[an error occurred while processing this directive]
|
Kansas City,
Missouri
November 5, 2003
Workshop 1: Computer Security
is Good Business (Part 1):Understanding information security in terms
of your business
Learn how to define information
security and its importance for your organization. Learn to create a security
policy that supports your mission. Learn of common threats, how to determine
the extent to which you should be concerned and common information security
practices which you can use to operate more securely.
8:30am
Welcome
8:45am Making the Right
Investment
Learn how to define information
security (IS) for your organization and demonstrate the necessity of IS
in your operations. Hear examples of the most common types of threats
to information security and understand how to do a cost-benefits analysis
to determine the extent to which your organization should proactively
address known threats.
10:00am Defining Your Information
Security Needs
Learn to create a security
policy that supports your organization's mission. Understand the fundamentals
of risk assessment and risk mitigation.
11:15am Common Information
Security Practices
Internet, E-mail, Desktop, Personnel learn common Best Practices and procedures
and operate more securely.
Networking
Lunch
Workshop 2: Computer Security
is Good Business (Part 2): Common Practices, Mechanisms and Technologies
Learn practices and procedures
commonly implemented to increase information security. Firewalls, intrusion
detection systems, anti-virus software - get an explanation, in plain English,
of these and other technologies used to protect computer systems. Hear an
FBI agent speak on federal computer crime.
1pm Welcome
1:15pm Common Information
Security Practices
Internet, E-mail, Desktop, Personnel Learn common Best Practices and Procedures
and operate more securely.
2pm FBI Special Agent on
Federal Computer Crime and InfraGard
Are you a victim? Would you know how to recognize a federal computer crime
or how to respond? Hear an FBI Special Agent speak on fighting federal
computer crime and federal crime prevention.
3pm Mechanisms and Technologies
of Information Security
Hear an overview of current technologies used in reducing IS vulnerabilities
and learn of NIST resources available to your organization.
|