There is no custom code to display.

ASIS 2011 Convergence Education

Each year I am always asked about convergence educational sessions at the ASIS International Annual Seminars and Exhibits event, as well as other educational events.

There are plenty of sessions covering both aspects of security convergence—organization and technical.

[Note: See the Security Technology Executive magazine’s March 2010 issue’s article on technology and organizational convergence, “The State of Converged Security Operations“, to help determine which aspects of convergence are of the greatest value to your current role and future career path.]

Technology and Organizational Convergence

Technology convergence is the result of the more general information technology convergence, and is the impact of computer and network technology being incorporated in security devices and systems. Organizational convergence involves eliminating organizational silos that keep security functions walled off from the rest of the organization in critical ways, and in particular between IT security and physical security.

ASIS 57th Annual Seminar Convergence Sessions

This year marks the highest number of ASIS annual seminar sessions ever that touch on convergence topics: 80 sessions in total, including many sessions on IT security topics that will be of interest to IT personnel. A significant factor is the contribution to this year’s sessions by (ISC)2 – the International Information Systems Security Certification Consortium, Inc. There are more than a half-dozen sessions on all aspects of social media impacts on security, both as a tool and as a risk factor. There is a software applications security track.

Each session time slot holds many convergence-related sessions, so I recommend that you partner up with friends and colleagues to ensure sufficient coverage for your sessions of interest. Since attendees can also by the DVD of all recorded sessions right after the event for just $99, you can still catch up on those you couldn’t see live once you get back home.

I have placed the sessions into one or more of these convergence categories:

  • Technology – The incorporation of computers and networking into electronic physical security systems, including “voice/data/video on the same cable”
  • Organizational – Eliminating organizational silos that keep security functions walled off from the rest of the organization
  • IT Security Topic – An IT security topic such as wireless network security, application security, information systems regulatory compliance, IT security risk assessment, and so on
Session Title Date / Time Convergence Category
1113 Pre-Seminar Program: The Successful Security Consultant (Additional Fee Required) Sunday, Sept 18
8:00 AM – 5:00 PM
Technology
1114 Pre-Seminar Program: CISSP® 2-Day Intensive Education Program Day 2 of 2 (Additional Fee Required) Sunday, Sept 18
8:00 AM – 5:00 PM
IT Security Topic
1115 Pre-Seminar Program: CSSLP® 2-Day Intensive Education Program Day 2 of 2 (Additional Fee Required) Sunday, Sept 18
8:00 AM – 5:00 PM
IT Security Topic
2101 ASIS Standards: Auditing for Improvement – Security Risk and Resilience Auditing Monday, Sept 19
11:00 AM – 12:00 PM
Organizational
2105 Wardriving: Drive Detect and Defense of Wireless Networks Monday, Sept 19
11:00 AM – 12:00 PM
IT Security Topic
2110 Information Technology Security Council Series: Cloud Computing for the Physical Security Practitioner Monday, Sept 19
11:00 AM – 12:00 PM
Technology
2111 Seek and Ye Shall Be Sued: Using Social Networking Sites to Manage Risk without Risking Litigation Monday, Sept 19
11:00 AM – 12:00 PM
Technology and Organizational
2117 Corporate Account Take Over; Online and In the Real World Monday, Sept 19
11:00 AM – 12:00 PM
Technology and Organizational
2180 Next Generation Cloud Security Compliance Monday, Sept 19
11:00 AM – 12:00 PM
Technology
2182 Integrating Security Concepts Into System and Application Design Monday, Sept 19
11:00 AM – 12:00 PM
Technology
2183 Yes, You Can: How to Securely Deploy and Manage Enterprise Mobile Devices Monday, Sept 19
11:00 AM – 12:00 PM
Technology
2185 Introduction to the Software Assurance Track Monday, Sept 19
11:00 AM – 12:00 PM
IT Security Topic
2203 Video Quality In Public Safety: First Responder Case Studies Monday, Sept 19
1:45 PM – 3:00 PM
Technology
2206 Information Technology Security Council Series: Who Are You, and Why Should I Trust You? Current Trends In Identity and Access Management Monday, Sept 19
1:45 PM – 3:00 PM
Technology
2209 What It Takes to Be a Security Executive Today Monday, Sept 19
1:45 PM – 3:00 PM
Organizational
2213 Cyber Jihad – Use of the Virtual World Monday, Sept 19
1:45 PM – 3:00 PM
IT Security Topic
2217 Security’s Role In Managing Successful Events Monday, Sept 19
1:45 PM – 3:00 PM
Organizational
2218 Crisis Management and Social Media – the New Opportunity Monday, Sept 19
1:45 PM – 3:00 PM
Technology and Organizational
2280 Using the Cloud Security Alliance GRC Stack to Attest Vendor Compliance Monday, Sept 19
1:45 PM – 3:00 PM
IT Security Topic
2281 Managing Privacy and Security: The CISO/CPO Dialogue Monday, Sept 19
1:45 PM – 3:00 PM
Technology and Organizational
2282 Software Security: IS OK Good Enough? Monday, Sept 19
1:45 PM – 3:00 PM
IT Security Topic
2283 How to Use Mobile Devices Correctly – Setting up Security Guardrails Monday, Sept 19
1:45 PM – 3:00 PM
Technology
2285 Measure Software Security Monday, Sept 19
1:45 PM – 3:00 PM
IT Security Topic
2306 Information Technology Security Council Series: Forensics and E-Discovery Monday, Sept 19
4:30 PM – 5:30 PM
Technology and Organizational
2307 Generate Cash by Uninvesting In Security Equipment Services Monday, Sept 19
4:30 PM – 5:30 PM
Technology
2309 Information and Data Security While Away From the Office Monday, Sept 19
4:30 PM – 5:30 PM
Technology and Organizational
2313 Advanced Internet and Social Network Investigations and Background Checks Monday, Sept 19
4:30 PM – 5:30 PM
Organizational
2317 Security Excellence – Tools to Enhance Security’s Mission Monday, Sept 19
4:30 PM – 5:30 PM
Organizational
2320 Protecting America’s Electric Grid Monday, Sept 19
4:30 PM – 5:30 PM
Technology
2380 Cloud Incident Response Monday, Sept 19
4:30 PM – 5:30 PM
Technology and Organizational
2381 Cyber Security and the Socio-Political Landscape – Going Beyond the Technology Monday, Sept 19
4:30 PM – 5:30 PM
Technology and Organizational
2382 The Economics of Failure Monday, Sept 19
4:30 PM – 5:30 PM
Organizational
2385 Why Do Developers Make These Dangerous Software Errors? Monday, Sept 19
4:30 PM – 5:30 PM
IT Security Topic
3101 ASIS Standards: Conducting a Risk Assessment – the Foundation for Successful Risk Management Tuesday, Sept 20
11:00 AM – 12:00 PM
Organizational
3105 Setting the Standard: A Roundup of the Physical and Logical Technology Standards Affecting the Security Industry Tuesday, Sept 20
11:00 AM – 12:00 PM
Technology
3112 Information Technology Security Council Series: Cyber Security Tuesday, Sept 20
11:00 AM – 12:00 PM
Technology
3117 Countering Business/Industrial Espionage In a Global Marketplace Tuesday, Sept 20
11:00 AM – 12:00 PM
Organizational
3120 Disaster In the Data Center! Are You Prepared? Tuesday, Sept 20
11:00 AM – 12:00 PM
Technology and Organizational
3180 Architecting and Building A Secure Virtual Infrastructure and Private Cloud Tuesday, Sept 20
11:00 AM – 12:00 PM
Technology
3181 Data Integrity Debate Tuesday, Sept 20
11:00 AM – 12:00 PM
IT Security Topic
3182 Security App-Titude Tuesday, Sept 20
11:00 AM – 12:00 PM
IT Security Topic
3183 The ABCs of Global Mobile Enterprise Compliance Tuesday, Sept 20
11:00 AM – 12:00 PM
Technology and Organizational
3185 Improve Your SDLC with Capec and Cwe Tuesday, Sept 20
11:00 AM – 12:00 PM
IT Security Topic
3206 Security Architecture and Engineering, Part 2: Systems Design and Engineering Tuesday, Sept 20
1:45 PM – 3:00 PM
Technology
3208 Information Technology Security Council Series: Is the Power Infrastructure Secure? Utility and Smart Grid Security Tuesday, Sept 20
1:45 PM – 3:00 PM
Technology
3216 Integrated Operational Risk Management: A Look Inside Westinghouse Tuesday, Sept 20
1:45 PM – 3:00 PM
Organizational
3219 Caution Advised! the Use of Social Networking Sites, Search Engines and Web 2.0 to Screen Applicants Tuesday, Sept 20
1:45 PM – 3:00 PM
Technology and Organizational
3280 Forensics and the Cloud – What Is the Meaning of This? Tuesday, Sept 20
1:45 PM – 3:00 PM
Technology and Organizational
3282 Picking the Right Tool for the Job: Using Vendor Tools to Aid In the Development of Secure Code Tuesday, Sept 20
1:45 PM – 3:00 PM
IT Security Topic
3283 Mobile Applications: Managing Enterprise Risk and Exploitation Tuesday, Sept 20
1:45 PM – 3:00 PM
IT Security Topic
3284 Putting Your House In Order – Business Intelligence Gathered From 100+ Sustainable It-GRC Implementations Tuesday, Sept 20
1:45 PM – 3:00 PM
Technology and Organizational
3290 CSO Roundtable: Social Media Risks and Rewards (Open to CSO Members Only) Tuesday, Sept 20
1:45 PM – 2:45 PM
Technology and Organizational
3304 Innovation or Confusion? How Will High Tech Industries Impact Electronic Security Systems? Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology
3305 Security Architecture and Engineering, Part 3: Creating and Communicating the Security System Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology
3306 Information Technology Security Council Series: Federal Information Security Tuesday, Sept 20
4:30 PM – 5:30 PM
IT Security Topic
3312 Protecting Your Brand Online: Success Stories On How to Tame the Internet Tuesday, Sept 20
4:30 PM – 5:30 PM
Organizational
3315 Requesting, Obtaining Approval and Implementing Technology Upgrades Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology and Organizational
3317 How Vulnerable Is Your Data? Cost-Effective Best Practices to Safeguard Against Data Breaches Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology
3381 Psychological Principles In Social Engineering Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology and Organizational
3383 Impact of Social Networking On Security Threats Tuesday, Sept 20
4:30 PM – 5:30 PM
Technology and Organizational
3385 Software Assurance Panel Wrap-up Tuesday, Sept 20
4:30 PM – 5:30 PM
IT Security Topic
4111 Information Technology Security Council Series: Legal and Compliance Aspects of I.T. Wednesday, Sept 21
11:00 AM – 12:00 PM
Technology and Organizational
4118 Social Networking: New Challenges of Managing Stalking In the Workplace Wednesday, Sept 21
11:00 AM – 12:00 PM
Technology and Organizational
4180 Building Trust, Visibility and Resilience in Government Networks and the Cloud Wednesday, Sept 21
11:00 AM – 12:00 PM
Technology and Organizational
4181 The Reality of Cyber-Centric Terrorism Wednesday, Sept 21
11:00 AM – 12:00 PM
IT Security Topic
4182 Integrating Security Into the SDLC: Enterprise Success Stories Wednesday, Sept 21
11:00 AM – 12:00 PM
IT Security Topic
4183 Identify, Assess and Mitigate Security Risks Associated with New Mobile Devices and Applications Wednesday, Sept 21
11:00 AM – 12:00 PM
Technology
4203 Becoming a Trusted Advisor to the CSO Wednesday, Sept 21
1:45 PM – 2:45 PM
Organizational
4204 Integrator Track: Critical Infrastructure Security Solutions (Energy, Water, Gas) Wednesday, Sept 21
1:45 PM – 2:45 PM
Technology
4206 The Virtual Security Officer – Are You Getting the Most From Your Cameras and Guards? Wednesday, Sept 21
1:45 PM – 2:45 PM
4209 Private Sector Investigations – When (and if) to Involve Law Enforcement Wednesday, Sept 21
1:45 PM – 2:45 PM
Technology
4280 The Cloud and Security – A Practical Case Study Wednesday, Sept 21
1:45 PM – 2:45 PM
Technology
4281 The Renaissance Security Professional Wednesday, Sept 21
1:45 PM – 2:45 PM
Organizational
4282 The Unintended Consequences of Well-Intentioned Requirements Wednesday, Sept 21
1:45 PM – 2:45 PM
IT Security Topic
4283 Sponsor Session Mobile Track Wednesday, Sept 21
1:45 PM – 2:45 PM
Technology
4307 Building An Effective Information Systems Security Program Wednesday, Sept 21
3:30 PM – 5:00 PM
Technology
4309 Web 2.0: Risk From Social Media Wednesday, Sept 21
3:30 PM – 5:00 PM
Technology and Organizational
4312 Building a Corporate or Municipal Security Operations Center Wednesday, Sept 21
3:30 PM – 5:00 PM
Technology and Organizational
5170 The CSO in the Future Thursday, Sept 22
8:00 AM – 9:00 AM
Technology and Organizational
5172 Security and Social Networks Thursday, Sept 22
10:45 AM – 12:00 PM
Technology and Organizational