Upcoming Webinars Archived Webinars Training Vitals Host A Webinar About Get Updates Contact
September 28, 2006, 1:00pm – 3:00pm EDT
Ensuring IT Security in an Increasingly Mobile Workforce
SPEAKERS FOR THIS EVENT:
- Joseph Hungate, CIO, Treasury Inspector General for Tax Administration (TIGTA) Learn More
- Jason Sloderbeck, Director Security & Service Delivery, Positive NetworksLearn More
- Tim Cranny, PhD CISSP, Senior Security Architect, Senforce Technologies

How Secure is your Mobile Workforce?

Archive Options 
Audio Only
 Podcast Options
iTunes Podcast SubscribeAll Podcast Options.Listen Now! To all archive in the Podcast.
Your workforce is anywhere but stationed at the office, is your system keeping pace with the increasing agility of your workforce?

Telework. Home-based work. Global workforce. Office space is shrinking; while more and more connections are being made to ensure continuous productivity of the remote workforce.  This trend is increasing, especially with the government pushing the telework initiative to ensure business continuity in times of crises.

While the technology exists to support the remote and mobile workforce, security of the system and the information it carries continues to be a worrisome point. This web conference examines the solutions that will keep the organization’s hardware and data protected, even as it opens up the system to a more decentralized information sharing.

Take away points include:

  • How IT partners with HR to develop the backbone for the remote workforce – How can IT contribute to this renewed teleworking drive in the context of disaster preparedness and business continuity?
  • Anticipating security breaches and network vulnerabilities
  • Current security measures: Network tools, policies, procedures
  • Lessons learned  
THIS PROGRAM IS INTENDED FOR :
CSOs, CISOs, CIOs, SVPs, VPs, Directors, Heads of:
  • IT
  • Network Security
  • Information Risk and Security
  • IT Security
  • Enterprise Security

 This event will also be of interest to:

  • Chiefs of Staff
  • State and Municipal Administrators
  • Human Resources
  • Work/Life Program Managers
  • Telework Directors
Register For This Event!

 

SPONSORING PARTNERS:
Senforce Technologies is a leader in Endpoint Security Management. Through intelligent policy enforcement, our solution enforces security policies that protect endpoint devices from misuse and malicious access. We provide companies with a centrally management solution to create, distribute, manage and enforce security policies associated with endpoint security threats, such as, USB devices, removable storage, Bluetooth, wireless, networking, applications and data. Senforce Endpoint Security dynamically enforces security policies dependent on the location threat profile (at the office, on the road or at home). http://www.senforce.com/
 

Positive Networks is the leading provider of hosted VPN and endpoint security services. Its flagship service, PositivePRO, combines a client-based VPN, a clientless, Web-based SSL VPN, and remote desktop control into a single remote access service that scales to support thousands of users. With no hardware to install, PositivePRO is simple to implement and can provide complete remote access endpoint security control in 24 hours or less. PositivePRO’s easy-to-manage subscription model includes critical end-point security features like antivirus protection, anti-spyware protection, personal firewall protection, patch management and authentication to secure remote desktops and laptops.  Site-to-Site VPN solutions are also available. http://www.positivenetworks.com/

MEDIA PARTNERS:
 

Network World, Inc., the Leader in Network Knowledge, empowers Network IT Executives through education, information and community.  The leading provider of IT news, analysis, reviews, events and education, Network World publishes the leading newsweekly, Network World, hosts the most active online community, http://www.networkworld.com/ and produces educational seminars and events.

Government Technology magazine is the leading publication on the market providing technology solutions for state and local governments in the Information Age. Unrivaled in market expertise, Government Technology magazine provides state and local government executives a reliable source of information on the vital role technology will play in reengineering the public sector. Top government executives everywhere - from governors to mayors, from CIOs to agency directors, and from judges to legislators - turn to Government Technology magazine as the trusted source for state and local government technology solutions across the nation. For your free subscription, log on to www.govtech.net.

 

New technologies, new tools and new approaches have been developed, and entire architecture shifts are underway. Widespread connectivity and rapid change requires business processes to adapt – keeping the underlying technical infrastructure aligned with how the business operates and running the business in ways that leverage new capabilities.

CXOs (the whole gambit of senior management, including CEO, COO, CFO, HR, and marketing) face major challenges and opportunities as they work to keep IT aligned with ever-changing corporate business strategies. CXO will help C-Level executives in their decision-making process and in the development of IT strategies, directions and architectures. http://www.cxoamerica.com/

CSIA is the only advocacy group dedicated to ensuring the privacy, reliability and integrity of information systems through public policy, technology, education and awareness. The organization is led by CEOs from the world's top security providers, who offer the technical expertise, depth and focus to encourage a better understanding of security issues. It is the belief of the CSIA that a comprehensive approach to ensuring the security of information systems is fundamental to global protection and economic stability. https://www.csialliance.org/home

ABOUT OUR SPEAKERS:

Joseph Hungate

Joseph Hungate is the Assistant Inspector General for Information Technology and the Chief Information Officer for the Treasury Inspector General for Tax Administration (TIGTA). He has over 20 years of experience in the field of Information Technology in the areas of research, development, and fielding and evaluation of information systems. He has held positions in both private industry, with such companies as GE and TRW, and the public sector. Prior to joining TIGTA in May 2000, Joe was the Associate Director of the Information Resource Management Office with the Centers for Disease Control (CDC) in Atlanta. He has served at the Department of Commerce with the Office of Inspector General and the National Institute of Standards and Technology.

 

Jason Sloderbeck

Jason is Director of Security & Service Delivery at Positive Networks, responsible for all aspects of network, systems, and customer operations.

Prior to joining Positive Networks in 2001, Jason was the Manager of Sprint’s Broadband Wireless Systems Development team. This included the design, development, and implementation of scalable performance and fault management systems for real-time and historical analysis of the nationwide broadband network, as well as integration into Sprint’s business operations systems. He has several patents filed and pending in the broadband wireless and performance management fields.

In 1999, Jason joined UMB Bank as a software development consultant on the eScout.com project which raised over $25 million for one of the first online B2B e-commerce networks. He also worked as a network engineer there, completing the strategy for transitioning their $3 trillion Federal Reserve transaction infrastructure to public frame-relay.

In the mid-1990s, Jason managed an ISP and served as an IT consultant for various clients. He was a panelist at the CEO’s Information Security Summit of 2002 and is a regular contributor to IETF.

Tim Cranny

Tim obtained a PhD in pure mathematics at 24 and worked as a research scientist and college professor for 8 years before moving into information security.  He has worked extensively in network security architecture, security consulting, and security analysis methodologies. He is now  Senior Security Architect at Senforce Technologies, where he develops technology that protects computers in the age of mobility.

 
Copyright © 2016-2017 Honeycomb Worldwide Inc.