Mid-Atlantic CIO Forum: Meeting Announcement
Topic: Security: Threats versus Overinvestment
Date: October 15, 2009
Location: Towson University
Please join members of the Mid-Atlantic CIO Forum and invited guests at the October 15, 2009 meeting!
CIOs struggle with the need to provide strong security practices in a world of shifting threats, responses, and economies. Information Technology is constantly evolving in its information security strategy to overcome new threats while continuing to protect against existing threats. How much money and resources should be spent in security measures? What are the greater threats and what practices are effective in combating them? In this meeting, we will be updated on the ever changing landscape of security and take an in-depth look at how to meet the challenge from a risk management perspective.
John Pescatore, VP, Internet Security, Gartner, Inc. will present an update on new threats, how security practices are changing to address these threats in a more challenged economic environment. He will discuss: Economic pressures for forcing changes in business practices and the way that IT is procured, deployed and used by businesses. These changes are causing breakage in existing approaches to information security ? and at the same time attacks in cyberspace have become more targeted and more dangerous. This presentation will outline the current, near and long term changes in threats and highlight the tactical steps and strategic positioning enterprises will need to take to get both more effective and more efficient at protecting critical business information.
Michael Leach, Chief Security Partner (Ret.), Global Business Solutions will provide a glimpse from a different, risk management perspective. In ?Managing Cyber Security; Tools for the CEO/CIO, Mr. Leach will address: How much security is enough? Are we too secure…not secure enough….how would we know? What should my enterprise expect to spend on security? How do we balance risk against security cost and hassle? What decisions can I make that will materially impact security effectiveness and efficiency?
This interactive discussion will enable executives to guide and control cyber security to support business operation and growth. We examine the few key decisions that have material impact on the balance between threats/risks and security. Learn about management processes for understanding the enterprise’s attitude about risk and reward and for “driving” security where it properly should go. Investigate a model of security spending and discuss methods of assessing the relevance, technical effectiveness, and efficiency of the cyber security of the enterprise.
Please join our members at the meeting! This is a full member meeting of the Forum. The meeting starts at 8:00 AM and ends by 1PM. Brunch and lunch are provided. Pre-registration is required. Meeting logistics including agenda, directions to the meeting place and parking information will be emailed to you after you register. For registration for this meeting, please contact: Bonnie Lawson at blawson@towson.edu or 410-704-4252.
Contact Info: Bonnie Lawson at blawson@towson.edu or 410-704-4252
www.towson.edu/cioforum