Last modified: Thursday, March 11, 2010
Cybersecurity summit to feature renowned "security guru," university privacy experts from across nation
FOR IMMEDIATE RELEASE
March 11, 2010
BLOOMINGTON, Ind. -- Internationally renowned cybersecurity technologist and bestselling author Bruce Schneier will headline the 2010 Higher Education Cybersecurity Summit set for April 1 in Indianapolis.
Hosted by Indiana University's Center for Applied Cybersecurity Research, the sixth annual summit has attracted a stellar group of speakers that also includes top security and privacy officers from private industry and public education.
Joining Schneier, who will provide the pre-lunch keynote at the all-day summit, will be cybersecurity chiefs from the University of Pennsylvania, the University of Florida, the University of Illinois at Urbana-Champaign, the University of Kansas, and Indiana University information policy officer Merri Beth Lavagnino.
Representing private industry along with Schneier, who is the chief security technology officer for BT Managed Security Solutions, will be Kevin Kampman, a senior analyst for Gartner Inc., and from public-private partnerships, both the Research and Education Networking Information Sharing and Analysis Center's (REN-ISAC) principal security engineer, Gabriel Iovino, and its technical director, Doug Pearson.
Fred Cate, director of IU's Center for Applied Cybersecurity Research, said the summit would build on Schneier's keynote topic of "Security, Privacy, and the Generation Gap" by offering a daylong opportunity to explore best practices, research, trends and innovations in information assurance. Information security is a particular challenge for academic, government and not-for-profit institutions, and meeting that challenge requires a focused and coordinated effort, he said.
"Collaboration, innovation and information sharing are necessary to address today's most pressing cybersecurity issues," Cate said. "The summit helps us, as individual organizations and as a community, improve our defenses and minimize both the potential for and impact of cyber attacks."
A frequent security critic and commentator, Schneier (https://www.schneier.com) has testified before Congress and authored bestselling books including Applied Cryptography, Secrets and Lies, Beyond Fear, and Schneier on Security. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. His current book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated, he says) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
The free summit will take place on the Indiana University-Purdue University Indianapolis campus at the University Place Conference Center (UPCC) and Hotel located on the corner of Michigan Street and University Boulevard in Indianapolis. It is open to information assurance professionals in the higher education, law enforcement, legal and non-profit fields.
The 2010 Summit program will also include:
- The panel: "Pioneering information privacy in higher education," with chief privacy officers from IU, the University of Pennsylvania, the University of Illinois at Urbana-Champaign, and the University of Florida
- A general session, led by REN-ISAC: "What threats are we seeing? Plus, benefits of REN-ISAC Membership"
- A management/policy track: "Payment card industry data security standards -- Are you at risk for a fine?" Leaders: Chad Marcum, Lead Security Engineer, University Information Security Office, Indiana University, and Tom Davis, IU Chief Information Security Officer and NACUBO member to the PCI Data Security Standard Technical Board
- A large-school challenges discussion: "What issues are you facing, and what defenses and solutions are you finding useful?" Moderator: Jan Sheets, Ivy Tech Community College
For a complete look at the summit program or to register, see: https://www.indiana.edu/~uits/cacrsummit10/. Advance registration and confirmation are required.