission, the Privacy Commissioner of Canada, the CNIL, the Article 29 Working Party, and data protection regulators around the world are now expressing interest in the topic.

Hunton & Williams

When: Apr 08 2010 1:00 pm

Presenting: Melinda L. McLellan, Associate, Hunton & Williams LLP

In recent years, new internet technologies have revolutionized the way companies do business online by offering access to previously untapped markets and allowing for significant cost savings through the more efficient use of resources. But many of the advantages associated with these innovations are accompanied by privacy risks to consumers and potential legal and reputational risks for companies.

Barclays

When: Apr 08 2010 10:00 am

Presenting: Michael Spadea, Head of Privacy, Barclays Wealth

Michael presents a case study on achieving global privacy which won the 2009 IAPP award for innovation, he will also demonstrate how this framework can be applied by any other company navigating their way through ambiguity.

Banner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top