REGISTER

email 14 48

resiliency

6 Oct 2009 1:00 pm Presenting Paul Kirvan, Board Member, The Business Continuity Institute

Traditionally the professions of business continuity,security management and IT operations have been seperate entities.

2010

6 Oct 2009 12:00 pm Presenting Kevin Burton; Burton Asset Management Inc, CEO

2010 Risk Outlook, Time to Get Back to the Basics

overview

6 Oct 2009 11:00 am Presenting Alan Berman, DRI International, Executive Director

Overview of Business Continuity in Today's Environment

6 Oct 2009 10:00 am Presenting Colin Ive, Nokia, Chief Specialist IT Risk & Continuity Management

Colin(MBA MBCI)has wide ranging experience gained in over 30 years of business.

implementing

6 Oct 2009 6:00 am Presenting Mark Jones, Northern Rock, Head of Business Continuity

Mark Jones, held a number of Head positions in the Business Continuity field.

6 Oct 2009 5:00 am Presenting Vicki Gavin, Consultant & former Head of BC & Business Risk at Barclaycard

Vicky was the former Head of Business Continuity and Business Risk at Barclaycard between 2003 & 2008

measuring

29 Sep 2009 3:00 pm Presenting David Hoelzer; Enclave Forensics, Director of Research

As IT auditors we spend a great deal of time focused on configuration settings.

malware

29 Sep 2009 2:00 pm Presenting Lenny Zeltser SANS Technology Institute

Malicious software is an integral and dangerous component of many breaches.

continuous

29 Sep 2009 4:00 pm Presenting Paul Reymann; CEO of Reymann Group in association with Tripwire

Compliance used to be a periodic and mostly manual project driven by audit dates and deadlines.

iia

30 Sep 2009 2:00 pm Presenting Lily Bi; The Institute of Internal Auditors; Director, Technology Practices

-Explore the relationship between IT and Business
-Define IT audit universe

deloitte1

29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal

Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.

application

29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director

Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.

barclays

8 Sep 2009 10:00 am Presenting Becky Pinkard, Barclays Bank, Head of Attack and Data Monitoring

Becky was recruited by Barclays to develop the global monitoring programme with the goal of supplying real-time alerting of critical security and data leakage

ibm

8 Sep 2009 5:00 am Presenting James Rendell, IBM, Senior Technology Specialist

James Garnered Extensive pre and post-sales consulting experience while working for US-based technology companies . . .

mm

8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance

John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.

gss

8 Sep 2009 6:00 am

Presenting David Hobson, Global Secure Systems Ltd, Managing Director

Threat Assessments, Attacks, & Countermeasure are . .

information

27 Aug 2009 5:00 pm Presenting Robert Brownstone; Law & Technology Director; Fenwick & West LLP

Information-Risk-Management (IRM)- Policies and Protocols Maximizing preparedness for eDiscovery and Litigation.

developing

27 Aug 2009 3:00 pm Presenting Linda Kostic; Director, ERM at E*Trade Financial

Many organizations are learning that in today's environment, an information security risk management program has become a key component of an Enterprise Risk Management program.

benefits

27 Aug 2009 12:00 pm Presenting Jack Jones, Founder, Risk Management Insight

Frustrated with management's lack of support for security initiatives, priorities and efforts?

intersection

27 Aug 2009 11:00 am Presenting David Koenig, CEO of The Governance Fund

Risk Management and Corporate Governance, particularly the failures thereof, have been recieving substantial attention in the media and in the boardroom.

tweetspam

13 Aug 2009 6:00 pm Presenting Susan L. Lyon, Of Counsel, Perkins Coie LLP

Aocial media in the new Web 2.0 world has proven to be an effective new marketing tool but one that also creates some interesting privacy challanges.

exploits

13 Aug 2009 3:00 pm Presenting David W. Campbell; Leader; OWASP

The Web is a Dangerous Place: Expolits and Defenses for a Web 2.0 World.

cis

13 Aug 2009 1:00 pm Presenting M. Ryan Calo; Residential Fellow; Stanford Law School

In online privacy today, notice is king. Notice is how we deal with the conflict between the preference of internet companies to gather as much user dat as possible and the rights of users to control their information.

scott

13 Aug 2009 12:00 pm Presenting Julie Machal-Fulks; Partner at Scott & Scott LLP

Since February 2005, the identities of approxomately 98 million people have been exposed because of data leaks. This presentaion examines 

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top