|
|
Becky Vasvary |
|
|
Information Security In the DOC: A Top 10 Management Challenge |
Real Player |
|
|
Judy Gordon, DoC Office of the Inspector General |
|
|
Survivability - A New Executive Perspective |
Real Player |
|
|
Dr. Tim Shimeall, Senior Technical Staff, SEI, CERT, Carnegie-Mellon University |
|
|
Ed Skoudis, SANS Instructor, Microsoft MVP |
|
|
Brett Michaels, RSA Security |
|
|
8 Simple Rules for Allowing My Daughter to Use the Iternet |
Real Player |
|
|
Scott Weil, The SANS Institute |
|
|
Dave Marcus, Network Associates |
|
|
Harris Corp. Vulnerability Assessment Solutions |
Real Player |
|
|
Paul Zimski, CISSP, Harris Inc. |
|
|
Becky Vasvary |
|
|
Jim |
|
|
Collen Moss, Actg. Supervisory Special Agent, FBI |
|
|
Bill Lay, Director, DOC Office of IT Security
Nancy DeFranceso, DoC IT Security Program Mgr.
|
|
|
Ponytail Problem-Issues in Security Governance |
Real Player |
|
|
Christopher Michael, CISSP, Computer Associates |
|
|
Brett Michaels, Area Dir. Fed. Ops., RSA Security |
|
|
Diane Davidowicz, Project Mgr., NOAA CIRT |
|
|
John Hair, Special Agent, FBI |
|
|
Red Hat Enterprise Linux Security Best Practices |
Real Player |
|
|
Chris Runge, Fed. Senior Sales Engineer, Red Hat
|
|
|
Shawn Geddis, Security Consulting Engineer, Apple |
|
|
Achieving Security Advantages with Sun Microsystems |
Real Player |
|
|
Vic Winkler, Principal Architect, Sun |
|
|
Glenn Schoonover CISSP MCSE |