NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
   
Keynotes

Keynote Speakers

Monday, April 15
8:45 AM – 10:00 AM

Why "Good Enough" Isn't Anymore (And What You Can Do About It)
Joshua Corman, Director, Security Intelligence, Akamai Technologies
As our security challenges grow more personal and beyond our best practices, how can we know if we're doing enough? It's time to get candid. With that in mind, we sought out the most candid keynote we could find. In 2009 Network World named Joshua Corman a Top 10 Influencer of IT, and he's been pushing at the edges of the industry ever since. While we struggle with the basics, the onslaught of new technology, hactivism and espionage have proven to be more than we can handle. Now more than ever, the consequences of our neglect are spreading to our national security, our rights, and even our bodies. Mr. Corman will contrast what has changed with how little our strategies have adapted. With an honest and accurate picture of where we are and where we're going, he will lay out some of the ways in which we can adapt.

12:30 PM – 1:20 PM

Changing the Mindset: Creating a Risk-Conscious Culture
John P. Pironti, President, IP Architects, LLC
Information threats and adversaries are more advanced and daunting than ever and show no sign of diminishing. In order to effectively address this issue, organizations must cultivate a culture that embraces information risk management and security as a business benefit rather than another hurdle on the path to success. In this high-energy keynote, John Pironti, who has advised and assisted organizations around the globe in effectively managing risk, will lay out the key concepts and capabilities that should be considered when creating a risk-aware and security-conscious culture. Using examples and case studies of organizations that have embraced this philosophy, he will reveal what approaches and techniques can make the difference between a secure organization and one that is highly vulnerable.

Tuesday, April 16
11:00 AM – 12:00 PM

Cybersecurity at the Crossroads: Where Are We Headed?
Prof. Howard Schmidt, Former White House Cyber-Security Coordinator
Security veteran Howard Schmidt, who has headed up cybersecurity at Microsoft, EBay and the White House, will share his thoughts on the state of security in this important keynote. He will comment on what he sees as the main cyberthreats facing the U.S. on a global level, and what vulnerabilities we need to keep an eye on in the future. Professor Schmidt will assess the impact of mobile devices and social media on security, the effect of outsourcing and cloud security, and what to expect from viruses. This keynote will showcase the extraordinary breadth and depth of Professor Schmidt's knowledge, and leave you with unexpected insights on where information security is headed.

Wednesday, April 17
8:30 AM – 9:30 AM

Opening Up a Second Front on Risk Management: Integrating Cybersecurity into Business Processes
Dr. Ron Ross, Fellow, National Institute of Standards and Technology
In this closing keynote, seasoned security expert Ron Ross will argue that for decades the full potential of comprehensive cybersecurity standards and guidelines have not been realized because both the public and private sector have failed to integrate cybersecurity into the organizational mission and business processes. Instead, cybersecurity is treated as if it were distinct from enterprise architecture, system development life cycle, systems engineering, and acquisition/procurement. Dr. Ross, who leads the Federal Information Security Management Act (FISMA) Implementation Project for NIST, will assert that to be effective, cybersecurity must be closely linked to issues that mission/business owners and program managers focus on, including cost, schedule and performance. He will show that for cybersecurity efforts to reach their potential, senior leaders must be able to manage cybersecurity-related risks within their enterprises.

 Follow Us on Twitter

Platinum Sponsors

Gold Sponsors

Global Education Sponsor

Association Sponsors

Media Sponsors