Security

now browsing by tag

 
 

Current Trends in Computer Security – August 2013 Monthly Meeting

Join us at McCormick & Schmick’s!
Current Trends in Computer Security
The world has experienced quite a spectrum of computer security attacks in the last couple years and they have changed in interesting ways. While 99.9% of investigations deal with IP theft on some international basis, the issues very rarely make it to a courtroom. Understanding the technical approaches to rapid response, remediation and working with the business on damage assessments are key to helping clients deal with these issues since many of these incidents never see the inside of a courtroom.

A panel of experts, including Nick Hoffman, an incident responder at GE, Craig Hoffman, partner at Baker Hostetler, and Jon Garon, Director of NKU Chase Law + Informatics Institute, will discuss recent computer security attacks, how they have recently evolved, and how the immediate and long term responses to these attacks have developed to address the ever-changing threats. The panel will also address how attorneys can assist clients to prevent against an attack, and what to do when they are the victim of an attack.

To register and more details:
Click here

Remember: New location this month: McCormick & Schmick’s

Share

6th Annual NKU College of Applied Informatics Security Symposium

6th Annual NKU College of Applied Informatics
Security Symposium

sponsored in part by

CincyIP

October 12, 2012
8:15am– 4:30pm
(Reception: 4:30pm – 5:30pm)

Location: NKU METS Center

The 2012 Security Symposium is a FREE one-day event, which focuses on IT security challenges, best practices, and professional discussions. This annual symposium brings together IT professionals for engaging talks, training, and live demos of cutting edge security products. For additional information and a detailed agenda, please visit http://cai.nku.edu/security2012.html.

The Security Symposium is organized into five tracks:

• Information Security Governance
This informational track focuses on the understanding and implementation of management policy, procedures, IT audits, continuity planning, and security awareness and training.

• Software Security
This track incorporates knowledge about how identity theft is being fought and information integrity is being secured by industry ingenuity.

• Mobile & Computer Forensics
Learn the latest methods and tools to process and understand digital evidence.

• Current Topics in Security
Explore security topics focused around cloud computing, virtualization, mobile, and much more.

• Legal Issues in Privacy and Security
This year marks the first year with an additional legal track, enabling the legal professionals to engage with security professionals and those involved with implementation of software security. The legal track will include presentations by Curtis Scribner (The Procter & Gamble Company), Jon Garon (NKU Chase College of Law), Craig Hoffman, and Jack Harrison (NKU Chase College of Law).

The 2012 Security Symposium, for the 6th year in a row, will bring together security professionals for a multi-track conference focused on the various aspects of security in information technology today. The symposium will focus on IT security challenges, best practices, and professional discussions, and will include a legal track focusing on the intersection of law and security. The symposium is presented by the Center for Applied Informatics, NKU Chase Law & Informatics Institute and CincyIP. Four hours of Kentucky, Ohio and Indiana CLE credits are anticipated. This conference is free, but space is limited. Register now!
The Security Symposium is organized into five tracks:
• Information Security Governance
This informational track focuses on the understanding and implementation of management policy, procedures, IT audits, continuity planning, and security awareness and training.
• Software Security
This track incorporates knowledge about how identity theft is being fought and information integrity is being secured by industry ingenuity.
• Mobile & Computer Forensics
Learn the latest methods and tools to process and understand digital evidence.
• Current Topics in Security
Explore security topics focused around cloud computing, virtualization, mobile, and much more.
• Legal Issues in Privacy and Security
This year marks the first year with an additional legal track, enabling the legal professionals to engage with security professionals and those involved with implementation of software security.

Legal Track Presenters:
• Prof. Jon M. Garon, director of the NKU Chase Law + Informatics Institute
• Prof. Jack Harrison, NKU Chase College of Law
• Craig Hoffman, Esq., partner of Baker Hostetler
• Curtis Scribner, an attorney in the Global Privacy and Digital Legal group at Procter & Gamble

Agenda

7:30 a.m. – 8:00 a.m. Breakfast
8:15 a.m. – 8:30 a.m. Welcome Address
8:30 a.m. – 9:30 a.m. General Session I
9:30 a.m. – 9:40 a.m. Break
9:40 a.m. – 10:40 a.m. LEGAL TRACK: Curtis Scribner on “Issues in Data Privacy”
10:40am – 11:10am Refreshments and Networking
11:10 a.m. – 12:10 p.m. LEGAL TRACK: Prof. Jon M. Garon on “Navigating Through the Cloud – Legal and Regulatory Management for Software as a Service”
12:10pm – 12:45pm Lunch
12:45pm – 1:45pm General Session II
1:45pm – 2:00pm Break
2:00 p.m. – 3:00 p.m. LEGAL TRACK: Craig Hoffman, Esq. on “The Legal Implications of Data Breach”
3:00 p.m. – 3:30 p.m. Refreshments and Networking
3:30 p.m. – 4:30 p.m. LEGAL TRACK: Prof. Jack Harrison on “E-Discovery – Legal Issues, Strategies, and Management”
4:30pm – 5:30pm Reception

About the NKU Chase Law + Informatics Institute
The NKU Chase Law + Informatics Institute provides critical interdisciplinary research regarding law, regulation and industry practice as it is applied across complex information systems, emerging technology, and all areas of law. While not limited to any legal field, the NKU Chase Law + Informatics Institute emphasizes intellectual property law, privacy, business and securities laws, international laws, and evidentiary rules because the creation, acquisition, aggregation, security, manipulation, and exploitation of data have the largest legal and societal consequences in these fields.

TO REGISTER: http://security2012.eventbrite.com/?ref=eweb

Share