Security & The Evolving Threat Landscape
With information changing hands at the speed of light and new threats evolving just as fast, it’s crucial for your business to be knowledgeable and armed with up-to-date security.
There are more than 20 security reports that are updated annually explaining new threats, types of vulnerabilities and malware, sources of attacks, exfiltration of data, breach reports, and other important information to keep your business’ and customer’s information safe, and your IT assets functioning. But who has the time to read all these reports and ensure their business is at low risk?
Well, you’re in luck! The expert speakers in this program have already read and compared them all.
This program will not only provide you with new critical security information, but compares the similarities and differences between these reports. You’ll also learn the difference between session and transmission based security.
The information to be presented was compiled and analyzed from the following annual security reports:
- SANS Top Cyber Security Risks – September 2009
- Department of Homeland Security Information Technology Sector Baseline Risk Assessment - August 2009
- IBM X-Force 2009 Mid-year Trend and Risk Report - August 2009
- Cisco 2009 Midyear Security Report - July 2009 (Intellishield)
- Gartner Hype Cycle for Data and Application Security 2009 - July 2009
- Microsoft Security Intelligence Report (SIR) 7 - June 2009
- White House Cyberspace Policy Review - May 2009
- Symantec Internet Security Threat Report - April 2009
- Verizon 2009 Data Breach Investigations Report - April 2009
- 2008 CSI Computer Crime and Security Survey - February 2009
- Sophos Security threat report: 2009 - January 2009
- Microsoft Security Intelligence Report (SIR) 6 - December 2008
- Cisco 2008 Annual Security Report - November 2008
- Georgia Tech Emerging Cyber Threats Report for 2009 - October 2008
- PricewaterhouseCoopers 2008 Global State of Information Security - October 2008
- Gartner Hype Cycle for Data and Application Security, 2008 - September 2008
- UK Department of Business, Enterprise and Regulatory Reform (BERR) Information Security Breaches survey 2008 - April 2008
Scott Hogg, Director Advanced Technology Services, GTRI
Scott Hogg has been a network computing consultant for over 18 years. Scott provides network engineering, security consulting, and training services to his clients, focusing on creating reliable, high-performance, secure, manageable, and cost effective network solutions. He has a B.S. in Computer Science from Colorado State University, a M.S. in Telecommunications from the University of Colorado, along with his CCIE (#5133), CISSP (#4610), among many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past 9 years Scott has been researching IPv6 technologies and has helped several organizations with their IPv6 planning and deployment. Scott has given numerous presentations and demonstrations of IPv6 technologies and authored a book on IPv6 Security. He is also currently the Chair of the Rocky Mountain IPv6 Task Force.
Kirk Byles, Vice President Sales, Relevant Security
Kirk is responsible for the overall implementation of the sales and marketing strategy. Kirk has 15 years in technology start-up companies running sales and channels globally. His successes include being part of the team to take a small wireless broadband company public, the hugely successful development and implementation of Motorola Canopy's channel strategy, the guidance of Orthogon System's channels through the acquisition by Motorola, as well the two year transition within Motorola. Kirk brings a wealth of sales, channels, marketing, and strategic planning to RSC.
Steve Prather, Senior Vice President of Strategic Operations, ViaWest, Inc.
With more than twelve years of Internet industry experience, Prather leads the ViaWest Sales and Sales Engineering departments in the development and implementation of process controls and procedures. Prather supports product management and acts as the company's chief sales engineer, assisting customers in developing scalable and reliable solutions for their business critical applications and data.
Before joining the ViaWest management network, Prather served as the Manager of Network Services at RMI.net and was the Project Development Manager for VR1, working in conjunction with Microsoft to launch a new Internet gaming application.
Matthew Taylor, VP of Managed Services and IT/IS Operations, ViaWest
Taylor joined ViaWest as the Vice President of Hosting and IT Operations in May 2006. Utilizing his over 16 years of technology management experience, Taylor reconstructed the hosting and IT organization to provide increased support levels for customer purchased services. He supported the migration of several key initiatives including new definition and standardization of managed services projects, implementation of best practice compliance services and new product development processes. Taylor was also responsible for integration of IT/IS functions for several ViaWest acquisitions, as well as introducing new reporting and managed services solutions to customers. Taylor began his career with General Reinsurance Corporation, becoming the youngest manager in the companies’ history. Next, he co-founded GreatLand Insurance Company, serving as both the CIO and VP of Underwriting. Taylor then accepted the role as Director of Strategic Planning for Kemper Insurance Company, founding its CIO Council.
Before joining ViaWest, Taylor held roles as VP Southwest region for Agile Technologies, growing the $2 million book of business. Taylor also spent part of his career as Interim CIO for one of the world’s largest managed hosting companies managing numerous initiatives including the complete restructuring of the internal infrastructure.
CSIA members $15; Premium members receive two complimentary tickets
7:30-8:00 Breakfast & Registration