Speakers bureau – 2014 information security guide – internet2 wiki
If your group or institution would be interested in a FREE presentation utilizing our Information Security Awareness Speakers Bureau for your next meeting or campus event, these are the experts who have expressed interest in providing brief presentations on any of the following topics. Database building Please feel free to contact the speaker(s) of your choice directly. Data recovery top 10 For assistance in contacting a speaker, e-mail the Higher Education Information Security Council at email@example.com.
Note: Please remember that travel expenses may be the responsibility of an institution inviting any out-of-town speaker(s). Database hosting It is up to the institution and speaker(s) to negotiate any travel terms.
Data recovery best Available Speakers
Jon Allen Assistant Vice President & Chief Information Security Officer Baylor University Waco, TX Topics: Security Awareness, General Information Security Issues, Encryption, Policy, PCI-DSS, Forensics Jon_Allen@baylor.edu
Josh Beeman Executive Director of Information Security & University Information Security Officer University of Pennsylvania Philadelphia, PA Topics: General Information Security issues, Awareness and Training, Incident Handling, Building an Information Security Program and Successful Information Security Teams, IT Security Governance, Incident Management, Compliance, Security Policies, Standard Security Frameworks and Regulations (e.g., NIST 800-53, ISO 27000 series, Critical Security Controls, etc.), Risk Assessment programs, Information Security Futures and implications firstname.lastname@example.org Note: This speaker is willing to travel out of town if travel and expenses are paid.
Daniel Bennett Manager of IT Security Pennsylvania College of Technology Williamsport, PA Topics: Security Awareness, General Security Information, Security In-depth, Mobile Device Security, Security Concepts & Design, Malware, Threat Protection email@example.com Note: This speaker is willing to travel within 50 miles each way. Data recovery program He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.
Sol Bermann Privacy Officer and IT Policy, Compliance and Enterprise Continuity Strategist ITS – Information & Infrastructure Assurance University of Michigan Topics: Information privacy; privacy/security education and awareness; Bring-your-own-device; cloud computing privacy/security/compliance; export control (ITAR/EAR) compliance; IT/Security policy firstname.lastname@example.org
Kelley Bogart Senior Information Security Specialist University of Arizona Tucson, AZ Topics: Security Awareness, General Information Security Issues, PCI Compliance, Governance email@example.com Note: This speaker is willing to travel out of town if travel and expenses are paid.
John Bruggeman Director of Information Systems Hebrew Union College – Jewish Institute of Religion Cincinnati, OH Topics: Security Awareness, Information Security Guide, Small School Focus firstname.lastname@example.org Note: This speaker is willing to travel if travel and expenses are paid.
Petr Brym CSO for Student Affairs IT University of California, Berkeley Berkeley, CA Topics: Building a Security Program, Developing October Cyber Security Events and Materials email@example.com
John Christly Chief Information Security Officer/HIPAA Security Officer Nova Southeastern University Davie, FL Topics: Cyber Security Awareness, Cloud Security, Mobile Device Security, Forensics and eDiscovery, Managed Security Solutions, Threat Protection, Internal Auditing, Risk Assessments, Vulnerability Assessments, Penetration Testing, Fraud Auditing, Vendor Management, Compliance strategies (HIPAA, PCI, FERPA, FIPA, GLBA), ISO and NIST. 7 data recovery 94fbr firstname.lastname@example.org Note: This speaker is willing to travel if expenses are covered.
Tammy L. Database languages Clark Chief Information Officer The University of Tampa Tampa, FL Topics: Information Security Governance (ISO 27000), Risk Management, Cloud Security Issues, ERP/EA SaaS selection/implementation (information security considerations); third party oversight, contract and security reviews; data protection; designing a robust security architecture; developing an effective information security program; Compliance strategies (HIPAA, PCI, GLBA, HEOA); gaining executive support for information security programs; translating your message for Higher Ed executives (and more..) email@example.com Note: This speaker is willing to travel if expenses are covered.
Mary Dunker Director, Secure Enterprise Technology Initiatives Virginia Tech Blacksburg, VA Topics: Identity Management and Enterprise Directories, Multi-factor Authentication, Federated Identity Management, InCommon Overview and Shibboleth Considerations, Selecting Appropriate Authentication Credentials, Experiences with PKI and Personal Digital Certificates, HEISC Information Security Guide firstname.lastname@example.org Note: This speaker is willing to travel if expenses are covered or reimbursed.
David Escalante Director of Computer Policy & Security Boston College Chestnut Hill, MA Topics: Security Awareness, General Information Security Issues, Security Policy email@example.com Note: This speaker is willing to travel; reimbursement for expenses related to travel is negotiable.
Greg Hedrick, CISSP Chief Information Security Officer Purdue University West Lafayette, IN Topics: IT Security Tools and Techniques, Incident Response, Roles in Information Security firstname.lastname@example.org Note: This speaker is willing to travel within 50 miles each way. Database ranking He can travel further based on scheduling and if other organizations are willing to pay travel and expenses.
Hendra Hendrawan Senior Information Security Analyst York University Toronto, Ontario, Canada Topics: Security Awareness, General Information Security Issues, PCI DSS, IPS, IDS, Incident Handling email@example.com Note: This speaker is willing to travel if expenses are paid.
Cathy Hubbs, CISSP, CISA, CGEIT Chief Information Security Officer American University Washington, DC Topics: Security Awareness, General Information Security Issues, Getting Policies Sanctioned, Data Stewardship firstname.lastname@example.org
Bob Kalal Director (Retired), Information Technology Policy The Ohio State University Columbus, OH Topics: Security Awareness, General Information Security Issues, Information Technology Security Policy, Compliance and Privacy Issues, Working with Law Enforcement email@example.com Note: This speaker is willing to travel if expenses are reimbursed.
Kathleen R. Data recovery youtube Kimball, MS, CISSP, CISM Senior Information Technology Auditor Audit Department University of Virginia Charlottesville, VA 22903 Topics: Security Awareness, General Information Security Issues firstname.lastname@example.org Note: This speaker is willing to travel. 911 database If out of state, reimbursement for expenses would be required.
Jim Lowe Chief Information Security Officer University of Wisconsin-Madison Madison, WI Topics: General Information Security Issues, PCI compliance, Security Policies, Security Strategy email@example.com
Randy Marchany Chief Information Security Officer VA Tech Blacksburg, VA Topics: Security Awareness, General Information Security Issues, Privacy, Policies, Cloud Computing Security, Internet Threats, Mobile Device Security, Security Operations Centers, Sensitive Data Security, US Cyber Challenge firstname.lastname@example.org Note: This speaker is willing to travel if expenses are covered.
Wyman Miles Chief Information Security Officer Cornell University Ithaca, NY Topics: Security awareness, general information security issues, confidential data discovery and cleanup, building an information security program, encryption email@example.com Note: This speaker is willing to travel if expenses are covered.
Sarah Morrow Health Sciences Center (HSC) Privacy Officer University of New Mexico Albuquerque, NM Topics: General privacy issues firstname.lastname@example.org Note: This speaker is willing to travel if expenses are covered, at least in part.
Todd Plesco Director of Information Security Chapman University Orange, CA Topics: Developing an Information Security Program, Managing Access Controls, Incident Management, Compliance, Awareness & Training, Security Policies, HIPAA, IT Security Governance, Business Continuity email@example.com Note: This speaker is willing to travel if travel/lodging expenses are covered.
Kathleen Roberts Principal iSecure Solutions Dresher, PA Topics: Security Awareness, General Information Security Issues firstname.lastname@example.org Note: This speaker is willing to travel out of town if travel expenses are reimbursed.
Joe St Sauver, Ph.D. Data recovery download Courtesy Associate Professor, Network Startup Resource Center, Univ of Oregon Scientist, Farsight Security, Inc. Data recovery after factory reset Senior Technical Advisor, Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Topics: Spam and Messaging Security, Malware and Bots, Security of the Domain Name System and DNSSEC, IPv6 and Security, BGP Route Injection, Disaster Recovery and Continuity of Operations, Cloud Computing Security, Mobile Device Security, Security Policies, Passwords and Authentication, Data Driven Approaches to Security, Cyber Crime, Cyber War, Cyber Terrorism and Cyber Espionage, SCADA Security, CALEA and Lawful Intercept, Privacy j email@example.com https://www.stsauver.com/joe/ Note: This speaker is willing to consider traveling for speaking events depending on scheduling, provided actual expenses can be covered.
Kent Wada Chief Privacy Officer and Director, Strategic IT Policy UCLA Los Angeles, CA Topics: Privacy as an enabler of academic and intellectual freedom; distinguishing between different forms of privacy, between privacy and information security, and between privacy and compliance; governance models for privacy; privacy and security policy development. Database schema design firstname.lastname@example.org Note: This speaker is willing to travel if expenses are covered.
Ben Woelk Information Security Program Manager Rochester Institute of Technology Rochester, NY Topics: Developing a Security Awareness Program, Digital Self Defense (general audience), Security Policies, Developing Security Training, Introverted Leadership email@example.com Note: This speaker is willing to travel if expenses are covered.
Whether you’re preparing a proposal, designing and delivering your session, deconstructing evaluations, or promoting your work for colleagues and management, the EDUCAUSE Presenter Concierge has a tool to help you every step of the way.
The following tips are suggestions only and they are not intended to change your approach if you already have a proven methodology to prepare for presentations.
• Start early and plan ahead. Database uml Discuss and agree on target dates with the representative of the audience institution. Data recovery ntfs (Suggested lead time is three months)
• Ask the audience institution representative to advertise presentation with sufficient lead time to confirm minimum participation. Database error (Suggested lead time is six weeks)
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) .