Third Annual ISSA Baltimore Information Security SUMMIT

Back to the Future

September 13, 2012
NIST, Gaithersburg, MD
7:30 am - 4:30 pm
 


2012 Conference AGENDA
 

7:30 to 8:15

REGISTRATION & CONTINENTAL BREAKFAST

Registration

Breakfast: Coffee / Juice / Muffins, etc

8:15 to 8:30

WELCOME

Bill Smith, ISSA Baltimore President
Phil Rogofsky, ISSA Baltimore VP of Professional Development and Information Security Summit Chair

8:30 to 9:15

KEYNOTE  

Securing Emerging Mobile Technology

 Dr. John Levine, NSA

 

Track 1
Privacy and Legal

Track 2
Forensics

Track 3
Security Management

9:20 to 10:10

Technology and the Surveillance Society

Jay Stanley, ACLU

Peer to Peer Security

Adam Schneider, SSA OIG Electronic Crimes Team

Standards-based protocols needed for cloud based services and international data protection

John Sabo, Senior Director, CA Technologies

10:15 to 10:40

NETWORKING & VENDOR BREAK

10:40 to 11:30

DNA and the Future of Privacy

Stephen B. Mercer, Forensics Division, Maryland Office of the Public Defender.

What is Infragard?

 Lauren Schuler, FBI

Security Management -Beyond the Fundamentals

Brad Flick, Associate Commissioner, Office of Information Security

11:30 to 12:25

BUFFET LUNCH

12:25 to 1:10

Stories from the Field

Brett Lawman, Secret Service

Forensics

Jesse Varsalone, Author

iPhone Security

Jim Findler, PaRaBal

1:15 to 2:05

 

1:10 to 1:20

NETWORKING & VENDOR BREAK & SNACKS

1:20 to 2:10

Days of Future Past

Rob Lee, SANS

2:20 to 3:10

 

 

Responding to Cyber Threats

Marc Southland, FBI

Cybersecurity Blueprints for Cloud Computing

Donna Dodson, NIST

3:10 to 4:00

A vital aspect of auditing is system logging Why? What?

Marcus Ranum, Tenable

4:00 to 4:10

Wrap-Up


ISSA Baltimore Chapter is sponsored by:


[Conference Home] [2010 Agenda] [2012 Agenda]

© 2012 ISSA Baltimore Chapter

Last updated November 07, 2012