BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P1H
REFRESH-INTERVAL:P1H
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
DTSTART:20070101T000000
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:Mountain Daylight Time
END:DAYLIGHT
BEGIN:STANDARD
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
DTSTART:20070101T000000
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:Mountain Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20100624T000000
DTEND;TZID=America/Denver:20100624T000000
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:CSIA Presents: Security & The Evolving Threat Landscape
DESCRIPTION:Security & The Evolving Threat Landscape\n\nWith information changing hands at the speed of light and new threats evolving just as fast\, it’s crucial for your business to be knowledgeable and armed with up-to-date security. \n\nThere are more than 20 security reports that are updated annually explaining new threats\, types of vulnerabilities and malware\, sources of attacks\, exfiltration of data\, breach reports\, and other important information to keep your business’ and customer’s information safe\, and your IT assets functioning. But who has the time to read all these reports and ensure their business is at low risk?\n\nWell\, you’re in luck! The expert speakers in this program have already read and compared them all. \n\nThis program will not only provide you with new critical security information\, but compares the similarities and differences between these reports. You’ll also learn the difference between session and transmission based security. \n\nThe information to be presented was compiled and analyzed from the following annual security reports:\nSANS Top Cyber Security Risks – September 2009Department of Homeland Security Information Technology Sector Baseline Risk Assessment - August 2009IBM X-Force 2009 Mid-year Trend and Risk Report - August 2009Cisco 2009 Midyear Security Report - July 2009 (Intellishield)Gartner Hype Cycle for Data and Application Security 2009 - July 2009 Microsoft Security Intelligence Report (SIR) 7 - June 2009White House Cyberspace Policy Review - May 2009Symantec Internet Security Threat Report - April 2009Verizon 2009 Data Breach Investigations Report - April 20092008 CSI Computer Crime and Security Survey - February 2009Sophos Security threat report: 2009 - January 2009Microsoft Security Intelligence Report (SIR) 6 - December 2008Cisco 2008 Annual Security Report - November 2008Georgia Tech Emerging Cyber Threats Report for 2009 - October 2008PricewaterhouseCoopers 2008 Global State of Information Security - October 2008Gartner Hype Cycle for Data and Application Security\, 2008 - September 2008 UK Department of Business\, Enterprise and Regulatory Reform (BERR) Information Security Breaches survey 2008 - April 2008\nSpeakers:\n\nScott Hogg\, Director Advanced Technology Services\, GTRI\nScott Hogg has been a network computing consultant for over 18 years. Scott provides network engineering\, security consulting\, and training services to his clients\, focusing on creating reliable\, high-performance\, secure\, manageable\, and cost effective network solutions. He has a B.S. in Computer Science from Colorado State University\, a M.S. in Telecommunications from the University of Colorado\, along with his CCIE (#5133)\, CISSP (#4610)\, among many other vendor and industry certifications. Scott has designed\, implemented\, and troubleshot networks for many large enterprises\, service providers\, and government organizations. For the past 9 years Scott has been researching IPv6 technologies and has helped several organizations with their IPv6 planning and deployment. Scott has given numerous presentations and demonstrations of IPv6 technologies and authored a book on IPv6 Security. He is also currently the Chair of the Rocky Mountain IPv6 Task Force. \n\nKirk Byles\, Vice President Sales\, Relevant Security\nKirk is responsible for the overall implementation of the sales and marketing strategy. Kirk has 15 years in technology start-up companies running sales and channels globally. His successes include being part of the team to take a small wireless broadband company public\, the hugely successful development and implementation of Motorola Canopy's channel strategy\, the guidance of Orthogon System's channels through the acquisition by Motorola\, as well the two year transition within Motorola. Kirk brings a wealth of sales\, channels\, marketing\, and strategic planning to RSC. \n\nSteve Prather\, Senior Vice President of Strategic Operations\, ViaWest\, Inc.\nWith more than twelve years of Internet industry experience\, Prather leads the ViaWest Sales and Sales Engineering departments in the development and implementation of process controls and procedures. Prather supports product management and acts as the company's chief sales engineer\, assisting customers in developing scalable and reliable solutions for their business critical applications and data.\n\nBefore joining the ViaWest management network\, Prather served as the Manager of Network Services at RMI.net and was the Project Development Manager for VR1\, working in conjunction with Microsoft to launch a new Internet gaming application.\n\nModerator:\n\nMatthew Taylor\, VP of Managed Services and IT/IS Operations\, ViaWest\nTaylor joined ViaWest as the Vice President of Hosting and IT Operations in May 2006. Utilizing his over 16 years of technology management experience\, Taylor reconstructed the hosting and IT organization to provide increased support levels for customer purchased services. He supported the migration of several key initiatives including new definition and standardization of managed services projects\, implementation of best practice compliance services and new product development processes. Taylor was also responsible for integration of IT/IS functions for several ViaWest acquisitions\, as well as introducing new reporting and managed services solutions to customers. Taylor began his career with General Reinsurance Corporation\, becoming the youngest manager in the companies’ history. Next\, he co-founded GreatLand Insurance Company\, serving as both the CIO and VP of Underwriting. Taylor then accepted the role as Director of Strategic Planning for Kemper Insurance Company\, founding its CIO Council. \n\nBefore joining ViaWest\, Taylor held roles as VP Southwest region for Agile Technologies\, growing the $2 million book of business. Taylor also spent part of his career as Interim CIO for one of the world’s largest managed hosting companies managing numerous initiatives including the complete restructuring of the internal infrastructure.\n\nTicket Information:\nCSIA members $15\; Premium members receive two complimentary tickets\nNon-members $55\n\nAgenda:\n7:30-8:00 Breakfast & Registration\n8:00-8:05 Introductions\n8:05-9:05 Presentations\n9:05-9:45 Q&A\n9:45-10:00 Networking
X-ALT-DESC;FMTTYPE=text/html:Security &\; The Evolving Threat Landscape
With information changing hands at the speed of light and new threats evolving just as fast\, it’s crucial for your business to be knowledgeable and armed with up-to-date security. \;
There are more than 20 security reports that are updated annually explaining new threats\, types of vulnerabilities and malware\, sources of attacks\, exfiltration of data\, breach reports\, and other important information to keep your business’ and customer’s information safe\, and your IT assets functioning. \; But who has the time to read all these reports and ensure their business is at low risk?
Well\, you’re in luck! \; The expert speakers in this program have already read and compared them all. \;
This program will not only provide you with new critical security information\, but compares the similarities and differences between these reports. \; You’ll also learn the difference between session and transmission based security. \;
The information to be presented was compiled and analyzed from the following annual security reports: