Contact Us   |   Print Page   |   Sign In   |   Register
Silver Cloud of Success or Storm Cloud on the Horizon

Live Event:August 23, 2011
Start Time:9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Generously Supported by:

Click Here for Presentation Slides

Web Conference Overview:

Every IT paradigm shift incorporates new technologies and changes to the usage model. This is also accompanied by new threats and (eventually) solutions that equate to changes in security practices. Sometimes these solutions are new and sometimes they are a re-tasking of technology that has been around for a while. This session will look at consumerization and cloud computing, identify a number of the threats, and discuss some of the technologies that can address these threats.

Click here to register for this ISSA Web Conference

Jeffrey A. Ingalsbe - Chair - Computer Information Systems and Information Assurance

Speaker Biography:

Jeffrey Ingalsbe is a Department Chair at the University of Detroit Mercy in the Center for Cybersecurity and Intelligence Studies where he teaches advanced courses while directing a state of the art cybersecurity laboratory and leading research software assurance grants. Until 2010, Ingalsbe managed the IT security consulting group at Ford Motor Company. He has extensive writing and speaking experience in national publications and conferences such as IEEE Software, the Journal of Information System Security, RSA 2011, and AMCIS 2011 on topics like threat modeling, cloud security, and mobile security.

Ron LaPedis - Principal, Seacliff Partners International, LLC

Presentation Overview:

When talking about The Cloud you often hear the words, "data leakage.” But what happens when your data migrates onto employee-owned devices? This session will cover the use of encryption to protect data in the cloud, and virtualization to protect data on consumer devices.

Speaker Biography:Ron LaPedis is Principal Advisor for Seacliff Partners International, LLC, a company that melds technical expertise with business sense in the business continuity and security fields. LaPedis is a Master Business Continuity Professional (MBCP), a member of the Business Continuity Institute (MBCI), and a CISSP with ISSAP & ISSMP endorsements. He is frequently published, and his blogs regularly focus on business continuity and security topics.

Ehud Amiri - Director Product Management , CA Technologies

Presentation Overview: Cloud and My (Corporate) Identity

Phenomenal rapid adoption of cloud, mobile, and social technologies is changing enterprise IT, and more specifically information security, forever. What started just a few years ago as early adopters experimenting with low risk transactions, is fast becoming a core business imperative for most organizations, whether they are small, large, regulated, or even government organizations. This session will walk you through the dynamics of these changes, the promise and threat introduce by these changes, and pragmatic approaches to safely embrace these changes across cloud and hybrid environments.

Speaker Biography:Ehud Amiri is a Director of Product Management at CA Technologies, where he is working on the CA Identity & Access Management set of cloud services. Amiri has spent over 15 years in product management and engineering positions in various startup, mid size, and large companies. He holds a Bachelor of Science in Computer Science and Mathematics from Tel Aviv University.

Jorge Orchilles - ISSA Web Conference Committee

Moderator Biography:Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Master’s of Science in Management Information Systems from Florida International University. Currently, he holds the position of Security Analyst at a Fortune 20 financial institution and serves as President of the South Florida ISSA Chapter. Orchilles holds various certifications from ISC2, SANS GIAC, EC-Council, Cisco, Microsoft, and Comptia: Certified Information Systems Security Professional (CISSP), GIAC Certified Penetration Tester (GPEN), GIAC Certified Incident Handler (GCIH), EC-Council Certified Ethical Hacker (C|EH), Core Impact Certified Professional (CICP), Cisco Certified Design Associate (CCDA), Cisco Security Solutions for System Engineers (SSSE), comptia Security+ (2008), Microsoft Certified Professional (70-228, 70-282, 70-284) and Microsoft Certified Technology Specialist (70-620).

Community Search
Sign In


ISSA Mid-Atlantic Conference

Cornerstones of Trust

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information