Designing IS Strategies to Stay Ahead of Network Threats Web Cast
|Event Date/Time: Jun 13, 2007|
Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, making cyber security a priority concern for CIOs and chief executives alike. Given the recent events, everyone understands the grave impact of security vulnerabilities and communication disruptions to the agency’s business if cyber vigilance is not exercised fully.
Now more than ever, CIOs, CSOs, and CISOs have to stay 2 steps ahead to ensure the security of their systems and company data. While many struggle to manage this cyber menace, others have initiated proactive strategies to meet this challenge.
There are always hackers, cyber attacks, and other threats coming from both outside and inside the organization (malicious or uneducated staff) and these threats keep getting more and more sophisticated. Systems are always vulnerable to new attacks or new internal security measure failures.
Listen to recognized practitioners who understand all too well that security is a business issue, and IT is a tool to drive business results. Our speakers will share how they are addressing these threats strategically.
Take away points include:
-Demonstrating a Return on Investment in Security
-Strategic Cyber Security Project Case Studies - specifically looking at
-IT Security Awareness
-Cyber Emergency Exercises - testing your defenses with a case study on Michigan's involvement in DHS's global exercise called Cyber Storm
Program Is Intended For:
IT Security Professionals
-VPs, Directors, Heads of IT
-VPs, Directors, Heads of Planning
Event Date :
June 28, 2007 @ 1PM - 3PM ET
Core Security Technologies
Dan Lohrmann, CISO, State of Michigan
Dave Cullinane, CISO, eBay
Michael Yaffe, Director of Marketing, Core Security Technologies