Security Technology Executive

FEB-MAR 2016

Issue link: https://securitytechnologyexecutive.epubxp.com/i/656764

Contents of this Issue

Navigation

Page 9 of 61

8 SECURITY TECHNOLOGY EXECUTIVE • February/March 2016 www.SecurityInfoWatch.com CONVERGENCE Q&A; B y Ray B er n ard, P SP, CH S - I I I These days I am always scouting around for educational sessions about the status of securi- ty and technology, cyber security, cloud servic- es, and the future of security risk management. Are there any really great 2016 ISC West educational sessions you can recommend? Here are the Top 5 on my must-see sessions list, presented in the order in which they occur. I know most of these industry leaders and they have very relevant messages about the state of security in 2016 and beyond. Don't miss these sessions! Addressing Cyber Risks by Protecting your Facilities and Infrastructure beyond the Physical Realm April 05, 2016, 11:30 AM - 12:30 PM Those wishing to steal data or create general acts of espionage and terror- ism continually look for ways to access sensitive data and commit fraud and impact systems and infrastructure. It's imperative those deploying secu- rity solutions consider all aspects of cyber risk mitigation. Security solu- tion advancements need to be proper- ly deployed to ensure their continued operation. You'll hear how to priori- tize threats to physical security solu- tions, and which guidance, security controls and standards to consider and the components to use for long term implementation. Salvatore D'Agostino, CEO, Idmachines, LLC Steve Surfaro, Security Industry Liaison, Axis Communications Fred Juhlin, Global Senior Consultant, Axis Communications John Bartolac, Manager, Programs for Retail, Transportation, Banking & Finance, Government and Cyber Strategy, North America, Axis Communications Cyber Security – How to Ensure Vendors are not Leaving You Vulnerable April 05, 2016, 1:30 PM - 2:30 PM You're preparing for an upcoming project or service contract and finalizing the RFP. There are important questions you should ask when it comes to cyber security and enterprise resil- ience tactics. Join experts to determine how to evaluate, qualify and disqualify potential part- ners based on their cyber security and disaster recovery policies. Discuss key characteristics of a responsible information and network secu- rity program, best practices in managing ongo- ing vendor relationships and red f lags in the prequalification process. Wayne Smith, President, Tech Systems Mark Andrews, Chief Information Security Officer, Group Executive, TSYS Geoff Provinelli, Associate Vice President, System Security, Memorial Hermann Health System Are You Ready for the Future? Security Leadership in a Changing Risk Environment April 05, 2016, 2:45 PM - 3:45 PM Disr uption in the secur ity r isk landscape demands new leadership strategies to be rel- evant and effective for your organization. Are you prepared for the onslaught of additional threats from new technologies, new skills need- ed in the workforce and the increased coopera- tion needed between security and all facets of the organization? Join security industry veter- ans as they bring together leading global secu- rity practitioners reshaping the role of security within their organizations as they debate what and who will inf luence the opportunities and challenges ahead. Jeff Spivey, President, Security Risk Management Mike Foynes, Senior Director, Global Security Operations Centers Microsoft High-Value ISC West Sessions Cyber security highlights the new vision of IP-centric security for industry (continued on page 56) Q: A: Write to Ray about this column at ConvergenceQA@ go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Con- tent Expert Faculty of the Security Executive Council (www.SecurityExecutive- Council.com). Follow Ray on Twitter: @RayBernardRBCS

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2016