May 22-23, 2007
To: All ISSA New Jersey Chapter Members
Drexel University is partnering with IP3 to host another 2-day seminar for IT-IA security executives on IT security issues and answers for 2007 on May 22-23, 2007.
Our chapter's group of security professionals is cordially invited to attend this special information security / information assurance event at our discounted price offering of $100. IP3's educational programs are supported through sponsorships that allow us to offer a quality experience at a minimal investment to our seminar attendees.
For the cost of workbook and courseware, ISSA local chapter members can attend the 2-day seminar for the discounted price of $100 ($895 value).
This offer covers cost of registration, 300-page workbook and security tools CD. Interested colleagues should register at our at: http://www.ip3seminars.com/security/register.php using the special Registration Code: ISSA90.
A copy of the course outline can be printed out from IP3's website along with location/address of the seminar. Once registration is submitted, each person receives a receipt or invoice via email for $100.
Additionally, for those local members who have little or no budget for traveling this year, ISSA members have the option to subscribe to our innovative and educational podcasts that are continually updated every month. With a one-year subscription, members will receive access to cutting-edge, comprehensive podcasts that deal with the most important and critical IT security issues.
Cost of the podcast subscription is $595 and includes a 30GB Apple iPod, 5 topical podcasts with interviews and commentary from leading legal scholars, relevant podcasts with input from our knowledgeable sponsors, and commentary from IP3's CEO, Ken Kousky, on newsworthy and critical topics. It also includes our widely respected Cyber-Law series (a $995 value) which covers the following topics:
1. Western Law
3. Contract Law
4. Intellectual Property
5. Illegal Framework for Data Protection
6. Privacy Law
7. Cybercrime and Forensics
IP3, Inc. strongly supports the work of ISSA and has extended special pricing to this event to all local chapter members. Direct cost of $100 covers the cost of the 300 page workbook and Security Tools CD List Price $895-Member Cost is $100
Sacramento, CA April 17-18, Tues-Wed, U. C. Davis- Sacramento Campus,
> GovSec, May 8-9, Tues-Wed, Washington, D.C. Convention Center,
> Chicago/ Wheaton, IL, May 15-16, Tues-Wed, Illinois Institute of Technology- Rice Campus
> Philadelphia, PA, May 22-23, Tues-Wed, Drexel University
> Minneapolis, MN, June 5-6, Tues-Wed, University of Minnesota
Strategy to Reality:
Securing the Converged Enterprise
IT Security Seminar/Workshops
The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved.
The following list includes some of the important ways that ISSA members work toward achieving the Association's goals:
Organize international conferences, local chapter meetings and seminars that offer educational programs, training and valuable networking opportunities.
Provide access to information through the ISSA website as well as an online newsletter and monthly journal.
Offer support for professional certification and development opportunities for security practitioners. Create opportunities for members to join committees and boards, which provide significant leadership for the security industry.
Facilitate discussion and feedback on key issues, such as the National Strategy to Secure Cyberspace, in order to create a unified voice for security professionals around the world that can influence public opinion, government regulations, the media and other important audiences.
This is a must attend event for the serious IT security professional. The educational nature of this workshop will help prepare you for devising an effective and secure defensive strategy in architecting or securing your networks. Compliance is the driver in virtually every sector. Merchant policing by the credit card vendors, HIPAA compliance in response to board-level initiatives, FISMA in the Federal agencies and the titan of security concerns, SOX are driving priorities and budgets. Compliance here means reporting, logging, auditing and analyzing the situation. Not fixing it - first simply seeing it. Not securing the systems but monitoring and attesting to the security framework now in place. Budgets for security are going to professional fees and auditing costs. That's where security budgets are getting lost. But the answer has been to use new security technologies to lower these ongoing costs by addressing logging, reporting, auditing and analysis. Our Strategy to Reality: Securing the Converged Enterprise puts you right on target. We've been covering Cyber-Law and regulatory compliance but our treatment of security economics has helped us focus on the fungible business opportunity to attack the run-away audit and compliance costs through better technology deployment.
At the workshop you'll receive a 300-page workbook, the IP3 Security Tools CD ( filled with tools, whitepapers and relevant links) and two content-crammed days of IT security training you're not going to want to miss.
Seminar topics will include:
> IPS's / IDS's
> Authentication Mechanisms
> Vulnerabilities and Exploits
> Regulatory & Compliance Issues
An $895 value for just $100, These seats are being subsidized by a group of vendor sponsors in conjunction with your chapter. Click here to register for this conference, and use registration code: ISSA90.
Click here for a workshop brochure (1 MB).
We look forward to seeing you there!
National Institute of Standards and Technology
...it is generally understood by the IT security professional community that people are one of the weakest links in attempts to secure systems and networks. The “people factor” - not technology - is key to providing an adequate and appropriate level of security. If people are the key, but are also a weak link, more and better attention must be paid to this “asset.” A robust and enterprise wide awareness and training program is paramount to ensuring that people understand their IT security responsibilities, organizational policies, and how to properly use and protect the IT resources entrusted to them.”
"Security has often been an afterthought in architecting data networks. This has led to increased costs as companies struggled to plug the gaping holes in their defenses. Security is something you build in, not add on."
Ken Kousky, CEO
© 2007 IP3, Inc.
KENNETH W. KOUSKY, IP3 PRESIDENT AND CEO
Ken Kousky is a veteran of the IT software and services industries. Few individuals are able to blend such a broad range of experience and expertise as an executive (he was CEO of a public company for six years), as an educator (he's taught at the University of Pennsylvania and Washington University in both the School of Engineering, the School of Arts & Sciences and the Business School as a teaching fellow, adjunct professor, and as Director of the Center For Communications and Network Management) and as a technologist (he's been a software industry executive and holds a CISSP, Certified Information Systems Security Professional). His years of experience as both an educator and an entrepreneur (recipient of an Entrepreneur of the Year award) are reflected in his business and professional accomplishments. He is a visionary in the computing technology, education and marketing industry with three successful start-ups, two major mergers and an IPO under his belt. As a professional speaker, Ken is able to bridge the gap between the "C's", and their focus on financial outcomes and the operational and technical professionals. He’s a sought-after speaker on topics such as national cyber security, corporate financial management and enterprise network security. From "Bits to Budgets", Ken is able to cut through the noise factors surrounding today's critical technology, business and security issues to provide clear and concise insight into the most pressing IT Security issues. Today Ken is CEO of IP3, Inc., an information security consulting firm. He serves on the IEEE New Standards Governance Committee, and is collaborating with Arizona State University to contribute a chapter on bioterrorism for a Homeland Defense book. In 1988, Ken founded Wave Technologies to meet the growing demand for enduser and management technology training. In a record 6 years, he guided his vision from the study of his home to a NASDAQ publicly traded independent technology company. In 1993, Ken received the Anthony Lake Award, presented by the National Association of Black Telecommunications Professionals, and in 1995, named Entrepreneur of The Year by Ernst & Young. In 1997, the company was honored with the Deloitte & Touche Technology Fast 500 Award, and his leadership has placed Wave in the ranks of the St. Louis Regional Commerce and Growth Association's "Technology Fast 50" for the past five years. Prior to founding Wave, Ken served as Vice President at Novell, Inc., and President of NetWare Centers International, the subsidiary responsible for worldwide sales, distribution and support of the Novell product family. While at Novell, he managed 20 worldwide offices and grew the company to over 450 employees. His innovative direction establishing NetWare Centers around the world provided the foundation for the explosive growth of local area networking and helped Novell grow from $60 million to $250 million in revenues in less than two years. Ken's efforts to create a market for new technologies lead to innovative forms of educational marketing including the creation of the first NetWorld conferences with their extensive focus on broad technology education. He also created a channel education program that became the industry’s first major IT professional certification, the Certified NetWare Engineer (CNE). In his efforts to drive technology education into the market, Ken assisted in the formation of the Association of Better Computer Dealers, which eventually evolved into CompTIA. There, Ken played an active role in the development and expansion of many of the industry’s most important certification programs. After leaving Novell, Ken established Washington University's graduate program in Telecommunication Management, and directed the University's Center for Communications and Networking Management. Both programs were the first of their kind in the U.S. Ken also taught at the University of Pennsylvania and in its nationally renowned Wharton School of Business while working on a doctoral degree in Economics. He received his Master's degree in Economics from the University of Pennsylvania in 1978. He also holds a Bachelor's degree in Economics and Urban Studies from Washington University. Active in the community and professional organizations, Ken serves on several boards including the Saginaw Valley State University’s College of Business & Management Advisory Board, IEEE New Standards Governance Committee, OpenUmbrella, Computers for Schools, St. Louis Public School Foundation, the Linux Professional Institute, the National Association of Black Telecommunications Professionals, Webster University's Business School Advisory Board, Washington University Arts and Sciences and National Council, and corporate advisory boards of Mira Computer Imaging Systems and CK Global among others. Upon relocating to Michigan, Ken has quickly engaged in local community activities. Ken’s first year of venture consulting in Michigan for the Great Lakes Entrepreneurial Quest produced a third place North Region Winner. Ken served as the advisor and coach of two entrepreneurial teams with one of the teams receiving a 3rd place award out of 100 entrants. In addition, Ken has taken the lead in establishing the Mid-Michigan Chapter of ISSA, and organized the first annual Walleye Run and Relays as part of the Freeland Walleye Festival.
Back to Calendar Archives