Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Education sessions: 2000 Series<br />
MONDAY, sEPTEMbEr 19 • 11:00 am–12:00 noon<br />
2116 A Practical and Technological<br />
Approach to Managing Workplace<br />
Violence<br />
▲ Advanced<br />
effectively managing potential threats of violence<br />
that may impact <strong>the</strong> workplace entails utilizing<br />
a framework based on industry best practices,<br />
collaborative partnerships, and technology. This<br />
presentation provides an overview of <strong>the</strong> threat<br />
management framework used by <strong>the</strong> Microsoft<br />
Global Security Investigations team. hear how<br />
<strong>the</strong> team assesses potential threats of violence<br />
and specific security strategies used to mitigate<br />
possible threats to its staff and facilities. The<br />
presentation also reviews organization-specific<br />
approaches and challenges to delivering threat<br />
management services on a global scale.<br />
James Louie, Group Investigations Manager, Microsoft<br />
Corporation<br />
2117 Corporate Account Takeover:<br />
Online and in <strong>the</strong> real World<br />
▲ Advanced<br />
This presentation covers <strong>the</strong> tools, techniques,<br />
and tactics of <strong>the</strong> online fraudster targeting large<br />
corporate accounts for financial gain via account<br />
Takeover (aTO). Specific schemes being utilized<br />
will be discussed as well as emerging threats.<br />
understand best practices for preventing this type<br />
of fraud as well as advanced controls that will<br />
help you protect your own company.<br />
Mat<strong>the</strong>w Harper, Group Vice President, Client<br />
Au<strong>the</strong>ntication, SunTrust<br />
2118 National security information:<br />
Top Five Aspects to successfully<br />
Protecting Our secrets<br />
● Fundamental<br />
Protecting vital national security assets is<br />
becoming much more complicated and <strong>the</strong><br />
challenge to keep up can be overwhelming. The<br />
name of <strong>the</strong> game in national security is change,<br />
and at a scale and pace that is unprecedented.<br />
This presentation offers a clear outlook on<br />
what is really important and opens <strong>the</strong> floor for<br />
discussion. Taking a look at <strong>the</strong> Top Five can<br />
assist you in responding to <strong>the</strong> many threats<br />
and risks in today’s changing landscape.<br />
Dorene Colwell, Director Special Security Programs, Office<br />
of Intelligence and Analysis, Department of <strong>the</strong> Treasury<br />
2180 Next Generation Cloud security<br />
Compliance<br />
■ Intermediate<br />
Security in <strong>the</strong> cloud requires automated<br />
provisioning, continuous monitoring, and reporting<br />
on control effectiveness over time—especially<br />
important for any regulated industry which uses<br />
ei<strong>the</strong>r public or private cloud resources. elastic<br />
provisioning of cloud resources must also include<br />
adaptive security and privacy controls. Guidance<br />
on creating a next generation security compliance<br />
framework which is inherently tied to industry<br />
standards is given and regulatory frameworks<br />
will be presented.<br />
Robert Weronick, CPP, Director of Global Security, Alexion<br />
Pharmaceuticals, Inc.<br />
2181 Critical infrastructure<br />
Protection and risk Management<br />
■ Intermediate<br />
Whe<strong>the</strong>r it’s keeping <strong>the</strong> lights on, financial<br />
markets running, or fresh water flowing from our<br />
taps, critical Infrastructure permeates every<br />
aspect of our daily life. In this interactive panel<br />
discussion, we’ll explore how risk management<br />
practices shape <strong>the</strong> protection of our very way<br />
of life. The role of a risk-based approach to<br />
protecting <strong>the</strong> nation’s critical infrastructure is<br />
crucial to providing <strong>the</strong> best possible security<br />
program for <strong>the</strong> limited resources at our disposal.<br />
In this panel discussion, we’ll hear from all sides<br />
of <strong>the</strong> issue.<br />
Mark Wea<strong>the</strong>rford, Vice President/CSO, NERC;<br />
Diana-Lynn Contesti, Board Chairperson, (ISC) 2 ; Allan<br />
McDougall, Principle, Evolutionary Security Management<br />
“Absolutely <strong>the</strong> best conference for<br />
learning, obtaining information on<br />
state-of-<strong>the</strong>-art technology, and for<br />
networking.”<br />
carl Mountain<br />
Senior Investigator, Global Security<br />
Microsoft<br />
24 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.