OAGITM Members: Please see the announcement below with the schedule of activities for the upcoming NW ISSA Security Summit on May 2nd - - plan to attend or send some of your staff. This is one conference you won’t want to miss!! It’s local, reasonably priced, featuring timely topics and great speakers! Click on any topic and it will take you to the Home Page so you can register. See you there! Theresa A. Masse Chief Information Security Officer State of Oregon Department of Administrative Services Enterprise Security Office 503-378-4896 Data Classification 2 - Limited Confidentiality Notice: This message, including any attachments or links, may contain privileged, confidential and/or legally protected information. Any distribution or use of this communication by anyone other than the intended recipient(s) is strictly prohibited. If you have received this communication in error, please notify the sender immediately by replying to this message and then delete all copies of the original communication, including any attachments and/or links. NW ISSA Security Summit Your registration for the NW ISSA Security Summit gives you access to: - one full day of focused security presentations including lunch & Special Lunch Presentation - all of the InnoTech Conference sessions & vendor seminars & InnoTech Exhibits Cost to attend this Special Event @ InnoTech: $50.00 ISSA, ISACA & Institute of Internal Auditors Members $65.00 Non-Members 2013 NW ISSA Security Summit Agenda & Presentation Descriptions 9:00am – 9:50am – Choose one of two sessions Effective Security Metrics<http://www.innotechconferences.com/oregon/tracks/effective-security-metrics/> Cindy Valladares<http://www.innotechconferences.com/oregon/speakers/cindy-valladares/>, Manager for Products and Solutions,Tripwire Inc. OR The Attack Graph Model for Understanding Malware Behavior<http://www.innotechconferences.com/oregon/tracks/the-attack-graph-model-for-understanding-malware-behavior/> Matt Brinkley, <http://www.innotechconferences.com/oregon/speakers/matt-brinkley/> Sr. Solutions Architect, McAfee 10:30am – 11:20am- Choose one of two sessions Three Executives Reveal Strategies & Concerns with BYOD<http://www.innotechconferences.com/oregon/tracks/byod-why-not-it-executives-discuss-policy-implications/http:/www.innotechconferences.com/oregon/tracks/byod-why-not-it-executives-discuss-policy-implications/> Jim Wilcox<http://www.innotechconferences.com/oregon/speakers/jim-wilcox-2/>, Past President, ISSA (Information Systems Security Association) Portland Chapter Duane Ternes, IT Director, The Greenbrier Companies Len Vance, VP of infrastructure, Computing Services John Rasmussen, CISO, OHSU OR Tiers of Network Architectures: Expectations vs. Practical Realities<http://www.innotechconferences.com/oregon/tracks/tiers-of-network-architectures-expectations-vs-practical-realities/> Sean Finn<http://www.innotechconferences.com/oregon/speakers/sean-finn/>, Global Solutions Architect, Red Seal Networks 11:30am – 1:00pm ISSA Security Summit Luncheon Presentation: Innovation on Demand<http://www.innotechconferences.com/oregon/tracks/innotech-keynote-luncheon-innovation-awesomeness/> [whurley_80]<http://www.innotechconferences.com/oregon/files/2013/02/whurley_80.jpg> William Hurley<http://www.innotechconferences.com/oregon/speakers/william-whurley-hurley/> CTO and Co-Founder, Chaotic Moon Studios 1:00pm – 1:50pm- Choose one of two sessions Rapid Risk Assessment Techniques<http://www.innotechconferences.com/oregon/tracks/rapid-risk-assessment-techniques/> Andrew Plato, <http://www.innotechconferences.com/oregon/speakers/2448/> Founder and President, Anitian Enterprise Security OR Federated Identity Management – Trends in Identity with Mobility & Cloud Providers<http://www.innotechconferences.com/oregon/tracks/federated-idam-panel-discussion/> Robert Klohr,<http://www.innotechconferences.com/oregon/speakers/robert-klohr/> Security Analyst, The Standard Dave Dyk, <http://www.innotechconferences.com/oregon/speakers/dave-dyk/> Vice President/Information Security Officer, Umpqua Bank Kevin Graham, <http://www.innotechconferences.com/oregon/speakers/kevin-graham/> Security Architect, The Standard Insurance 2:00pm – 2:50pm Choose one of two sessions Getting More Value From Your Data<http://www.innotechconferences.com/oregon/tracks/devaluing-your-data-without-risk/> Tammy Schuring, <http://www.innotechconferences.com/oregon/speakers/tammy-schuring/> Vice President, Worldwide Sales, Voltage OR How Development Advances Can Put Security In Reverse<http://www.innotechconferences.com/oregon/tracks/how-development-advances-can-put-security-in-reverse/> Barb Frederiksen-Cross, <http://www.innotechconferences.com/oregon/speakers/barb-frederiksen-cross/> Senior Managing Consultant, JOHNSON-LAIRD, Inc. 3:30pm – 4:20pm Choose one of two sessions Global Efforts to Secure Cloud Computing<http://www.innotechconferences.com/oregon/tracks/global-efforts-to-secure-cloud-computing/> Jim Reavis, <http://www.innotechconferences.com/oregon/speakers/jim-reavis/> Executive Director, Cloud Security Alliance OR BYOD and Mobile Security: Empowering Employees While Securing Corporate Assets<http://www.innotechconferences.com/oregon/tracks/byod-bring-your-own-device-or-bring-your-own-disaster-how-to-effectively-manage-your-mobile-environment/> Ken Whelan<http://www.innotechconferences.com/oregon/speakers/ken-whelan/>, Partner Development & Sales Manager, AirWatch David G. Stauffer CISSP, CISA Chief Information Security Officer Oregon Judicial Branch Enterprise Information Security Office office: (503) 986-5572 BB: (503) 689-7693 David.G.Stauffer@xxxxxxxxxxxxxxx<mailto:David.G.Stauffer@xxxxxxxxxxxxxxx>