Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
|
8:30 a.m. |
Conference Registration and Continental Breakfast |
|
9:00 a.m. |
Welcoming Remarks Ellen Waite-Franzen |
|
9:10 a.m. |
Espionage and Cyber Crime: Life as a Target Dickie George |
|
10:05 a.m. |
Joshua Rosenthol |
|
11:00 a.m. |
Break |
|
11:15 a.m. |
Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education Rodney Petersen |
|
12:10 p.m. |
Lunch |
|
1:40 p.m. |
SOPA, PIPA, and CISPA Dan Kaminsky (via video) |
|
2:00 p.m. |
Cyberethics, Discourse and Campus Community Edward Pittman |
|
3:00 p.m. |
Break |
|
3:20 p.m. |
Building an Effective Cloud Security Program Laura Posey |
|
4:15 p.m. |
Best Practices for Securing Sensitive Information Jonathan Razo |
|
5:10 p.m. |
Wrap-up |
|
5:30 p.m. |
Social Sponsored by Palo Alto Networks |
|
7:00 p.m. |
Free Time for Dinner |
|
8:30 a.m. |
Continental Breakfast |
|
9:00 a.m. |
Mobile Networks: The New Enterprise Network |
|
10:00 a.m. |
Privacy and Technology |
|
11:00 a.m. |
Break |
|
11:15 a.m. |
Academic Dishonesty in Online Coursework |
|
12:30 p.m. |
Lunch |
|
1:15 p.m. |
Conference Wrap-Up and "Five Minutes to Security" Steve Nyman The Conference will conclude at 2:00 p.m. |
Espionage and Cyber Crime: Life as a Target
Dickie George spent 41 years working for the National Security Agency as a cryptographer. As a member of the Intelligence Community, you learn to live as a target. However the world has changed – communications systems, the internet, online life (banking, shopping, social life) – the set of targets, the type of information that is sought, and the adversary have all changed significantly. We'll discuss those changes, how they impact us all, and how today's cyber professionals need to address this threat to protect government, industry, and individuals.
Dickie George
The Websense Security Labs team is responsible for scanning over 5 billion pieces of content a day in order to understand and communicate threats to our customers and partners to help protect them. This session looks at the trends of malicious attacks over the last year, how they have changed and what is still the same. The data and findings from this presentation are based on the Websense 2012 Threat Report, created by Websense Security Labs.
Joshua Rosenthol
Government Initiatives and their Impact on Identity, Privacy, and Security in Higher Education
The Cyberspace Policy Review initiated by President Obama in his first few weeks in office spawned many new initiatives in the areas of identity management, privacy, and security. Several of the recommendations resulted in concrete government actions in the form of strategies, legislative proposals, and executive directives. Despite all the attention, it has been a very difficult journey with few results to show for the effort. The impact of cyber policy on higher education has been minimal in the last four years, but the potential for additional change or progress could very well depend on the outcome of the national election. This presentation will provide a policy and regulatory update from Washington, D.C., focusing on the implications for colleges and universities.
Rodney Petersen
Cyberethics, Discourse and Campus Community
The advent of social media and expansive internet has impacted the ways in which students, particularly, engage one another. When it comes to engagement of ideological, identity expression and other forms of discourse, the the stakes run high. This presentation summarizes the steps that Vassar College has taken to consider cyberethics and apply a set of community standards. The adopted statement, which draws upon existing computer regulations and principles of self and community responsibility, was drafted by a committee of administrators, faculty and students for approval by the Committee on College Life. The presentation will also highlight campus community responses to cyber messages and behaviors that threaten or endangers individuals or the campus environment.
Edward Pittman
Building an Effective Cloud Security Program: Leveraging the guidance of Cloud Security Alliance Governance Risk & Compliance Stack
Outsourcing critical business functions into the Cloud can result in challenges of maintaining assurance and control over legal and regulatory obligations for data management and protection. Achieving the governance, risk management and compliance goals to gain this assurance requires appropriate assessment criteria, relevant control objectives and timely access to necessary supporting data. This session will provide guidance through the process for establishing an effective cloud security program leveraging the Cloud Security Alliance (CSA) Governance Risk & Compliance (GRC) Stack.
Laura Posey
Best Practices for Securing Sensitive Information
Organizations are being challenged implementing effective policies and security controls to protect their most sensitive and confidential information both internally and externally. Challenges such as classifying and restricting information appropriately, emergence of collaborative technology such as social networks, ineffective policies, among other factors, amplifies this problem. This presentation will highlight best practices that organizations need to consider when implementing a framework for the identification of sensitive information, including management sponsorship and ownership, baselines, and security controls.
Jonathan Razo
Mobile Networks: The New Enterprise Network
Mobile traffic grew by 113% in 2011, more than doubling for the fourth consecutive year, according to Cisco's recent Global Mobile Data Traffic Forecast Update. The mobile network of today is the enterprise network of yesterday, and as mobile traffic continues to evolve and grow rapidly, so does the attack and threat landscape. The increasing chaos on mobile networks creates additional challenges when it comes to network security.
As mobile traffic grows, understanding these mobile networks and their implications on lawful intercept and threat detection solutions is no longer an option, but a requirement of enterprise and IT security staff.
This session will present the "Rosetta Stone" version of mobile networks—introducing attendees to the components and protocols that comprise mobile networks; how they relate to the traditional infrastructure; and the potential threats to network security, including BYOD, mobile malware, application stores, 3G to Wi-Fi handoffs, and emerging threats over bearer channels. By the end of the session, attendees will understand how mobile networks work and their impact on lawful intercept and threat detection solutions.
Dennis Cox
Academic Dishonesty in Online Coursework
How do we establish the identity of students who are registering for online courses? What prevents someone from paying an imposter to do all the work in a course and then later benefit from the degree or certification resulting from the imposter's submissions? How do we prevent this kind of imposture in online courses? What prevents the same phenomenon from occurring in brick-and-mortar schools?
This workshop introduces the issues and some of the technical solutions that have been proposed and then opens the period for vigorous discussion among participants.
M.E. Kabay