IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security...
Transcript of IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security...
> George Adams, CEO, SSH Communications Security> Dr. Edward G. Amoroso, Senior VP, Chief Security Officer, AT&T Services, Inc.> Michael Barrett, CISO, PayPal> Bob Bragdon, Publisher, CSO Magazine> Allan Carey, Program Manager, Security Services and Identity Management, IDC> Chris Christiansen, Program Vice President, Security Products and Services, IDC> Julie Donahue, VP, Security and Privacy Service, IBM Global Technology Services> Lynda Fleury, CISO, Unum > Tim Mathews, Director, Risk Management and Corporate Security, ETS> Brian Shea, Senior Vice President, Bank of America> Craig Smelser, VP, Storage and Security Development, IBM Software Group, Tivoli> Chris Whitener, GM, Atalla Security Product and Leader, Enterprise Storage and
Servers Security Strategy, HP
Learn from experts and your peers including:
IDC Security ForumDefending Against Information Access Threats: Messaging Security,
Network Management and Retention SystemsSEPTEMBER 19, 2007 • MILLENNIUM BROADWAY HOTEL • NEW YORK, NY
www.idc.com/securityforum07
Conference Co-Chair
Bob Bragdon, Publisher,CSO Magazine
Conference Co-Chair
Christian A. Christiansen,Program VP, Security
Products and Services, IDC
AgendaSEPTEMBER 19, 20078:00 am – 9:00 amRegistration, Continental Breakfast and TabletopExhibit Viewing
9:00 am – 9:30 amWelcome and Opening Remarks fromConference Co-ChairmanBob Bragdon, Publisher, CSO Magazine
9:30 am – 10:15 amReactive to Proactive Enterprise Security Dr. Edward G. Amoroso, Senior Vice President, ChiefSecurity Officer, AT&T Services, Inc. With the number of cyber-attacks up 30 times during the past fiveyears, organizations must be vigilant or risk significant losses.Firewalls have become increasingly penetrable and tools used inattacks have grown more sophisticated. Dr. Amoroso, who overseessecurity for one of the largest telecommunications companies in theworld, will offer insights and real-world examples into current bestpractices for preventing attacks on systems, networks and data. As aleader who has helped discover and counter virtually everyconceivable type of malicious threat against computers and networksaround the world, Dr. Amoroso will reveal the network-basedsecurity strategy he has championed at AT&T, centered on proactivesecurity management and emerging in-the-cloud protection services.
IDC’s 4th annual Security Forum offers attendees practical adviceinto developing a holistic, effective security program thatbecomes a core part of the organizational culture and businessroutine. Featuring insight from leading enterprise securitypractitioners, technology solution providers, and subject matterexperts, the program addresses chief security concerns for 2007and beyond. This year’s agenda will explore priorities rangingfrom enforcing and tracking messaging compliance to proactivestrategies for ensuring intellectual property stays where it shouldbe - inside the enterprise.
ATTEND THIS EVENT TO:• Engage with your peers and subject matter experts in an
intimate learning environment driven by a highly focusedagenda.
• Experience forward thinking insight from the most advancedresearch.
• Gain insight and essential guidance from senior IDC analystsinto your current security and implementation strategy.
• CIOs, CISOs, CSOs, CTOs
• VP/Directors of: Business Continuity,Information Security, Information Technology,Operations, Security, Telecommunications
• Network Directors and Managers
• Security Architects
• Risk Managers
• Auditors
WhoShould Attend? ARRIVE EARLY FOR THE COMPLIANCE IN INFORMATION MANAGEMENT FORUM ON SEPT. 18 Attend IDC and Kahn Consulting’s 4th Annual Compliance in InformationManagement Forum, scheduled on September 18 in the same hotel. To view the event details, go to:
www.idc.com/kahnconsulting/imeast07If you would like to register for both conferences at the same time, please call 800-605-5849. All eligible discounts apply for each conference.
10:15 am – 10:45 am Networking Break, Tabletop Exhibit Viewing and One-to-One Meetings
One-to-One MeetingsAttendees have the opportunity to sign up for complimentary one-to-one meetings with select analysts and experts at eventregistration. This will enable you to gain strategic advice on yourcompany’s security initiatives. Arrive early since meetings arescheduled on a first-come, first-served basis. Featured analysts andexperts include:
Bob Bragdon, Publisher, CSO Magazine Chris Christiansen, Program Vice President, SecurityProducts and Services, IDCAllan Carey, Program Manager, Security Services andIdentity Management, IDC
10:45 am – 11:30 amPhishing: Don’t Get HookedMichael Barrett, CISO, PayPalAs one of the best known consumer brands on the Internet, PayPalhas become a top target for phishing attacks. While there is nosilver bullet to prevent phishing, the company has investedsignificant resources to combat the issue and protect its 143 millionaccount holders worldwide. Using a combination of technology,industry partnerships and consumer education, PayPal keeps itscustomers safe and its data secure to maintain one of the lowestfraud loss rates in the financial services industry. Join this session tolearn how to protect your business against one of today’s mosthigh-profile security threats.
11:30 am – 12:15 pmDefending Against Information Access Threats:Security Depth In DefenseLynda Fleury, CISO, Unum Protecting information assets has become even more critical toorganizations due to regulatory requirements and customerexpectations. Security cannot be assured by the installation of oneparticular solution, technology or operating policy. Rather, it is acombination of multiple different controls, the aggregate of which
are commensurate with your company's particular risk exposurethat should be employed. In order to adequately protect yourorganization's sensitive resources, multiple layers of defense mustbe employed. Join this session to learn how a leading disabilityinsurer is defending itself through people, process and technology.
12:15 pm – 1:30 pmLunch, Facilitated Roundtable Discussions, One-to-One MeetingsDuring lunch, the roundtable discussions will provide attendees theopportunity to interact with peers, speakers and subject matterexperts on key topics in an interactive format – with the discussionled by an industry expert. Attendee participation is stronglyencouraged. Sign up sheets will be available at registration on afirst-come, first-served basis. The following are some of theroundtables available at the Forum:
Table 1: Security File Transfers, Eliminating FTPfrom Distributed Systems to MainframesLed by George Adams, CEO, SSH Communications Security
Table 2: eDiscovery ComplianceLed by Bob Bragdon, Publisher, CSO Magazine
1:30 pm – 2:15 pmCONCURRENT SESSIONS
GROUP 1Managing Security Gaps in the EnterpriseChris Whitener, GM, Atalla Security Products and Leader,Enterprise Storage and Servers Security Strategy, HPHP has been protecting the majority of the world's financialinformation for the past 35 years through ATMs, point-of-sale,credit card information, and electronic funds transfers and thatsame technology is now being applied to other secureinfrastructures in industries such as energy and healthcare, as wellas to all HP products. In this session, Chris will speak to deployingsecurity solutions and products into the enterprise to fill securitygaps, and secure the infrastructure from the desktop to data centerto reduce cost, minimize risk and accelerate growth, enabling betterbusiness outcomes.
SPECIAL OFFER
To register online: www.idc.com/securityforum07GROUP 2Safeguarding Customer Data: A HolisticApproachJulie Donahue, VP, Security and Privacy Service, IBMGlobal Technology ServicesCraig Smelser, VP, Storage and Security Development,IBM Software Group, TivoliSecurity breaches are trending upward, external and internal threatsare more sophisticated, and regulatory mandates are growing innumber and complexity. This session will explore how IBM enablesthe sharing of data within an organization and with their businesspartners, while minimizing the risk. IBM will discuss how you canprotect your organization against data leakage at the point of use –including messaging. Attendees will learn how to monitor andprotect data in order to adhere to the challenging regulatory andprivacy compliance requirements as well as safeguard your mostimportant assets.
2:30 pm – 3:15 pmSecuring a Multitude of Messaging ProtocolsOrganizations need to protect themselves from threats of allvarieties. In particular, advances in electronic communications haveopened many doors for misuse, abuse and rather unpleasantconsequences. This is where messaging security comes into play.Whether emails are being screened for viruses and phishing orconfidential information is blocked from being accidentally sentoutside of the organization, properly securing the organization'sdata and information will drastically reduce the risk of problemscaused by electronic communications such as email, instantmessaging and browsing the Web. This session will focus onmessaging security solutions that can be quickly implemented andeasily managed.
3:15 pm – 3:45 pmNetworking Break, Tabletop Exhibit Viewing andOne-to-One Meetings
3:45 pm – 4:30 pmA Resilient Enterprise Requires Resilient EmailTim Mathews, Director, Risk Management and CorporateSecurity, ETSThe trend toward the convergence of corporate security, businesscontinuity and disaster recovery has provided an opportunity toimprove overall resiliency. In most organizations, corporate email isa mission critical application that requires a "protect and prevent"strategy rather than a "plan and recover" procedure. This sessionwill outline a successful approach to creating a resilient emailenvironment, including: determining the priority of email as abusiness application, the process of developing a cost effectiverecovery strategy, the integration of mail with corporate emergencyresponse and records retention programs.
4:30 pm – 5:15 pmInformation Protection and Control: Dealing withData LeakageBrian Shea, Senior Vice President, Bank of AmericaSince the year 2005, over 153 million data records containingsensitive personal information have been lost by governments,educational institutions, and businesses. These events haveprompted Congress to pass laws addressing the concerns arounddata loss and theft and also provided businesses a chance to gainor lose the trust of their customers by the way they protect thisdata or handle an incident when it occurs. This session will coverthe trends seen recently and then discuss technical and proceduraltactics that can be used to reduce the opportunity for loss of data.We will also cover some of the ways you can prepare to respond inthe event that you experience data leakage.
5:15 pm – 5:30 pmConference Conclusions and Closing Remarks
REGISTRATION RATESEarly-Bird Registration RateSign up by August 17th and save $400!$495
Standard Registration RateAfter August 17, 2007$895
Group DiscountA $100 discount per person is available for groups of three or morepeople from the same company registering together. We ask that allforms be submitted together and paid in full at time of registration.
TWO EASY WAYS TO REGISTER:1. Online:
Visit www.idc.com/securityforum07
2. By phone:Call 800-605-5849 or 978-597-0133.
What Your Registration Includes
> Admission to sessions> Continental breakfast, lunch, and coffee breaks> Access to presentations online*
* Printed proceedings will not be available at the conference. The day of theforum, the presentations submitted to IDC will be available to attendeesvia www.idc.com.
– IDC reserves the right to alter this program without notification.
VenueMillennium Broadway Hotel145 West 44th StreetNew York, NY 10036Reservations: 800.622.5569
Hotel ReservationsFor your convenience we have reserved a limited number of roomsat the Millennium Broadway Hotel. A special rate of $349 will beoffered until August 29, 2007. To receive this rate, please call 800-622-5569 and identify yourself as an attendee of the IDCSecurity Forum.
PaymentRegistrations must be accompanied by full payment. You may payby credit card (American Express, Visa, or MasterCard) or check,payable to IDC U.S. Conference Group.
Cancellation PolicySubstitutions may be made at any time by faxing a written requestto 978-597-2395. Cancellations communicated to IDC bySeptember 5, 2007 are subject to a $150 processing fee. Registrantswho either cancel after September 5, 2007 or do not attend theconference are liable for the full registration fee.
Special NeedsIDC fully supports the Americans with Disabilities Act. If you requirespecial assistance of any kind, please call us at 800-605-5849 or978-597-0133.
About IDCIDC is the premier global market intelligence and advisory firm in the information technology and telecommunications industries. We analyze and predict technology trends sothat our clients can make strategic, fact based decisions on IT business strategy. IDC Forums are designed to provide the latest news, research, and benchmarking case studies onrelevant and highly-focused topics, offering enterprise decision makers insight into how they can strategically use technology to gain competitive advantage. Case studypresentations are featured at each conference providing the highest quality program content. IDC Forums offer important opportunities for attendees to network with peers andto discuss the challenges and solutions faced in the real-world.
IDC SECURITY FORUMDefending Against Information Access Threats: Messaging Security,
Network Management and Retention Systems S E P T E M B E R 1 9 , 2 0 0 7 • M I L L E N N I U M B R O A D WAY H O T E L • N E W Y O R K , N Y
SPONSORSHIP OPPORTUNITIES AVAILABLE: CONTACT LAUREN DAVIS AT 508-988-7954 OR [email protected] FOR MORE INFORMATION.
R E G I S T R A T I O N I N F O R M A T I O N
IDC
SE
CU
RIT
YF
OR
UM
Defending
Against
Information
Access
Threats:Messaging
Security,Netw
orkM
anagement
andR
etentionSystem
s
SE
PT
EM
BE
R1
9,
20
07
•M
ILL
EN
NIU
MB
RO
AD
WA
YH
OT
EL
•N
EW
YO
RK
,N
Y
5SP
EENST
REET
FRA
MIN
GH
AM
,M
A0
17
01
Register
by
August
17th
andsave
$400!
Toregister
online:
ww
w.idc.com
/securityforum07
PR
ES
OR
TS
TA
ND
AR
DU
.S.
PO
ST
AG
EPA
IDB
UR
LIN
GT
ON
,V
TP
ER
MIT
NO
.2
1
Media
andA
ssociationPar tners
Gold
SponsorsSilver
andBronze
Sponsor