Sex, Drugs and Cybercrime: Go Flux Yourself

By Ericka Chickowski  |  Posted 2008-04-04 Email Print this article Print

The annual security-fest at the RSA Conference begins April 7. If you’re currently planning your meetings and sessions schedule, be sure to consider the following track sessions.



4. Sex, Drugs and Cybercrime: Go Flux Yourself

Time: Wednesday, April 9, 8:00 AM
Speaker: Matthew Ziemniak, Program Director of Cyber Operations, National Cyber-Forensics and Training
Alliance; Kim Grillo, Technical Analyst, United States Postal Inspection Service

This session has the coolest title ever and by the looks of it, it should deliver with some solid content as well. The speakers will provide case studies and demos that will hopefully shed light on how criminals are using fast-flux networks to attack organizations and what security practitioners can do to fight them.


5. Open Security Initiatives at Bank of America

Time: Wednesday, April 9, 9:10 AM
Speakers: Todd Inskeep, VP Innovation & R&D, Bank of
America; Scott Huie

SVP - E-Commerce, Bank of America; David Shroyer, Vice President, E-Commerce

Bank of America; Steven Jones, Sr Architect Manager, Bank of America

Everyone can appreciate a track session completely devoid of vendor spin. This one looks like it will deliver the goods, with an in-depth case study of Bank of America security practices straight from the BoA executives’ mouths, with not a single vendor rep among them.


6. Effectively Presenting to the Board of Directors

Time: Wednesday, April 9, 10:40 AM
Speakers: Joyce Brocaglia CEO and President, Alta Associates, Inc; Renee Guttmann

ISO, Time Warner; Suzanne Hall, CIO, Washington Nationals Baseball Club; Denise Hucke, Director, Information Security, Merck & Company; Lynn Terwoerds, Global Head of Security Standards and Architecture, Barclays Bank

Looking for real-world advice on how to handle the Board of Directors when they’re screaming for information about company security practices: Listen up during this session and learn how a number of security practitioners at top organizations do it.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters