In 2012 the world was supposed to end, then were faced with falling off a financial cliff, and all the while the computer security community dealt with event after event. While we have always been told Don't ask questions that you can't live with the answers to, we need to ask After 2012 what could be next? With this in mind 2013 is already lining up to be more eventful than 2012. From a security perspective 2012 represented a massive amount of change and realization. We saw companies expose their intellectual property and corporate assets to the cloud and even allow employees to use their own devices. We had the inadequacy of digitally signatures exploited and then publicized. Even the day to day events jumped on the connectivite bandwagon. But somehow we survived or did we? Now in 2013 we must react to the 2012 changes and compensate for the realizations. We must review and adjust our strategies or be faced with more cataclysmic events. This presentation will get us thinking about changes - what they were, what they mean, what can we do to mitigate their negative impact, and what can we do better in the future.
Michael F. Angelo CRISC CISSP - Chief Security Architect / DE, NetIQ Corporation
Michael is currently responsible for the definition of the secure development process and certifications at NetIQ. Michael has been active in Computer Security for over 30 years. During this tenure he has designed, developed, implemented and deployed security products and architectures in multi-national corporate environments. Michael is also a prolific inventor with 52 granted US patents in the area of security. His work has included participation, driving, and creating security standards as well as driving corporate policy, national and international legislation, and multi-national regulatory issues. Michael was involved in the original transition of encryption from ITAR to the US Commerce Department. Since 1999 he has been on the Bureau of Industry and Security (BIS) Information Systems Technical Advisory Committee (ISTAC). There he represents industry in the definition and modification of controls that involve computer technology and explicitly Computer Security. Michael has participated on the NIST board of Assessment and in various National Research Council (NRC) / National Academy of Sciences (NAS ) studies and publications. Michael is also a former Sigma Xi distinguished lecturer, an inventor of the year for the City of Houston, and an Admiral in the Texas Navy.
- 11:15 a.m. Registration / Networking
- 11:30 a.m. Luncheon / Networking
- 11:45 a.m. Chapter Business Meeting
- 12:00 noon Keynote Presentation
- 1:00 p.m. Adjourn Luncheon
ISSA South Texas Purchase/refund policy: No Refunds
When & Where
South Texas ISSA
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners.
South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.