Immerse yourself in 2.5 days of:
Educational sessions — workshops, keynotes, case studies and panel discussions
Networking events — spotlight educational sessions, attendee receptions, workshops and more
View program tracks and workshops below.
Track 1: Cybersecurity
Track 2: Privacy/Security
Track 3: Risk Management
Track 4: Compliance
Track 5: Forums
Monday, 4 November 2013
WS1: COBIT 5 for Security
WS3: Data Privacy Risks
WS5: A Practical Approach to Network Vulnerability Assessment (closed)
Tuesday, 5 November 2013:
WS2: COBIT 5 for Risk (WS2 has sold out. Please contact the
conference department to add your name to the waiting list.)
WS4: Innovate your Cybersecurity Solutions: Understand and Respond to Current Threats and Incidents
WS6: BYOD: Securing Mobile Technologies (closed)
WS7: Tools & Techniques of Digital Forensics and eDiscovery
2013 Conference Dates and Times
Pre-Conference Workshop Registration
Monday, 4 November; 7:30AM - 12:00PM
Tuesday, 5 November; 7:30AM - 12:00PM
Monday, 4 November; 9:00AM - 5:00PM
Tuesday, 5 November; 9:00AM - 5:00PM
Conference Registration Times
Tuesday, 5 November; 3:00PM - 7:00PM
Wednesday, 6 November; 7:00AM - 5:00PM
Thursday, 7 November; 7:30AM - 5:00PM
Friday, 8 November; 8:00AM - 12:00PM
Wednesday, 6 November; 8:30AM - 5:00PM
Thursday, 7 November; 8:30AM - 5:15PM
Friday, 8 November; 8:30AM - 12:30PM
Friday Morning, 8 November: Closing Keynote Address
Why What We’re Doing isn’t Working
Robert Bigman, President of 2BSecure, LLC, recently retired from the Central Intelligence Agency (CIA) after serving a 30-year career. Recognized as a pioneer in the field of classified information protection, Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman participated in developing security measures for government computers, and then developed solutions to allow the CIA to use the Internet to further its mission without exposure.
As the Agency's Chief Information Security Officer (CISO), Bigman managed a large organization of technical and program officers responsible for the protection of all Agency information. Bigman also served as the designated officer for all discussions with the information security industry and its commercial partners. He has contributed to almost every Intelligence Community information security policy/technical standard, and has provided numerous briefings to the National Security Council, Congress and presidential commissions. Bigman has received numerous CIA and Director of National Intelligence awards.
- Stage Setting – The Current State of Computing Technology
- Fighting Today’s Threats With Yesterday’s Technology
- The Lessons From Plug-X
- Protecting O/S Kernels with Applications
- Signatures, Heuristics and Cyber Intelligence Clouds
- Positive Changes in Protection Philosophy
Wednesday Morning, 6 November: Opening Keynote Address
Embracing Uncertainty—How Big Data Is Transforming Security Management
Download Presentation (19M)
Eddie Schwartz, CISA, CISM
Despite the best efforts and significant investments of security teams, various classes of threat actors continue to wreak havoc within organizations today. The challenge for our profession is how to reduce the impact of unknown and unexpected attacks and risks when traditional security technologies, processes and skills have proven to be inadequate.
Big data is transforming four critical areas of security in leading organizations: security management, fraud, GRC, and identity management. This keynote will discuss the drivers for this transformation and provide a blueprint for organizations looking to embrace uncertainty and succeed in the face of advanced threats and complex security risks.
Hear what Keynote Speaker Eddie Schwartz, CISA, CISM, VP of Global Security Solutions at Verizon Enterprise Solutions, has to say about the value of attending ISRM.
Eddie Schwartz is Vice President of Global Security Solutions for Verizon Enterprise Solutions. Previously he was Chief Information Security Officer (CISO) for RSA and was co-founder and CSO of NetWitness (acquired by EMC), CTO of ManTech, EVP and General Manager of Global Integrity (acquired by INS), SVP of Operations of Guardent (acquired by VeriSign), CISO of Nationwide Insurance, a Senior Computer Scientist at CSC, and a Foreign Service Officer with the U.S. Dept. of State. Schwartz has 25 years experience in the information security field,.
Schwartz has advised a number of early stage security companies, and served on the Executive Committee for the Banking Information Technology Secretariat (BITS). Schwartz has a B.I.S. in Information Security Management and an M.S. in Information Technology Management from the George Mason University School of Management.
Want more from Eddie? Read his recent ISACA Now Blog post, which previews his presentation, here.
Friday Morning, 8 November: Special Keynote Address
Insights on Protecting Enterprise Assets from Even the Most Unpredictable Threats
Captain Richard Phillips
Captain of the Maersk Alabama
Hero of the high seas, author of "A Captain’s Duty: Somali Pirates, Navy SEALs, and Dangerous Days at Sea," Captain Phillips caught the world’s attention when he was captured by Somali pirates in 2009.
On 8 April of that year, his vessel, the Maersk Alabama, became the first U.S. ship in more than 200 years to be hijacked at sea. Over the course of the next five days, Captain Phillips’s forward planning, quick thinking and heroism saved him, his crew and his ship.
A graduate of the Massachusetts Maritime Academy, Captain Phillips is a member of the International Organization of Masters, Mates & Pilots Union, and a licensed American merchant mariner. He became Captain of the MV Maersk Alabama in 2009. The gripping events surrounding his ship’s capture and his eventual rescue by US Navy SEALS have been made into a soon-to-be released Columbia pictures movie starring multiple Oscar-winner Tom Hanks.
His story highlights the need for all enterprises to have clear guidelines for safety and security. It also stresses the importance of leadership and creativity in any crisis situation. Ultimately it demonstrates that having an action plan for any eventuality is an essential foundation for protecting enterprise assets in the face of even the most unpredictable of threats.
Hear from Captain Phillips himself in the ISACA Now Blog post, “Risk and reward, typhoons and hurricanes—thoughts from a floating CEO”, which is linked here.