the 2004 information security conference & exhibition€¦ · security 5000 appliances, the...

8
The ISSA South Florida Chapter Proudly Presents 2004 Program Guide The 2004 Information Security Conference & Exhibition June 18, 2004 7:30am – 7pm THE WESTIN DIPLOMAT RESORT AND SPA

Upload: others

Post on 18-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

The ISSA South Florida Chapter Proudly Presents

2004 Program Guide

The 2004 Information Security Conference & Exhibition

June 18, 2004 7:30am – 7pmTHE WESTIN DIPLOMAT RESORT AND SPA

Page 2: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

Program AgendaGeneral Session (All Attendees)7:30AM Breakfast & Exhibition Opens8:30AM Morning Keynote- Privacy & Fair Trade on the Internet (see below)

9:30AM Exhibits & Networking

General Session (All Attendees)3:45PM Exhibits & Networking4:30PM SPAM Debate (page 1)

5:45PM Raffle Drawing6:00PM Cocktail Reception & Exhibits7:00PM Program Concludes

EXECUTIVE TRACK (pages 3, 4 & 5)

10:30AM Security Standards You Need To Know

11:30AM Barbarians Inside the Gate: New Strategies for Facing Insider Risk within the Context of the Pragmatic Approach

12:30PM Lunch & Keynotes (page 1)1:45PM Security Threat Landscape

2:45PM Who Are You and Who Wants to Know? Privacy, Identity Management and Authentication Considerations

TECHNICAL TRACK (pages 2 & 3)

10:30AM Live Web Hacking Demo & Methods To Combat Them

11:30AM Security Best Practices Applied in Firewalls

12:30PM Lunch & Keynotes (page 1)

1:45PM Florida HoneyNet: Bad News from the Dark Side

2:45PM Wireless LAN Hack Attacks Exposed!

www.sfissa.org

Morning Keynote Privacy & Fair Trade on the Internet

Orson Swindle, FTC Commissioner Orson is a true champion for the privacy and fair trade practice causes. He will discuss a wide range of currenttopics on privacy, fair trade practices and how the government is here to help us!

Orson Swindle was sworn in as a Republican Commissioner on the Federal Trade CommissionDecember 18, 1997. Commissioner Swindle was appointed in December, 2001 as head of the

United States Delegation to the Organization for Economic Cooperation and Development(OECD) Experts Group to review the 1992 OECD Guidelines for the Security of InformationSystems. Mr. Swindle has had a distinguished military career and served in the ReaganAdministration from 1981 to 1989 directing financial assistance programs to economicallydistressed rural and municipal areas of the country. As Assistant Secretary of Commerce

for Development he managed the Department of Commerce's national economicdevelopment efforts directing seven offices across the countr y. As a Marine aviator serving

in South Vietnam on November 11,1966, Mr. Swindle was shot down from the skies over NorthVietnam while flying his 205th and last combat mission. He was captured by the North Vietnamese and heldPrisoner of War in Hanoi for the next six years and four months. On March 4, 1973, Mr. Swindle was releasedfrom captivity. Mr. Swindle retired from the U.S. Marine Corps in 1979 with the rank of Lieutenant Colonel. His20 military decorations for valor in combat include two Silver Stars, two Bronze Stars, and two Purple Hearts.Mr. Swindle earned a Bachelor of Science degree in Industrial Management from Georgia Tech in 1959 and aMaster of Business Administration from Florida State University in 1975. He was born in Thomasville, Georgia,on March 8, 1937, and grew up in Camilla, Georgia. He and his wife, Angie, live in Alexandria, Virginia.

The 2004 Information Security Conference & Exhibition

Page 3: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

Lunch with Keynote Panel Can the Good Guys Win?

Deep Packet Inspection and beyond, integrated appliances, ASIC based security, IDS vs. IPS, intuitive productmanagement and more will be discussed by this group of Veterans from the Top Security Venders. Bringyour toughest questions and concerns and let our panel of experts help explain how the good guys can stayfive steps ahead!

Kin Mitra, Director Southern Region, CheckPoint Software Technologies, Inc.Kin joined Check Point Software Technologies in January 1996 and is the Director of their Southern Region. Inthis role, Kin and the Southern Region team are responsible for Sales, Marketing, and Engineering support forthe Southern and Mid-Atlantic United States, Bermuda, and the Caribbean Islands. Kin is the interfacebetween the field sales and engineering team, their customers and channels with corporate headquarters.Kin also has responsibility for federal sales, which has grown tremendously in recent years. By workingclosely with the United States government, Kin is involved in defining product strategy for Department ofDefense, Homeland Security, and other key Federal divisions. Mr. Mitra has over 24 years experience in thenetworking and security industr y.

Richard Hanke, Senior Director of Product Management, FortinetRichard has over 20 years of experience in telecommunications, storage, and security. Richard has served asdirector of marketing with NetScreen and Nevis Networks. Richard also served in marketing and operatingroles with Kubota and held engineering roles at Sprint. Richard has a B.S. in Electrical Engineering from thePurdue University, and an MBA from Golden Gate University

William Aguilar. Senior Technical Product Manager, SymantecWilliam drives the research of innovative technologies for Symantec's integrated security gateway solutions.For the last four years, William has been instrumental in introducing appliances and solid-state securitygateways to Symantec's portfolio. He was a member of the team that introduced the Symantec GatewaySecurity 5000 appliances, the first fully integrated, multi-function, security appliance in the market to addressblended threats at the network and application levels. William has been a speaker at several Symantecevents including SecureXchange 2003, SecureXChange 2002, SecureXchange 2002, and external events suchas the 2002 HIPPA Conference. William has over 11 years of experience in application development,networking design,and security design. He graduated with honors from Florida Institute of Technology witha Bachelor's of Science in Computer Engineering.

The 2004 Information Security Conference & Exhibition 1

www.sfissa.org

SPAM: A Debate at the Diplomat!

Be ready to interact with our distinguished panel of debaters. Learn how SPAM works, what can be doneabout it, who is making money, how much is it costing us and the legal and technical changes in thewind. Hear from some of the World’s Top Opt-In Marketers, from corporate and private SPAM recipients,top attorneys in the field, and a perspective from FTC Commissioner Orson Swindle, our morningKeynote, including a discussion regarding the CanSpam Act.

Mr. "X", Email Marketing ExpertNoel Castillo, Email Marketing ExpertMark E. Felstein, Legal ExpertBradley Gross, Legal Expert of Becker and Polikoff Frank Darden,CTO of Mission Critical SystemsOrson Swindle, FTC Commissioner

Your Spam Debate Host: Pete Nicoletti – ISSA Secretary, Membership ChairPete has 20 years of successful and progressive responsibility in the Marketing, Sales, Development, andthe Implementation of all types of Information Technologies. His experience ranges from running the

Page 4: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

SPAM: A Debate at the Diplomat! continued

worlds first Broadband Wireless Internet Service Provider to implementing the largest VoIP based callcenter in the US, CTO for a large internet travel company and now running a successful Managed NetworkSecurity firm. He has won several awards, most notable the "Microsoft Industry Solutions" award for themost Innovative and Integrated Contact Management Deployment in 2000 and recently the SouthBroward Business Journal's "Best New Technology" Award for his managed security product. Pete has anumber of advanced technical certifications, including the designation of Certified Information SystemsSecurity Professional (CISSP). He is a Board Member of FBI's InfraGuard, ISSA, the Internet Coast, TheHoneynet Alliance, the Information Systems Audit and Control Association and the IEEE. Pete's passion fortechnology is contagious and his insights to the future of technology are compelling and interesting. PeteNicoletti resides in Lauderdale By The Sea with his three children and his wife Jennifer, a Strategic AccountsRepresentative with Hewlett-Packard.

Technical Track10:30 am- Live Web Hacking Demo and New Methods to Combat Them!You will learn about the pros and cons of various approaches to web server and application protection:Scanning and vulnerability assessment, host based intrusion protection, server patching, better qualityassurance, application protection systems, etc.When you want to minimize the effect of disasters, it's essential to have a plan,a protocol to turn to whenviruses attack, when denial-of-service, hardware failure, sabotage, and acts of nature affect your business.It's been estimated that three-fourths of today's successful system hacks are perpetrated not via networksecurity flaws, but by entering directly through the "front door" - exploiting vulnerabilities in customer-facing web applications. Firewalls and IDS will not stop such attacks because hackers using the Webapplication layer are not seen as intruders. After completing this workshop, you will be fully versed in theunderlying methodology that allows hackers to exploit web-based applications.

Brian Christian, Senior Security Engineer, SPI DynamicsBrian has 11 years of experience in high tech positions within the information technology industry withthe last 8 years of his career focused exclusively in Internet security. His successful career includes keysecurity positions at Lucent Technologies, Security First Technologies and ISS. Brian's current role with SPIDynamics provides an ideal venue for his leadership and visionary capabilities. Brian has spoken on thetopic of web applic ation security at numerous conferences including SANS 2004, ISACA Audit Conference2004, ISSA and ISACA Chapter Meetings, InfoSecurity 2003 and CSI 2003

Dean Webber, Chief Architect, TerosDean is a security expert with more than 29 years of information and physical security experience. He is afrequent speaker at information security events such as InfoWorld, InfraGard, Secret Service SecurityRoundtable, ISSA, and various focus engagements.

11:30 am- Security Best Practices Applied in FirewallsIn this session you will learn about the following approaches to Security Management:How to keep Information Security Simple, security through bit-masking, The importance of namingconventions, maintaining your security logic, adding audit controls to firewalls.

Andrew Reese BSCS,CISM,CISSP, SCSP, SCSEx4,STAx4,SPSx9, CCSI, CCSE, CCSA,CME, CNE, MCP,Director of National Security Services, Dyntek,Inc.Andrew is an experienced and Certified Information Security Manager, nationally recognized securityexpert with over 26 years of hands-on technical experience. He maintains a large number of security

The 2004 Information Security Conference & Exhibition 2

www.sfissa.org

Page 5: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

industry certifications, which demonstrate high technical proficiency and managerial knowledge. He hasextensive industry experience in providing professional security consulting services. Andrew hasimplemented and configured literally hundreds of firewalls, content analysis systems, network and hostintrusion detection/prevention systems, and log analysis systems. He has performed many detailed securityassessments and audits. Andrew has authored and developed many structured corporate informationsecurity policies that adhere to industry best practice, laws, and regulations, such as: HIPAA, GLB, S-OX,GASSP, ISO-17799, and ISO-13335. Has chaired technical advisory committees to Raptor Systems and A xentTechnologies. Andrew has participated in multiple Gartner Group (Small Business Vision) events as aSecurity Panelist and Service Industry Expert.

1:45 pm- Florida HoneyNet: Bad News from the Dark SideThere have been a lot of advances lately in the area of honeynets. They are being used in conjunction withcompanies’ existing security infrastructure to increase security and the knowledge of the threat. One of themain areas is the advancement in honeynet tools. This presentation will be a discussion of the latest toolsavailable to the InfoSec community to make the use of honeynets more feasible and effective. Thepresentation will also include a live view of an active honeynet and the types of information that can begathered.

Jeff Dell, Florida HoneyNet ProjectJeff is founder of Activeworx Security, Inc., a security software and consulting company. Mr. Dell specializesin enterprise security design, security audit, intrusion detection systems and honeynets. Mr. Dell has overtwelve years of experience in networking and security including positions as Chief Information SecurityOfficer at Seisint, Inc. and Director of Information Security at TelePlace, Inc. On his free time Mr. Delldevelops free windows security software, including IDS Policy Manager and Honeynet Security Console. Mr.Dell also sits on the SANS GCIA advisory board, is a SANS Local Mentor Instructor, a member of the FloridaHoneynet Project and a member of the Honeynet Research Alliance.

2:45 pm- Wireless LAN Hack Attacks Exposed!In this lively presentation the top methods hackers, crackers, industrial spies, and terrorists are using to gainunauthorized access to private networks and data will be clearly detailed with real world examples. Theaudience will learn the many vulnerabilities and possibilities for exploitation that Wireless LAN's present sothat appropriate countermeasures can be implemented.

Gerry McCarthy,Titanium NetworksGerry has over twenty-two years of computer operation and systems security expertise garnered via adiverse background of military, government contractor, Software developer, computer equipmentmanufacture, small business, and Enterprise level commercial positions of increasing responsibility.Provided consulting services to several dozen fortune 100 companies and over two hundred fortune 1000companies during this period. A popular speaker and instructor at the local and national conference level,Gerry currently concentrates his talents in the areas of Wi-Fi security, signals analysis, penetration testing,and wireless network design.

Executive Track10:30 am- Security Standards That You Need to Know!You will learn about "Best Practices" and Standards for achieving Regulatory compliance: Including a reviewof ISO 17799, its applic ation in the information security and a practical approach to developing,implementing and maintaining information security policies to ensure that you meet regulatoryrequirements such as GLBA, HIPAA, and Sarbanes-Oxle y.

Suzana Keller, Manager, IRM Practice, KPMGSuzana is a Manager in KPMG’s Atlanta IRM practice. She has over six years experience in informationtechnology with an emphasis in information security and IT auditing. She has developed informationsecurity policies and standards, and built the information security organization for various Fortune 1000clients. She has also per formed numerous ISO 17799 Gap Analyses and developed remediation plans forclients across different industries. She has served a variety of Fortune 500 clients in the financial services,energy/utilities, insurance, manufacturing, technology and human resource industries. She has served asProject Lead for Fortune 100 High Tech Company financial systems review, including multiple applications

The 2004 Information Security Conference & Exhibition 3

Page 6: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

such as SAP, Hyperion,Integr-T, Peoplesoft, and internally developed applications. Suzana is a CertifiedInformation Systems Security Professional (CISSP).

Seth Judd, Information Security Specialist, CiscoSeth is an information security specialist for Cisco systems, Inc.,and an alumnus of the Virginia MilitaryInstitute (U.S. Army – 82nd Airborne). Prior to joining Cisco Systems, Inc., he served as a global informationsecurity specialist for The Coca-Cola Company (1992-1999), as an information security specialist for two (2)M anaged Security Services (MSS) companies (1999-2000), and the Director of Information Security P racticefor Expanets, Inc. (2000-2003). Mr. J udd has been a member of the Georgia Strategic L ocal ImplementationProcess (GSLIP) since its inception, contributing to the Education and Awareness Committee and chairingthe Security Committee (HIPAA). He is also a leader in InfraGard (Atlanta Chapter Secretary – ’04), aninformation-sharing group comprised of the FBI and U.S. corporations working together to secure thenation’s infrastructure. He is an active member of the StopID Theft Network, an information-sharing groupcomprised of State and local law enforcement agencies and corporate America working together toeducate companies and consumers on identity theft.Mr. Judd has addressed numerous working groupsand audiences on topics covered by HIPAA, GLBA and Sarbanes-Oxley including audit trails, policy andproc edure creation, privacy and information security practices, disaster rec overy pr ograms and generalconnectivity issues.

11:30 am- Barbarians Inside the Gate: New Strategies for Facing Insider Risk withinthe Context of the Pragmatic ApproachYou will learn why the cost benefit of a threat management technique centered on reducing the threatfrom a trusted or semi-trusted user is not quantifiable. In layman's terms -- security managers, who areincreasingly driven by ROI requirements, won't pay for something they can't identify a direct and tangiblebenefit from. Even if implemented successfully, the effectiveness of these threat management techniquesdegrade over time. Most organizations can't afford or don't understand how to continually enforce theseactivities on an ongoing basis. Other issues we’ll touch upon: Risk in our extended networks – Where doesyour risk level stop and your vendors’ or ASP’s begin; Risk in our ERP application systems; Quantifying risksto maximizing resource allocation; When should you reassess you risk levels; Are their risks that you aremissing and how to identify them; Enterprise risk as it relates to the organization and our InformationSystems.

Frank W. Lyons CISA,CNDE, Cyber Audit, Security and Control SpecialistFrank W. Lyons is President of Entellus Technology Group, Inc., a management consulting firm specializing inthe audit, security, reliability, tuning, and management of networked computer systems. Mr. Lyons hasextensive experience in performing consulting services to fortune 500 companies in the development andimplementation of proven methodologies. Mr. Lyons has presented 100's of security seminars to thousandsof attendees over the last 20 years. As a recognized leader in the field, Mr. Lyons has been involved ininformation systems, specifically data security and auditing of networked database information solutions. Inaddition, Mr. Lyons co-authored the DB2 Expert Auditor product and has published several articles on thesecurity and control of Client/Server technology including "The Top Ten Unix Risk" for Datapro, "How toPerform a Penetration Security Audit" InfoSecurity News, "Audit and Control of Client/Server", McGraw Hilland "Unix Security" for Auerbach. Mr. Lyons has a stellar list of clients including Dow Jones (Firewall securityreview), IBM (Security software for the AIX operating system), Shearson Leman, U.S. Army's EuropeanInformation Warfare Cen ter, First Boston, CIGNA Healthcare, Citicorp, Northrop G rumman, Federal Reser ve,B lue Shield, Sun Bank, NASA and AT&T. Mr. Lyons is a Certified Information Systems Auditor (CISA) and aCertified Network Diagnostic Engineer (CNDE). Frank has a Bachelor of Science in Computer Science fromOhio State University and an MBA from the University of Dayton.

Bob Norberg, Worldwide Director of Product Marketing, Consul Risk ManagementBob Norberg is the Director of Product Marketing for Consul, worldwide. He is responsible for the overallproduct marketing management activity for Consul's core product lines for both the mainframe and opensystem environments. Prior to Consul, Mr. Norberg spent eight years at Visual Networks, where he was theDirector of Product Management/Product Marketing. While at Visual Networks, Mr. Norberg successfullyled the product management, product marketing, and "Go to Market" activity for Visual's partnership, jointdevelopment, and OEM arrangement with Cisco Systems;enabling Visual to greatly expand the marketopportunity for its pr oducts. Before Visual, Bob had product management and product marketing positionsat TTC (now Acterna) and Cable and Wireless. During his career, Mr. Norberg has presented frequently atindustry conferences and tradeshows including: Networld+Interop, RSA Conference and multiple ISSA andISACA events. Mr. Norberg is the holder of US Patent number 5,867,483:"Method and Apparatus forMeasurement of Peak Throughput in Packetized Data Networks". He has a BSEE from Worcester PolytechnicInstitute and a MBA from Duke University.

The 2004 Information Security Conference & Exhibition 4

Page 7: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

1:45 pm- Se c u ri ty Th re at La n d s ca peThe Inte rnet is a noisy and unsafe neighbo rh ood. While yo u ' re out planning co s t - e f fe ct i ve securi ty for yo u rvaluable dat a , the hackers and script kiddies are doggedly trying to stay one step ahead of yo u. In most ca s e s,t h ey ' re succe e d i n g. Add to the mix: cy ber te rro ri s m ,h a c k t i v i s m ,v i ruses and wo rm s, m i s co n f i g u rations andhuman erro r. M r. Gray will discuss Inte rnet thre ats and vulnera b i l i t i e s, best pra ct i ces to secure info rm at i o n , t h eRoad to Se c u ri ty and training strategies to make sure your people are not the weak link.1 .I nte rnet Th re ats and Vu l n e rabilities - Ha c ke r s, I n s i d e r s, S c ript Ki d d i e s, Ha c k t i v i s m , Cy ber Te rro ri s m .2 . Best Pra ct i ces to Se c u re Info rm ation - Pe ri m e te r, I nte rn a l , Po l i c i e s, Pe o p l e.3 . The Road to Se c u ri ty - Cu l t u re, B u y - I n , Kn ow thy En e my, Pre p a re for the Wo r s t.

Pat rick Grey, Di re cto r, X - Fo rce, I S SPat rick Gray is the Di re ctor of the X-Fo rce National Emerg e n cy Re s ponse Team for Inte rnet Se c u ri ty Sys te m s,I n c. ( I S S ) . With over twe nty years of serv i ce with the Fe d e ral Bu reau of Inve s t i g at i o n , Pat rick is re s ponsible fo rteams re s ponding to netwo rk - re l ated emergencies be they exte rnal or inte rn a l . Upon his re t i re m e nt from theFBI in Nove m ber 2001 , he joined Inte rnet Se c u ri ty Sys tems and cre ated the X-Fo rce Inte rnet Th re at Inte l l i g e n ceCe nter until his promotion to his curre nt po s i t i o n . In both po s i t i o n s, he has first-hand kn owledge of theh a c king co m m u n i ty, its aims and method o l ogies as they attack gove rn m e nt, e co m m e rce, e n e rgy and financiale ntities re l e nt l e s s l y. With re s pe ct to Emerg e n cy Re s ponse Teams he is awa re of curre nt vulnerabilities that areex p l o i ted by hackers and insiders and why the targ e ted sys tems are susceptible to at t a c k s. Pat rick is am e m ber of the Am e ri can College of Fo rensic Examiners Inte rn ational and maintains a CHS Level IIIce rt i f i cat i o n ; is a member of the As s oc i ation of Ce rtified Fraud Examiners; the Info rm ation Sys tems Audit andCo nt rol As s oc i at i o n ; I n f ra Ga rd At l a nt a ; the At l a nta Ch a p ter of the Info rm ation Sys tems Se c u ri ty As s oc i at i o n ,and the Info rm ation Sys tems Fo rensic As s oc i at i o n . Pat rick is a fo rmer Ma rine having served in Vi e t n a m .

2:45 pm- Who Are You and Who Wa nts to Kn ow? Pri va cy, I d e nt i ty Ma n a g e m e nt andAu t h e nt i cation Co n s i d e rat i o n sAu t h e nt i cation te c h n o l ogies have been poised to take off for seve ral ye a r s, but they have yet to live up to theirp ro m i s e. Some have blamed their failure on the co m p l ex i ty of the law as well as te c h n o l og i cal shortco m i n g s.Others at t ri b u te the slow rate of adoption to faulty business mod e l s. Our panelists will assess the need for newf ra m e wo rks to address the authent i cation and pri va cy needs of the Inte rnet co m m u n i ty.Understanding your org a n i z ations needs is the first step down the road to the ri g ht authent i cation solution.With so much to kn ow about authent i cat i o n , it's easy to feel lost. He re is what you will learn :How authent i cation acts as a cat a l yst for co m pe t i t i ve adva nt a g e. How to choose the ri g ht authent i cat i o nsolution for your env i ro n m e nt . How to justify the purchase of a strong authent i cation solution. How toc h oose the ri g ht authent i cation ve n d o r.

Ma rk Wh i te s e l l , Sr. Sys tems En g i n e e r, RSA Se c u ri tyMa rk has been with RSA for the past three ye a r s. He holds an MCSE+I, C I S S P, and CSP. He has been in IT fo rover 13 years and has designed softwa re and securi ty arc h i te ct u res for gove rn m e nts and large co rpo rat i o n sa round the wo rl d.

Steven B. Ad l e r, Prog ram Di re ctor of IBM’s Ente rp rise Pri va cy Solutions Steven is the Prog ram Di re ctor of IBM’s Ente rp rise Pri va cy So l u t i o n s, and is re s ponsible for leading IBM’s

p ri va cy solutions strate gy. He is the inve ntor of the IBM Ente rp rise Pri va cy Arc h i te ct u re leader of the ope ns o u rce Ente rp rise Pri va cy Au t h o ri z ation Language standard i z ation effo rt at the W 3 C , Ch a i rman of the IBMPri va cy Ma n a g e m e nt Adv i s o ry Co u n c i l , and is a re cog n i zed ex pe rt on pri va cy management and te c h n o l ogysolutions wo rl dw i d e.

El i z a beth Bate s, Pre s i d e nt, Co n s u l t rex ,I n c.El i z a beth is Vi ce Pre s i d e nt and Prog ram Chair for the ISSA South Fl o rida chapte r, and is wo rking on her Ph Dthesis in pri va cy and securi ty re l ated issues. Her re s e a rch inte rests include PETS (pri va cy enhancingte c h n o l og i e s ) , P I TS (p ri va c y inva s i ve te c h n o l og i e s ) , RFID te c h n o l ogy, and national and inte rn ational pri va c yl aws. Tod ay, El i z a beth heads up a consulting and deve l o p m e nt co m p a ny, Co n s u l t rex Inc. t h at spe c i a l i zes in theuse of te c h n o l ogy-based solutions for enhancing pri va cy on the Inte rn e t . The co m p a ny is also deve l o p i n gnew te c h n i cal solutions for ente rp rise-wide IT env i ro n m e nt s. Prev i o u s l y, El i z a beth co - founded IMMIX Te l e co m ,an inte rn ational te l e com co m p a ny headquarte red in South Fl o rida and offices in Eu ro pe and Japan. I M M I Xh e l ped found ECTA (Eu ro pean Co m pe t i t i ve Te l e co m m u n i cations As s oc i at i o n ) , the first te l e com org a n i z ation ofi n d e pe n d e nt te l e com companies which tod ay has grown into the leading pan-Eu ro pean trade assoc i at i o ns e rving the te l e co m m u n i cations industry. As an As s i s t a nt Pro fessor at Lynn Un i ve r s i ty in Boca Raton Fl o ri d a ,El i z a beth chaired the Co m p u ter Science Prog ram and taught Co m p u ter Science courses from 19 8 3 - 19 9 6 . Sh ehas MS and 6th Year gra d u ate degrees from Nova So u t h e a s te rn Un i ve r s i ty in Co m p u ters and Ed u c at i o n , a n dhas co m p l e ted all PhD co u r s e wo rk (ABD) at Nova as we l l .

The 2004 Information Security Conference & Exhibition 5

Page 8: The 2004 Information Security Conference & Exhibition€¦ · Security 5000 appliances, the first fully integrated, multi-function, security appliance in the market to address blended

The ISSA South Florida ChapterThanks Our 2004 Information Security

Conference & Exhibition Sponsors

I would like to extend a warm and heart-felt Thank You to this terrific team of volunteers! They have worked many long,hard hours, at no cost to the chapter, to provide this great program and fun day to our members and to the Information

Security community. Thank you guys for hanging in there (past midnight on many occasions) and going the extra mile (10)!

Rob Carey, ISSA South Florida Chapter President

Visit our website at www.sfissa.org to become a member for more information and future events.

Elizabeth Bates, Consultrex ISSA Chapter Vice PresidentPete Nicoletti, ProtectPoint ISSA Chapter SecretaryBen Eu, ABC Distributing ISSA Chapter TreasurerJohn Burt, Dimension ISSA Chapter Facilities Coordinator ++William Cellich, CCS Productions ISSA Chapter WebmasterFred Ax, Fredrik Ax Design Graphic Design