22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Education sessions: 2000 Series<br />

MONDAY, sEPTEMbEr 19 • 11:00 am–12:00 noon<br />

2116 A Practical and Technological<br />

Approach to Managing Workplace<br />

Violence<br />

▲ Advanced<br />

effectively managing potential threats of violence<br />

that may impact <strong>the</strong> workplace entails utilizing<br />

a framework based on industry best practices,<br />

collaborative partnerships, and technology. This<br />

presentation provides an overview of <strong>the</strong> threat<br />

management framework used by <strong>the</strong> Microsoft<br />

Global Security Investigations team. hear how<br />

<strong>the</strong> team assesses potential threats of violence<br />

and specific security strategies used to mitigate<br />

possible threats to its staff and facilities. The<br />

presentation also reviews organization-specific<br />

approaches and challenges to delivering threat<br />

management services on a global scale.<br />

James Louie, Group Investigations Manager, Microsoft<br />

Corporation<br />

2117 Corporate Account Takeover:<br />

Online and in <strong>the</strong> real World<br />

▲ Advanced<br />

This presentation covers <strong>the</strong> tools, techniques,<br />

and tactics of <strong>the</strong> online fraudster targeting large<br />

corporate accounts for financial gain via account<br />

Takeover (aTO). Specific schemes being utilized<br />

will be discussed as well as emerging threats.<br />

understand best practices for preventing this type<br />

of fraud as well as advanced controls that will<br />

help you protect your own company.<br />

Mat<strong>the</strong>w Harper, Group Vice President, Client<br />

Au<strong>the</strong>ntication, SunTrust<br />

2118 National security information:<br />

Top Five Aspects to successfully<br />

Protecting Our secrets<br />

● Fundamental<br />

Protecting vital national security assets is<br />

becoming much more complicated and <strong>the</strong><br />

challenge to keep up can be overwhelming. The<br />

name of <strong>the</strong> game in national security is change,<br />

and at a scale and pace that is unprecedented.<br />

This presentation offers a clear outlook on<br />

what is really important and opens <strong>the</strong> floor for<br />

discussion. Taking a look at <strong>the</strong> Top Five can<br />

assist you in responding to <strong>the</strong> many threats<br />

and risks in today’s changing landscape.<br />

Dorene Colwell, Director Special Security Programs, Office<br />

of Intelligence and Analysis, Department of <strong>the</strong> Treasury<br />

2180 Next Generation Cloud security<br />

Compliance<br />

■ Intermediate<br />

Security in <strong>the</strong> cloud requires automated<br />

provisioning, continuous monitoring, and reporting<br />

on control effectiveness over time—especially<br />

important for any regulated industry which uses<br />

ei<strong>the</strong>r public or private cloud resources. elastic<br />

provisioning of cloud resources must also include<br />

adaptive security and privacy controls. Guidance<br />

on creating a next generation security compliance<br />

framework which is inherently tied to industry<br />

standards is given and regulatory frameworks<br />

will be presented.<br />

Robert Weronick, CPP, Director of Global Security, Alexion<br />

Pharmaceuticals, Inc.<br />

2181 Critical infrastructure<br />

Protection and risk Management<br />

■ Intermediate<br />

Whe<strong>the</strong>r it’s keeping <strong>the</strong> lights on, financial<br />

markets running, or fresh water flowing from our<br />

taps, critical Infrastructure permeates every<br />

aspect of our daily life. In this interactive panel<br />

discussion, we’ll explore how risk management<br />

practices shape <strong>the</strong> protection of our very way<br />

of life. The role of a risk-based approach to<br />

protecting <strong>the</strong> nation’s critical infrastructure is<br />

crucial to providing <strong>the</strong> best possible security<br />

program for <strong>the</strong> limited resources at our disposal.<br />

In this panel discussion, we’ll hear from all sides<br />

of <strong>the</strong> issue.<br />

Mark Wea<strong>the</strong>rford, Vice President/CSO, NERC;<br />

Diana-Lynn Contesti, Board Chairperson, (ISC) 2 ; Allan<br />

McDougall, Principle, Evolutionary Security Management<br />

“Absolutely <strong>the</strong> best conference for<br />

learning, obtaining information on<br />

state-of-<strong>the</strong>-art technology, and for<br />

networking.”<br />

carl Mountain<br />

Senior Investigator, Global Security<br />

Microsoft<br />

24 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!