Skip to content

NW ISSA Security Summit


NW ISSA Security Summit
May 2, 2013
a Special Event @ InnoTech

Sponsored by:

AccuvantLogoNEWs_150 mfe_primary_logo_4c_150
Your registration for the NW ISSA Security Summit gives you access to:
- one full day of focused security presentations including lunch & Special Lunch Presentation
- all of the InnoTech Conference sessions & vendor seminars & InnoTech Exhibits
Cost to attend this Special Event @ InnoTech:

$50.00 ISSA, ISACA & Institute of Internal Auditors Members   $65.00 Non-Members

2013 NW ISSA Security Summit Agenda & Presentation Descriptions

9:00am – 9:50am – Choose one of two sessions

Effective Security Metrics
Bryce Schroeder,
Director of Systems Engineers, Tripwire

OR

The Attack Graph Model for Understanding Malware Behavior
Matt Brinkley, Sr. Solutions Architect, McAfee

10:30am – 11:20am- Choose one of two sessions

Three Executives Reveal Strategies & Concerns with BYOD
Jim Wilcox, Past President, ISSA (Information Systems Security Association) Portland Chapter
Duane Ternes, Vice President, Information Technology, The Greenbrier Companies
Len Vance, VP of Infrastructure, Computing Services, Knowledge Universe
John Rasmussen, Chief of Information Security and Associate Privacy Officer, Oregon Health & Science University

OR

Tiers of Network Architectures: Expectations vs. Practical Realities
Sean Finn, Global Solutions Architect, Red Seal Networks

11:30am – 1:00pm
ISSA Security Summit Luncheon Presentation:

Innovation on Demand
whurley_80 William Hurley
CTO and Co-Founder, Chaotic Moon Studios

 

1:00pm – 1:50pm- Choose one of two sessions

Rapid Risk Assessment Techniques
Andrew Plato, Founder and President, Anitian Enterprise Security

OR
Federated Identity Management – Trends in Identity with Mobility & Cloud Providers

Robert Klohr, Security Analyst, The Standard
Kevin Graham, Security Architect, The Standard Insurance

2:00pm – 2:50pm Choose one of two sessions
Getting More Value From Your Data
Tammy Schuring, Vice President, Worldwide Sales, Voltage

OR

How Development Advances Can Put Security In Reverse
Barb Frederiksen-Cross,
Senior Managing Consultant, JOHNSON-LAIRD, Inc.

 

3:30pm – 4:20pm Choose one of two sessions

Global Efforts to Secure Cloud Computing
Jim Reavis,
Executive Director, Cloud Security Alliance

OR

BYOD and Mobile Security: Empowering Employees While Securing Corporate Assets
Ken Whelan
, Partner Development & Sales Manager, AirWatch


 

2013 Advisory Council Members
 robert klohr pic_80NW ISSA Security Summit, Chairperson:
Robert Klohr, Security Analyst, The Standard
David G. Stauffer, CISSP, CISA, Chief Information Security Officer, Oregon Judicial Branch, Enterprise Information Security Office
John McKean, Sr. Information Security Analyst, Oregon State Lottery
Mike Griffin, IT Security Manager, FEI, Inc.