Technology Track


Technology Track

Please join us on October 14th, 2009 at the Crowne Plaza Hotel in Foster City for the Cornerstones of Trust 2009 Conference. Co-hosted by ISSA’s Silicon Valley and San Francisco Chapters and the San Francisco Bay Area InfraGard.

http://www.cornerstonesoftrust.com/index.php?option=com_content&view=article&id=66

08:45 – 09:45

Strategies for Managing Risk and Thriving in a Dynamic Environment

Speaker(s): Gail Coury, Vice President, Risk Management, Global IT, Oracle

09:45 – 10:15

Break

10:15 – 11:15

The Next Disruptive Technology

Panel of Bay Area startups

Sandeep Tiwari, CEO, Zafesoft

Tim Johnson, Director, Strategic Alliances, Commtouch Inc

Martha Gilbertson, VP Product Marketing, Whitesky


11:15 – 12:15

Virtualized Infrastructure Network Security

Speaker(s): Simon Richard, Principal Network Architect at McKesson

Overview: Virtualization is happening at a very fast pace in the enterprise. The Security and Compliance organization needs to act immediately and be seen as an enabler, not as a roadblock. Essential to ensuring the timely implementations of a secure virtualized environment are: An early involvement of the security group in the architecture and implementation phases of the program and The Enterprise Security and Compliance groups must have an understanding of Infrastructure virtualization architecture from people, process and technology points of view. They will facilitate the implementation controls that need to be executed in order to meet an enterprise’s security and compliance requirements

12:15 – 01:30

Lunch Break

01:30 – 02:15

Afternoon Keynote: “Why We Must Develop a New Model for Collaboration in Cyber Security: A Perspective on America’s Innovation Crisis”

Speaker(s): Pascal Levenson, Founder and Managing Partner of Levensohn Venture Partners

02:15 – 03:15

Innovation Gap / Crisis Panel: “What are the Opportunities to Advance Innovation in the Cyber Security Market”

Moderator: Robert Rodriguez, Chairman and Founder of the Security Innovation

Panelist(s):

John Stewart, Chief Security Officer at Cisco

Audrey MacLean, Professor at Stanford University

David Rice, Director for Policy Reform at U.S. Cyber Consequences Unit

03:15 – 03:30

Break

03:30 – 04:30

Cloud Computing Security – Practical and Actionable Security Controls to Assess the Cloud Vendor

Speaker(s): Brian Koref , Information Security Officer at KLA-Tencor

Overview: With Cloud Computing comes a whole new set of security vectors, white papers and various schools of thought related to security, privacy and governance. I have taken the time to decipher some recent white papers and guidance to put together some practical, actionable and relevant security controls which the audience can take back and immediately begin to use to properly assess cloud vendors to understand the new security vectors and put the cloud vendors to the test!

04:30 – 06:00

Reception/Raffle