Contact Us   |   Print Page   |   Sign In   |   Register
Security and Legislation

Security and Legislation

Recorded Live: March 27, 2012
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here to register for this on-demand event.

Presentation Slides

Generously supported by:

Web Conference Overview:

As technology evolves so do usage and threat models. As these threats advance, they bring to the forefront of questions liability and mitigation. In the end, as security professionals, we are required to deal with new - or even old - laws that must be applied to outdated usage models. This session will explore evolving laws in the context of technological advancements and actions we can take to ensure we are compliant.

Michael Colson - Senior Product Manager, NetIQ

Michael Colson has more than 21 years of experience in engineering and management positions with highly successful aerospace, medical, and IT security companies. His background includes leading product engineering teams in the development of state-of-the-art security- and compliance-management products. As the senior product manager for Security Products at NetIQ, he identifies and develops products and solutions that lead in innovative and effective approaches for managing security and compliance for customers worldwide.

Presentation Overview: Evolving Legislation and Security Threats, Are You Ready?

It’s all over the news. Data breaches are all the rage. From targeted attacks for political protest to theft of data for profit, legislators have taken notice by increasing legal and financial penalties. What is your defense plan? This presentation will explore legislative changes and a strategy that can help defend your business.

Randy V. Sabett, J.D., CISSP - Counsel, ZwillGen PLLC

Randy V. Sabett, J.D., CISSP, serves as Counsel in the Washington, DC office of ZwillGen PLLC. He has over 20 years of information security experience, including as an NSA crypto engineer, and counsels clients on information security, privacy, IT licensing, and patents, dealing with such issues as federated identity, cloud services, Public Key Infrastructure (PKI), digital and electronic signatures, financial services, state and federal information security laws, identity theft, and security breaches. Sabett served as a commissioner for the Commission on Cybersecurity for the 44th Presidency and has been recognized as a leader in privacy & data Security in the 2007 - 2012 editions of Chambers USA: America’s Leading Lawyers for Business. He is also a frequent lecturer and author on issues involving information security, and has appeared on or been quoted in a variety of national media sources. He can be reached at

Presentation Overview:

Cybersecurity legislation has not quite taken center stage, but it’s getting close. In light of numerous recent events, cybersecurity has definitely taken priority over several other issues. Although security policy wonks have been saying for many years that we need more robust federal laws to protect us in cyberspace, it’s only very recently that the message has been getting through to a broader audience. Between the White House legislative proposal, the Cybersecurity Bill of 2012, and the McCain response, we may actually see something pass. The questions are ‘when?’ and how do we overcome the perennial problems?

Joe Tasker – Independent Consultant and Principal, JT Square Strategies; formerly Sr. VP and General Counsel, Information Technology Association of America

Joe Tasker is a consultant in Washington, D.C. who concentrates on information technology, international trade, internet governance, and intellectual property. He is a high tech public policy strategist and advocate with a background in the legal profession; he has experience working in both the public and private sectors. Until a recent merger, he served as Senior VP for Government Affairs at ITAA and worked extensively on cyber security issues. For 10 years, he led government affairs for Compaq Computer. He helped found many policy advocacy coalitions formed to solve pressing issues for the information technology industry including: internet access, export controls, and the growth of trade in ICT goods and services.

Community Search
Sign In


Cornerstones of Trust

ISSA International Series Webinar: Cloud Services and Enterprise Integrations

8/4/2018 » 8/9/2018
Black Hat USA 2018

10/17/2018 » 10/18/2018
2018 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information