ISSA Central Plains Chapter
May 7th,  2010

 

Central Plains Chapter Meeting:

"CBK Domain 3 Roundtable: Business Continuity & DR Planning", Ron Shuck

 

Please join us for a discussion on CBK Domain 3: Business Continuity & DR Planning. Ron has created a presentation to help guide the discussion.

"Hardware Encryption", Frances LeBoutillier Rivoire, Wave Systems

 

Frances has worked in enterprise sales of security software and related products for information systems for many years. Her enterprise sales career has spanned expert systems, web site security, software encryption, anti-spam, secure IM, asset management and many other technologies. Helping large corporations such as State Farm, Principal Financial, Archer Daniels Midland and General Motors go through the process of learning how and why to leverage new, appropriate, information systems approaches and tools has been her major focus. Today she will assist us all in gaining a high level understanding of the reasons that encryption technology has evolved from software to hardware. She will explain what data protection issues enterprises are addressing with hardware encryption, how and why. At the end of the presentation all participants will have the tools to detrmine if hardware encryption can address a major data risk concern for any organization, large or small. A Senior Engineer frm Wave Systems, Keith Knostman will be on hand to address technical topics as needed.

 

Frances will be discussing the benefits of hardware encryption over software encryption:


Today's presentation will include an interactive session wherein all can consider the risks involved with data loss and attach values to it. We will share concerns regarding software encryption and learn how hardware encryption eliminates the majority of those concerns. Hardware encryption also brings additional benefits to enterprises who can start to migrate to it. However, a complete data protection solution requires more than just encryption. Policy-based access controls, centralized administration and proof of compliance are all "must haves." An organization needs to be able to centrally provision security polices across the enterprise, limit access of encrypted information to only authorized individuals, remotely reset user passwords and perhaps, most importantly, prove whether or not a laptop's data was encrypted at the time it went missing. Our local ISSA Chapter will gather this information during today's session.

 

 

 



    

    

  

The Information Systems Security Association (ISSA)® is a not-for-profit international organization of information security professionals and practitioners.  It provides education forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. We hope the ISSA will provide a chance to interface with other IT professionals and further your awareness of security practices and technologies.

 

This meeting is open to the general public with no expectations of membership.


Date:        Friday, May 7th, 2010
Location: Rockwell Public Library

                5939 E 9th ST N, Wichita, Ks 67208
Time:        1:00 pm until 3:00 pm