CYBER DEFENSE AND DISASTER RECOVERY CONFERENCE 2010: PROTECTING YOURSELF AND YOUR BUSINESS FROM INTERNATIONAL THREATS
One-day conference featuring distinguished guest speakers and SANS Training
Studio Theatre Concourse Public Affairs Center, 1st Floor Conference Room C/D University of Illinois at Springfield
Friday, March 12, 2010 SANS Registration 7:00 a.m.
(optional) General Registration 8:30 a.m.
Pre-registration required at:
http://csc.uis.edu/cyberconference (by March 3)
$30 Registration Fee Includes refreshments and lunch
CISSP Credit and CPDUs Available
About the Theme: There is a present and growing risk to businesses and individuals from international threats, both via cyber and physical means. Most foreign intelligence services that pose a risk to the United States have moved to an asymmetric posture, using both cyber- based and physical contact methods to gather intelligence information to gain a technological and/or military advantage. This asymmetric attack manifests itself in a variety of ways: direct attacks on major computer networks to steal information; compromising of key persons through e- mail and social networking on the Internet who may or may not be aware of their assistance to the adversary; and physically contacting U.S. persons both at home and while on foreign travel to compromise them and/or their electronic devices, among others. Due to the "take all" attitude of foreign intelligence services and the insiders they compromise, no one is immune. It is important for all of us to maintain a healthy respect for the privacy of our personal and business electronics and information in the global economy.
About SANS: The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world.
Conference Chair: Janis Rose UIS Computer Science Department (217) 206-8246 InfraGard Spingfield Chapter President
Mike Davis, CEO Savid Technologies
Securing the Human: How Determining
Intent is the Future of Security - As more malware, spyware, and other tools are developed by attackers, the line between whether an application, website, or email is malicious is being greatly blurred. Attackers are now using the same technologies we use to defend ourselves to convince us that we need to pay them for increased protection. Learn what the latest threats are and how to educate yourself and your employees on determining the intent of an attack in order to reduce risk.
Computer Science Department, University of Illinois at Springfield http://csc.uis.edu/
Center for Systems Security & Information Assurance http://www.cssia.org/
InfraGard Springfield Members Alliance http://www.infragard-illinois.org
Regional Travel Directions to UIS Public
Affairs Center (PAC): http://www.uis.edu/theatre/productions/map.html (UIS Theatre Web Site)
Conference participants will find parking available in campus lots C and D, which are close to the PAC.