idc security forum · 2007. 6. 18. · chris christiansen, program vice president, security...

6
> George Adams, CEO, SSH Communications Security > Dr. Edward G. Amoroso,Senior VP, Chief Security Officer, AT&T Services, Inc. > Michael Barrett, CISO, PayPal > Bob Bragdon, Publisher, CSO Magazine > Allan Carey, Program Manager, Security Services and Identity Management, IDC > Chris Christiansen, Program Vice President, Security Products and Services, IDC > Julie Donahue, VP, Security and Privacy Service, IBM Global Technology Services > Lynda Fleury, CISO, Unum > Tim Mathews, Director, Risk Management and Corporate Security, ETS > Brian Shea, Senior Vice President, Bank of America > Craig Smelser, VP, Storage and Security Development, IBM Software Group, Tivoli > Chris Whitener, GM, Atalla Security Product and Leader, Enterprise Storage and Servers Security Strategy, HP Learn from experts and your peers including: IDC Security Forum Defending Against Information Access Threats: Messaging Security, Network Management and Retention Systems SEPTEMBER 19, 2007 • MILLENNIUM BROADWAY HOTEL • NEW YORK, NY www.idc.com/securityforum07 Conference Co-Chair Bob Bragdon, Publisher, CSO Magazine Conference Co-Chair Christian A. Christiansen, Program VP, Security Products and Services, IDC

Upload: others

Post on 04-Mar-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

> George Adams, CEO, SSH Communications Security> Dr. Edward G. Amoroso, Senior VP, Chief Security Officer, AT&T Services, Inc.> Michael Barrett, CISO, PayPal> Bob Bragdon, Publisher, CSO Magazine> Allan Carey, Program Manager, Security Services and Identity Management, IDC> Chris Christiansen, Program Vice President, Security Products and Services, IDC> Julie Donahue, VP, Security and Privacy Service, IBM Global Technology Services> Lynda Fleury, CISO, Unum > Tim Mathews, Director, Risk Management and Corporate Security, ETS> Brian Shea, Senior Vice President, Bank of America> Craig Smelser, VP, Storage and Security Development, IBM Software Group, Tivoli> Chris Whitener, GM, Atalla Security Product and Leader, Enterprise Storage and

Servers Security Strategy, HP

Learn from experts and your peers including:

IDC Security ForumDefending Against Information Access Threats: Messaging Security,

Network Management and Retention SystemsSEPTEMBER 19, 2007 • MILLENNIUM BROADWAY HOTEL • NEW YORK, NY

www.idc.com/securityforum07

Conference Co-Chair

Bob Bragdon, Publisher,CSO Magazine

Conference Co-Chair

Christian A. Christiansen,Program VP, Security

Products and Services, IDC

Page 2: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

AgendaSEPTEMBER 19, 20078:00 am – 9:00 amRegistration, Continental Breakfast and TabletopExhibit Viewing

9:00 am – 9:30 amWelcome and Opening Remarks fromConference Co-ChairmanBob Bragdon, Publisher, CSO Magazine

9:30 am – 10:15 amReactive to Proactive Enterprise Security Dr. Edward G. Amoroso, Senior Vice President, ChiefSecurity Officer, AT&T Services, Inc. With the number of cyber-attacks up 30 times during the past fiveyears, organizations must be vigilant or risk significant losses.Firewalls have become increasingly penetrable and tools used inattacks have grown more sophisticated. Dr. Amoroso, who overseessecurity for one of the largest telecommunications companies in theworld, will offer insights and real-world examples into current bestpractices for preventing attacks on systems, networks and data. As aleader who has helped discover and counter virtually everyconceivable type of malicious threat against computers and networksaround the world, Dr. Amoroso will reveal the network-basedsecurity strategy he has championed at AT&T, centered on proactivesecurity management and emerging in-the-cloud protection services.

IDC’s 4th annual Security Forum offers attendees practical adviceinto developing a holistic, effective security program thatbecomes a core part of the organizational culture and businessroutine. Featuring insight from leading enterprise securitypractitioners, technology solution providers, and subject matterexperts, the program addresses chief security concerns for 2007and beyond. This year’s agenda will explore priorities rangingfrom enforcing and tracking messaging compliance to proactivestrategies for ensuring intellectual property stays where it shouldbe - inside the enterprise.

ATTEND THIS EVENT TO:• Engage with your peers and subject matter experts in an

intimate learning environment driven by a highly focusedagenda.

• Experience forward thinking insight from the most advancedresearch.

• Gain insight and essential guidance from senior IDC analystsinto your current security and implementation strategy.

• CIOs, CISOs, CSOs, CTOs

• VP/Directors of: Business Continuity,Information Security, Information Technology,Operations, Security, Telecommunications

• Network Directors and Managers

• Security Architects

• Risk Managers

• Auditors

WhoShould Attend? ARRIVE EARLY FOR THE COMPLIANCE IN INFORMATION MANAGEMENT FORUM ON SEPT. 18 Attend IDC and Kahn Consulting’s 4th Annual Compliance in InformationManagement Forum, scheduled on September 18 in the same hotel. To view the event details, go to:

www.idc.com/kahnconsulting/imeast07If you would like to register for both conferences at the same time, please call 800-605-5849. All eligible discounts apply for each conference.

Page 3: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

10:15 am – 10:45 am Networking Break, Tabletop Exhibit Viewing and One-to-One Meetings

One-to-One MeetingsAttendees have the opportunity to sign up for complimentary one-to-one meetings with select analysts and experts at eventregistration. This will enable you to gain strategic advice on yourcompany’s security initiatives. Arrive early since meetings arescheduled on a first-come, first-served basis. Featured analysts andexperts include:

Bob Bragdon, Publisher, CSO Magazine Chris Christiansen, Program Vice President, SecurityProducts and Services, IDCAllan Carey, Program Manager, Security Services andIdentity Management, IDC

10:45 am – 11:30 amPhishing: Don’t Get HookedMichael Barrett, CISO, PayPalAs one of the best known consumer brands on the Internet, PayPalhas become a top target for phishing attacks. While there is nosilver bullet to prevent phishing, the company has investedsignificant resources to combat the issue and protect its 143 millionaccount holders worldwide. Using a combination of technology,industry partnerships and consumer education, PayPal keeps itscustomers safe and its data secure to maintain one of the lowestfraud loss rates in the financial services industry. Join this session tolearn how to protect your business against one of today’s mosthigh-profile security threats.

11:30 am – 12:15 pmDefending Against Information Access Threats:Security Depth In DefenseLynda Fleury, CISO, Unum Protecting information assets has become even more critical toorganizations due to regulatory requirements and customerexpectations. Security cannot be assured by the installation of oneparticular solution, technology or operating policy. Rather, it is acombination of multiple different controls, the aggregate of which

are commensurate with your company's particular risk exposurethat should be employed. In order to adequately protect yourorganization's sensitive resources, multiple layers of defense mustbe employed. Join this session to learn how a leading disabilityinsurer is defending itself through people, process and technology.

12:15 pm – 1:30 pmLunch, Facilitated Roundtable Discussions, One-to-One MeetingsDuring lunch, the roundtable discussions will provide attendees theopportunity to interact with peers, speakers and subject matterexperts on key topics in an interactive format – with the discussionled by an industry expert. Attendee participation is stronglyencouraged. Sign up sheets will be available at registration on afirst-come, first-served basis. The following are some of theroundtables available at the Forum:

Table 1: Security File Transfers, Eliminating FTPfrom Distributed Systems to MainframesLed by George Adams, CEO, SSH Communications Security

Table 2: eDiscovery ComplianceLed by Bob Bragdon, Publisher, CSO Magazine

1:30 pm – 2:15 pmCONCURRENT SESSIONS

GROUP 1Managing Security Gaps in the EnterpriseChris Whitener, GM, Atalla Security Products and Leader,Enterprise Storage and Servers Security Strategy, HPHP has been protecting the majority of the world's financialinformation for the past 35 years through ATMs, point-of-sale,credit card information, and electronic funds transfers and thatsame technology is now being applied to other secureinfrastructures in industries such as energy and healthcare, as wellas to all HP products. In this session, Chris will speak to deployingsecurity solutions and products into the enterprise to fill securitygaps, and secure the infrastructure from the desktop to data centerto reduce cost, minimize risk and accelerate growth, enabling betterbusiness outcomes.

SPECIAL OFFER

Page 4: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

To register online: www.idc.com/securityforum07GROUP 2Safeguarding Customer Data: A HolisticApproachJulie Donahue, VP, Security and Privacy Service, IBMGlobal Technology ServicesCraig Smelser, VP, Storage and Security Development,IBM Software Group, TivoliSecurity breaches are trending upward, external and internal threatsare more sophisticated, and regulatory mandates are growing innumber and complexity. This session will explore how IBM enablesthe sharing of data within an organization and with their businesspartners, while minimizing the risk. IBM will discuss how you canprotect your organization against data leakage at the point of use –including messaging. Attendees will learn how to monitor andprotect data in order to adhere to the challenging regulatory andprivacy compliance requirements as well as safeguard your mostimportant assets.

2:30 pm – 3:15 pmSecuring a Multitude of Messaging ProtocolsOrganizations need to protect themselves from threats of allvarieties. In particular, advances in electronic communications haveopened many doors for misuse, abuse and rather unpleasantconsequences. This is where messaging security comes into play.Whether emails are being screened for viruses and phishing orconfidential information is blocked from being accidentally sentoutside of the organization, properly securing the organization'sdata and information will drastically reduce the risk of problemscaused by electronic communications such as email, instantmessaging and browsing the Web. This session will focus onmessaging security solutions that can be quickly implemented andeasily managed.

3:15 pm – 3:45 pmNetworking Break, Tabletop Exhibit Viewing andOne-to-One Meetings

3:45 pm – 4:30 pmA Resilient Enterprise Requires Resilient EmailTim Mathews, Director, Risk Management and CorporateSecurity, ETSThe trend toward the convergence of corporate security, businesscontinuity and disaster recovery has provided an opportunity toimprove overall resiliency. In most organizations, corporate email isa mission critical application that requires a "protect and prevent"strategy rather than a "plan and recover" procedure. This sessionwill outline a successful approach to creating a resilient emailenvironment, including: determining the priority of email as abusiness application, the process of developing a cost effectiverecovery strategy, the integration of mail with corporate emergencyresponse and records retention programs.

4:30 pm – 5:15 pmInformation Protection and Control: Dealing withData LeakageBrian Shea, Senior Vice President, Bank of AmericaSince the year 2005, over 153 million data records containingsensitive personal information have been lost by governments,educational institutions, and businesses. These events haveprompted Congress to pass laws addressing the concerns arounddata loss and theft and also provided businesses a chance to gainor lose the trust of their customers by the way they protect thisdata or handle an incident when it occurs. This session will coverthe trends seen recently and then discuss technical and proceduraltactics that can be used to reduce the opportunity for loss of data.We will also cover some of the ways you can prepare to respond inthe event that you experience data leakage.

5:15 pm – 5:30 pmConference Conclusions and Closing Remarks

Page 5: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

REGISTRATION RATESEarly-Bird Registration RateSign up by August 17th and save $400!$495

Standard Registration RateAfter August 17, 2007$895

Group DiscountA $100 discount per person is available for groups of three or morepeople from the same company registering together. We ask that allforms be submitted together and paid in full at time of registration.

TWO EASY WAYS TO REGISTER:1. Online:

Visit www.idc.com/securityforum07

2. By phone:Call 800-605-5849 or 978-597-0133.

What Your Registration Includes

> Admission to sessions> Continental breakfast, lunch, and coffee breaks> Access to presentations online*

* Printed proceedings will not be available at the conference. The day of theforum, the presentations submitted to IDC will be available to attendeesvia www.idc.com.

– IDC reserves the right to alter this program without notification.

VenueMillennium Broadway Hotel145 West 44th StreetNew York, NY 10036Reservations: 800.622.5569

Hotel ReservationsFor your convenience we have reserved a limited number of roomsat the Millennium Broadway Hotel. A special rate of $349 will beoffered until August 29, 2007. To receive this rate, please call 800-622-5569 and identify yourself as an attendee of the IDCSecurity Forum.

PaymentRegistrations must be accompanied by full payment. You may payby credit card (American Express, Visa, or MasterCard) or check,payable to IDC U.S. Conference Group.

Cancellation PolicySubstitutions may be made at any time by faxing a written requestto 978-597-2395. Cancellations communicated to IDC bySeptember 5, 2007 are subject to a $150 processing fee. Registrantswho either cancel after September 5, 2007 or do not attend theconference are liable for the full registration fee.

Special NeedsIDC fully supports the Americans with Disabilities Act. If you requirespecial assistance of any kind, please call us at 800-605-5849 or978-597-0133.

About IDCIDC is the premier global market intelligence and advisory firm in the information technology and telecommunications industries. We analyze and predict technology trends sothat our clients can make strategic, fact based decisions on IT business strategy. IDC Forums are designed to provide the latest news, research, and benchmarking case studies onrelevant and highly-focused topics, offering enterprise decision makers insight into how they can strategically use technology to gain competitive advantage. Case studypresentations are featured at each conference providing the highest quality program content. IDC Forums offer important opportunities for attendees to network with peers andto discuss the challenges and solutions faced in the real-world.

IDC SECURITY FORUMDefending Against Information Access Threats: Messaging Security,

Network Management and Retention Systems S E P T E M B E R 1 9 , 2 0 0 7 • M I L L E N N I U M B R O A D WAY H O T E L • N E W Y O R K , N Y

SPONSORSHIP OPPORTUNITIES AVAILABLE: CONTACT LAUREN DAVIS AT 508-988-7954 OR [email protected] FOR MORE INFORMATION.

R E G I S T R A T I O N I N F O R M A T I O N

Page 6: IDC Security Forum · 2007. 6. 18. · Chris Christiansen, Program Vice President, Security Products and Services, IDC Allan Carey, Program Manager, Security Services and Identity

IDC

SE

CU

RIT

YF

OR

UM

Defending

Against

Information

Access

Threats:Messaging

Security,Netw

orkM

anagement

andR

etentionSystem

s

SE

PT

EM

BE

R1

9,

20

07

•M

ILL

EN

NIU

MB

RO

AD

WA

YH

OT

EL

•N

EW

YO

RK

,N

Y

5SP

EENST

REET

FRA

MIN

GH

AM

,M

A0

17

01

Register

by

August

17th

andsave

$400!

Toregister

online:

ww

w.idc.com

/securityforum07

PR

ES

OR

TS

TA

ND

AR

DU

.S.

PO

ST

AG

EPA

IDB

UR

LIN

GT

ON

,V

TP

ER

MIT

NO

.2

1

Media

andA

ssociationPar tners

Gold

SponsorsSilver

andBronze

Sponsor