[oagitm] Reminder - - NW ISSA Security Summit - May 2nd

  • From: "MASSE Theresa A * CIO" <theresa.a.masse@xxxxxxxxxxx>
  • To: "oagitm@xxxxxxxxxxxxx" <oagitm@xxxxxxxxxxxxx>
  • Date: Tue, 23 Apr 2013 15:32:46 +0000

OAGITM Members:

Please see the announcement below with the schedule of activities for the 
upcoming NW ISSA Security Summit on May 2nd - -  plan to attend or send some of 
your staff.  This is one conference you won’t want to miss!!  It’s local, 
reasonably priced, featuring timely topics and great speakers!

Click on any topic and it will take you to the Home Page so you can register.

See you there!

Theresa A. Masse
Chief Information Security Officer
State of Oregon
Department of Administrative Services
Enterprise Security Office
503-378-4896
Data Classification 2 - Limited

Confidentiality Notice: This message, including any attachments or links, may 
contain privileged, confidential and/or legally protected information.  Any 
distribution or use of this communication by anyone other than the
intended recipient(s) is strictly prohibited.  If you have received this 
communication in error, please notify the sender immediately by replying to 
this message and then delete all copies of the original communication, 
including any attachments and/or links.


NW ISSA Security Summit

Your registration for the NW ISSA Security Summit gives you access to:
- one full day of focused security presentations including lunch & Special 
Lunch Presentation
- all of the InnoTech Conference sessions & vendor seminars & InnoTech Exhibits
Cost to attend this Special Event @ InnoTech:
$50.00 ISSA, ISACA & Institute of Internal Auditors Members   $65.00 Non-Members
2013 NW ISSA Security Summit Agenda & Presentation Descriptions

9:00am – 9:50am – Choose one of two sessions

Effective Security 
Metrics<http://www.innotechconferences.com/oregon/tracks/effective-security-metrics/>
Cindy 
Valladares<http://www.innotechconferences.com/oregon/speakers/cindy-valladares/>,
 Manager for Products and Solutions,Tripwire Inc.

OR

The Attack Graph Model for Understanding Malware 
Behavior<http://www.innotechconferences.com/oregon/tracks/the-attack-graph-model-for-understanding-malware-behavior/>
Matt Brinkley, 
<http://www.innotechconferences.com/oregon/speakers/matt-brinkley/> Sr. 
Solutions Architect, McAfee

10:30am – 11:20am- Choose one of two sessions

Three Executives Reveal Strategies & Concerns with 
BYOD<http://www.innotechconferences.com/oregon/tracks/byod-why-not-it-executives-discuss-policy-implications/http:/www.innotechconferences.com/oregon/tracks/byod-why-not-it-executives-discuss-policy-implications/>
Jim Wilcox<http://www.innotechconferences.com/oregon/speakers/jim-wilcox-2/>, 
Past President, ISSA (Information Systems Security Association) Portland Chapter
Duane Ternes, IT Director, The Greenbrier Companies
Len Vance, VP of infrastructure, Computing Services
John Rasmussen, CISO, OHSU

OR

Tiers of Network Architectures: Expectations vs. Practical 
Realities<http://www.innotechconferences.com/oregon/tracks/tiers-of-network-architectures-expectations-vs-practical-realities/>
Sean Finn<http://www.innotechconferences.com/oregon/speakers/sean-finn/>, 
Global Solutions Architect, Red Seal Networks

11:30am – 1:00pm
ISSA Security Summit Luncheon Presentation:
Innovation on 
Demand<http://www.innotechconferences.com/oregon/tracks/innotech-keynote-luncheon-innovation-awesomeness/>

[whurley_80]<http://www.innotechconferences.com/oregon/files/2013/02/whurley_80.jpg>

William 
Hurley<http://www.innotechconferences.com/oregon/speakers/william-whurley-hurley/>
CTO and Co-Founder, Chaotic Moon Studios








1:00pm – 1:50pm- Choose one of two sessions

Rapid Risk Assessment 
Techniques<http://www.innotechconferences.com/oregon/tracks/rapid-risk-assessment-techniques/>
Andrew Plato, <http://www.innotechconferences.com/oregon/speakers/2448/> 
Founder and President, Anitian Enterprise Security

OR
Federated Identity Management – Trends in Identity with Mobility & Cloud 
Providers<http://www.innotechconferences.com/oregon/tracks/federated-idam-panel-discussion/>
Robert Klohr,<http://www.innotechconferences.com/oregon/speakers/robert-klohr/> 
Security Analyst, The Standard
Dave Dyk, <http://www.innotechconferences.com/oregon/speakers/dave-dyk/> Vice 
President/Information Security Officer, Umpqua Bank
Kevin Graham, 
<http://www.innotechconferences.com/oregon/speakers/kevin-graham/> Security 
Architect, The Standard Insurance

2:00pm – 2:50pm Choose one of two sessions
Getting More Value From Your 
Data<http://www.innotechconferences.com/oregon/tracks/devaluing-your-data-without-risk/>
Tammy Schuring, 
<http://www.innotechconferences.com/oregon/speakers/tammy-schuring/> Vice 
President, Worldwide Sales, Voltage

OR

How Development Advances Can Put Security In 
Reverse<http://www.innotechconferences.com/oregon/tracks/how-development-advances-can-put-security-in-reverse/>
Barb Frederiksen-Cross, 
<http://www.innotechconferences.com/oregon/speakers/barb-frederiksen-cross/> 
Senior Managing Consultant, JOHNSON-LAIRD, Inc.



3:30pm – 4:20pm Choose one of two sessions

Global Efforts to Secure Cloud 
Computing<http://www.innotechconferences.com/oregon/tracks/global-efforts-to-secure-cloud-computing/>
Jim Reavis, <http://www.innotechconferences.com/oregon/speakers/jim-reavis/> 
Executive Director, Cloud Security Alliance

OR

BYOD and Mobile Security: Empowering Employees While Securing Corporate 
Assets<http://www.innotechconferences.com/oregon/tracks/byod-bring-your-own-device-or-bring-your-own-disaster-how-to-effectively-manage-your-mobile-environment/>
Ken Whelan<http://www.innotechconferences.com/oregon/speakers/ken-whelan/>, 
Partner Development & Sales Manager, AirWatch

David G. Stauffer CISSP, CISA
Chief Information Security Officer
Oregon Judicial Branch
Enterprise Information Security Office
office: (503) 986-5572
BB: (503) 689-7693
David.G.Stauffer@xxxxxxxxxxxxxxx<mailto:David.G.Stauffer@xxxxxxxxxxxxxxx>

JPEG image

PNG image

Other related posts:

  • » [oagitm] Reminder - - NW ISSA Security Summit - May 2nd - MASSE Theresa A * CIO