Free 12 January Webinar to Address Cyberthreats

LOS ALAMITOS, Calif., 16 December, 2010 – The IEEE Computer Society and VeriSign are sponsoring a free hour-long webinar on protecting organizations from cyberthreats that will be moderated by James Bret Michael, associate editor in chief of IEEE Security & Privacy.

The webinar, entitled “Protecting Your Mid-size Organization Against Emerging Cyberthreats and Vulnerabilities, will be held on Wednesday, 12 January, 2011 at 2 p.m. ET/11 a.m. PT/19:00 GMT. To register, click here.

During the live audio webcast, Wolfgang Kandek, CTO of Qualys, and Rick Howard, general manager of iDefense at VeriSign, will share insights and knowledge about the state of information security today, the unique needs of a mid-market security strategy, and what can be done to protect an organization in the future, as well as the risks of ignoring the looming threat.

This webcast will address the following questions:
• What are the state and nature of cyberthreats today?
• What are the risks of not having a comprehensive security strategy in place?
• What are the best ways to protect your company and your customers?
• How can you distinguish between real threats and false alarms?
• Where and how has an effective security strategy been implemented?
• How are the needs of mid-market organizations different from those of enterprise companies?

Kandek has more than 20 years of experience in developing and managing information systems. His focus has been on Unix-based server architectures and application delivery through the Internet. Prior to joining Qualys, he was director of network operations at the Online Music streaming company myplay.com and at iSyndicate, an Internet media syndication company.

Earlier in his career, Wolfgang held a variety of technical positions at EDS, MCI, and IBM. He holds master’s and bachelor’s degrees in computer science from the Technical University of Darmstadt, Germany. Kandek is a frequent speaker at security events and forums, including Black Hat, RSA Conference, InfoSecurity UK, and The Open Group. He is the main contributor to the Laws of Vulnerabilities blog.

Howard is an experienced computer security professional with proven success in the use of network intelligence for network defense. He spent five years working as the iDefense intelligence director before being promoted to general manager.

Prior to joining iDefense, Howard led the intelligence-gathering activities at Counterpane Internet Security and ran Counterpane’s global network of Security Operations Centers. He served in the US Army for 23 years in various command and staff positions involving information technology and computer security. He spent the last two years of his career as the US Army’s Computer Emergency Response Team Chief (ACERT), where he coordinated network defense, network intelligence, and network attack operations for the Army’s global network.

Howard holds a master’s degree in computer science from the Naval Postgraduate School and an engineering degree from the US Military Academy, where he also taught computer science. He has published many academic papers on technology and security and most recently contributed as an Executive Editor to the first book published by Verisign / iDefense: “Cyber Fraud: Tactics, Techniques and Procedures.”

Michael, a professor of computer science and electrical engineering at the Naval Postgraduate School, researches the development and assessment of trustworthy large-scale distributed systems, such as: frameworks for applying lightweight formal methods in computer-assisted verification and validation of systems, methods for conducting safety analyses of systems of systems, and specification and refinement of security and reliability policy for cloud computing.

His other area of research is in cyber conflict, with an emphasis on investigating avenues for achieving deterrence, operational arms control, and collective defense in cyberspace. Prior to joining the Naval Postgraduate School, he was an assistant research engineer at the University of California Berkeley and visiting scholar at the Institut National de Recherche sur les Transports et leur SÃ?©curitÃ?©, conducting research on advanced vehicle control and safety systems.

He began his career as a formal methods engineer at Argonne National Laboratory and as a member of the research staff at the Institute for Defense Analyses, conducting applied research in software engineering.

In additional to his leadership roles within the IEEE Reliability and Computer societies, Michael serves on several US government and international steering committees and working groups. He has also been active in software engineering education, most recently helping lead the development of a reference curriculum for graduate degree programs in software engineering (http://www.gswe2009.org/). He is an associate editor of the IEEE Systems Journal and an associate editor in chief of IEEE Security & Privacy magazine.

Michael received his PhD from George Mason University in 1993 and completed postdoctoral studies in National Security Law at the University of Virginia’s Center for National Security Law in 2003. He holds one patent and has published more than 150 articles. His website is at http://faculty.nps.edu/bmichael/.

About the IEEE Computer Society

With nearly 85,000 members, the IEEE Computer Society is the world’s leading organization of computing professionals. Founded in 1946, and the largest of the 38 societies of the Institute of Electrical and Electronics Engineers (IEEE), the Computer Society is dedicated to advancing the theory and application of computer and information-processing technology, and is known globally for its computing standards activities. For more information, go to http://www.computer.org.

Marketing Automation Platform Marketing Automation Tool