ISSA conference attendees talk identity systems and security roadmap

In this ISSA conference recap, we look at security roadmap development, identity systems, and the link between government and corporate cybersecurity.

Last week's 2013 ISSA International Conference in Nashville, Tenn., touched on a number of hot cybersecurity topics and stirred up quite the buzz on Twitter among attendees during keynotes and breakout sessions. In our first ISSA conference Twitter recap of the Oct. 9-10 event, SearchCompliance looked specifically at Day 1 sessions. In this roundup, we cover sessions pertaining to identity systems, access management, security roadmap...

development and the relationship between government and corporate cybersecurity from both days of the conference.

More Twitter roundups from SearchCompliance

Buzz on the CISPA cybersecurity bill

Online risk and cybersecurity make waves in government

The Gartner Identity and Access Management Scenario, 2014-2020. Identity systems give users access to applications and data, but how is "identity" as an enabler changing as the IT landscape becomes more vast, diverse and disconnected? Ray Wagner, a managing vice president at Gartner Inc., gave session attendees a look at the changes IT organizations can expect in identity management during the next several years and the ramifications of those changes on those managing identity today. Here are some highlights:

Creating an Effective Security Roadmap. While Wagner discussed identity systems management and threat protection, Elliott Franklin, information security manager at Whataburger, tackled security roadmap development. In his conference session, Franklin proposed a cascading approach to creating a security roadmap that does away with PowerPoint slides and expresses a roadmap on one easy-to-follow page. Franklin's approach has been credited with assisting in executive-level comprehension and quick buy-in for multiple enterprise-wide security projects. The session room was packed and attendees were active on Twitter (even begging for chairs):

Evening keynote, Oct. 9: Wednesday's closing keynote was delivered by Eugene H. Spafford, executive director at the Center for Education and Research in Information Assurance and Security and a professor in the Department of Computer Sciences at Purdue University. Spafford asked how IT executives should plan to measure confidentiality, integrity and availability. Several members of the keynote audience tweeted highlights:

Morning keynote, Oct. 10: To kick off Thursday's Day 2, ISSA welcomed the Right Honorable Baroness Pauline Neville-Jones, U.K. special government representative to business for cybersecurity, to share her unique perspective on cybersecurity and cyberdefense. After Neville-Jones discussed her role in the U.K.'s special government task force, she addressed common problems with cybersecurity management in business:

To ensure cybersecurity efforts are successful, the Baroness suggests that government and business foster relationships that benefit both sides:

Stay tuned for more ISSA International Conference coverage on SearchCompliance. To read more conversations from the 2013 ISSA conference, search "#ISSAConf" on Twitter.

Dig deeper on Risk management and compliance

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close