ITSA Day 1998
October 1, 1998
Reitz Union Auditorium
University of Florida
Gainesville, FL
Schedule of Events
Click the following topics for an abstract on each session.
Time | Topic | Speaker | Company |
---|---|---|---|
8:30am – 10:00am | Protecting Your Data and Equipment | Lt. Nick Vellis, Rocky Essex | UFPD, CIRCA |
10:00am – 10:15am | Break | ||
10:15am – 11:00am | Audit Check List | Nur Erenguc | UF Inspector General |
11:00am – 11:45am | LAN Security | Eric Olson | UF College of Business Administration |
11:45am – 1:00pm | Lunch | ||
1:00pm – 1:45pm | Securing Your Domain | John “Yasha” Kida | Internet Security Systems |
1:45pm – 2:30pm | Business Transaction Security | Heidi Warner | IBM |
2:30pm – 2:45pm | Break | ||
2:45pm – 3:30pm | Security Policy | Ken Powell | Network Associates / McAfee |
3:30pm – 4:15pm | The Future | Jude O’Reilley | Gartner Group |
8:30am – 10:00am — Protecting your Data and Equipment
Lt. Nick Vellis, UFPD
Rocky Essex, CIRCA
Data — To protect your data, you need to ensure
that unauthorized persons cannot access your data on your workstation
and that you store your media appropriately. Considerations
of password security, CD and diskette care, and frequently asked
questions will be covered. Examples of problems and how they
could have been avoided or minimized will be included.
Hardware — Now that you have created a space
for your bright shiny new workstation, how can you ensure that it
will STAY there? In addition to standard crime-prevention strategies,
you need to consider access control mechanisms and procedures and
ways to attach your workstation physically to its work surface.
10:15am – 11:00am — Audit Check List
Nur Erenguc, UF Inspector General
If your department were to be audited for information
security, what would the auditors be looking for? What do you need
to know with respect to control structures established to manage
the integrity, confidentiality and availability of information system,
data, and resources. Do audit concerns over information systems
differ from those identified by management? UF’s Inspector General
will share an auditor’s checklist to help you be ready.
11:00am – 11:45am — LAN Security
Eric Olson, UF College of Business Administration
Are there special considerations for keeping your
departmental LAN safe and secure? Yes, there are! CBA’s Eric Olson
will discuss issues related to access restrictions, data security,
and physical security for LANs.
1:00pm – 1:45pm — Securing Your Domain: Building a Secure Fortress
John “Yasha” Kida, Internet Security Systems
Recognizing that many organizations have a mandatory
requirement to develop and provide a secure network domain for their
business and users, the speaker has developed a practical, but entertaining,
presentation of securing your network domain. This security presentation
is based on real life installations, not abstract topics and will
cover security from the foundation up, a brick at a time.
1:45pm – 2:30pm — Securing the Network for Business Transactions
Heidi Warner, IBM
This session will cover aspects of using the internet
for financial transactions, buying over the internet, SET (Secure
Electronic Transactions) standards. and secure sign-on through vault
registry. A must for anyone planning to do business over the Internet.
2:45pm – 3:30pm — Security Policy: The Basic Tool
Ken Powell, Network Associates / McAfee
Understanding your information technology security
risks and addressing these risks are a priority for most proactive
IT organizations. This presentation will consist of:
- Baseline security assessment
- Risk tolerance
- Security Policy
- Security Deployment
- Change Control
- Reporting and Tracking
- Enforcement
3:30pm – 4:15pm — The Future
Jude O’Reilley, Gartner Group
Included in this presentation will be a discussion
of currently deployed technologies (e.g., firewalls) in light of
what’s on the horizon, e.g., Virtual Private Networking, Intrusion
Detection and web authorization and control tools. It will
present the Gartner Group’s latest evaluation of the vendors and
technologies in this market and an estimation of how they will evolve
in the next 3 to 5 years.