LSEC, ISSA Belgium European Spring Special Event : Information Security Challenges in 2011
LSEC Special Spring Event : Information Security Challenges in 2011
On April 28th, in the evening, LSEC, ISSA Belgium European in co-operation with Isaca Belgium are organizing a special networking event, bringing together various people and insights fromt he Information Security Industry.
Besides the social activities, some drinks and the special location of the Coudenberghmuseum, we will be updating our partners and members with some insights in Information Security Challenges in 2011.
Managing mobiles and smartphones is one of the key topics identified by both the information security industry and the enterprise security management, as one of the key potential risks and threats in information management. Over the last five years, it has been identified as a major threat and due to the evolution of those smartphones, the potential risks became even greater. Some phones hold memory capacity of up to 64 GB, allowing for quite some data to leak from the enterprise. Most phones retain confidential information, both emails with confidential documents and discussions; as well as contacts and personal data of the relations of the person who’s using the smartphone on a daily basis. On top, most of the applications being developed, have not at all been strenghtened to today’s level of potential software threats. It’s all about convenience, user friendliness and downloading pieces of software that’s fun to share, please the kids or talk about over drinks.
At the end of 2010, ENISA published the ENISA Smartphone Security report, indicating some trends and challenges for companies to manage smartphones.
During our evening, ISSA invited ENISA to explain some of their findings in more detail and to discuss the issues with some other industry specialists.
This event is supported by our Partner Member BarracudaNetworks.
Next to that, we have invited Raj Samani, McAfee’s EMEA CTO to give a view on some of the other Information Security Challenges we are facing in 2011.
Prior to McAfee, Raj was involved in the Public Administration Healthcare in the UK; having been part of the transformation from paper to digital and facing major security challenges in that process.
Today he’s supporting enterprise, government and McAfee in making the right choices when it comes to future challenges.
Raj is the European representative of the Cloud Security Alliance, is working on a Security management guideline, the global collaborative project used to evaluate objective measurement of IA maturity known as the Common Assurance Maturity Model (CAMM).
Finally, to close the program, we’ve invited some of the latest LSEC members to shortly present themselves and their companies in a 5 minute elevator pitch, which will bring us to the reception and a visit of the museum.
Learn more about Egemin, one of the latest LSEC members.
About the Location : Coudenberghmuseum and BELvue
The Coudenberghmuseum, an underground tour discovering the remains of the palace of Charles V
From the middle ages, a castle overlooked Brussels from Coudenberg hill. From the 12th century, the successive monarchs and their representatives transformed a small fortified castle into a sumptuous residential palace, one of the most beautiful palace of Europe and one of Charles V’s main residences.
This prestigious building is severely damaged by fire in 1731. Some forty years later, the ruins of the palace are pulled down and the ground flattened out for the construction of the new royal district. The remains of this palace make up the Coudenberg archaeological site.
During your visit, you will discover the Rue Isabelle and the old structures of the main buildings of the former palace of Brussels, which are now the foundations for today’s royal district and the Hoogstraeten House where the most interesting discoveries made during the various archaeological excavations conducted on the Coudenberg are displayed.
The BELvue museum provides a great overview of Belgian history. History has been written in the museum. In 9 halls and temporary exhibitions, this country surprises its inhabitants and visitors. Historic events uniquely documented, poignant film snippets and photos that you’ll never forget, moments in the past brought back to life to be relived as a memory for the elder and a discovery for the young…
You could also ‘just’ visit for the magnificent setting, the former 18th century Bellevue hotel – next to the royal palace, with a view of the gardens, beautifully renovated and one of a kind. A building that is more than just bricks and mortar, more than history, a building in which you can partake in our collective memory and that welcomes you with open arms – as a Belgian or a foreign visitor. BELvue has a story that it wants to share with you.
16.45h : Welcome and Registration for the Coudenbergh visit
17.00h : Guided visit to the Coudenbergh museum (indepently from the BELvue. Limited spaces only, first come first serve.
18.00h : registration & welcome drink
visit to the BELvue museum for those who are interested, until 20h.
18.15h : Opening address by Ulrich Seldeslachts, CEO LSEC; welcoming notes by ISSA Belux President and by ISACA Belgium President
18.20h : Security… is there an app for that? An overview of ENISA’s smartphone security report, by Marnix Dekker, ENISA
Abstract: Last year, together with a number of smartphone experts and security officers, we wrote a paper about smartphone security. The paper gives an overview of the top ten information security risks when using smartphones and also highlights important information security opportunities. To address the risks we make recommendations by giving pragmatic (risk-based) advise to end-users and IT (security) officers in businesses and governmental organisations for reducing the risks. In this presentation I will give an overview of the report, discuss the top ten risks, the opportunities, and look ahead to our future work in this area.
About : Marnix works in ENISA’s Secure applications program. He focuses on smartphone security, secure software engineering and cloud security. Previously he worked as an IT architect at KPMG, designing and auditing large identity management systems (for example the Dutch DigiD and the eRecognition framework). He has a PhD degree in Computer science and a Master degree in Theoretical physics.
19.00h : Auditing Mobile Apps and Mobile Forensics, by Aman Bahr, Training & Solutions Director, The Lancelot Institute
Abstract: Exponential growth in both apps for, and malware infections on, mobile devices, whole-sale theft of a developed nation’s Prime Minister’s email from her mobile device, and the continuing extension of corporate and government networks to include “smart” mobile end-points, are just some of the reasons for this seminar. “We will discuss and demonstrate policies needed to govern the use of apps on mobile devices, how to implement these policies as a secure, yet practical, baseline for current “smart” mobile devices, how to audit said apps and devices against the nominated baseline, and how to detect and dissect malware and other intrusion-based incidents via mobile forensics. We will do this by way of case studies and practical demonstrations.”
Bio: Aman works as training & solutions director in the Lancelot Institute. In addition to his management and consulting activities he regularly travels the globe on speaking and teaching engagements for enterprises to assist them in securing their information assets. Aman is academically qualified in Information Systems, and specializes in Information Systems Assurance, Auditing, Continuity, Recovery and Incidence Response. He is author and co- author of the Virtualization Audit Professional™, Cloud Audit Professional™ and Penetration Testing Professional™ training programs.
19.40h : mobile security panel discussion
Moderator : Ulrich Seldeslachts, CEO LSEC
- Marnix Dekker, ENISA
- Aman Bahr, The Lancelot Institute
- Jean-Luc Delvaux, Belgacom ICT
- Gert Vanhaeght, Mobila
- Raj Samani, McAfee
Snacks and drinks will be served during the presentations. There will be opportunity to network and have social discussions next to the speaker’s contributions.
20.00h : Information Security Challenges in 2011, by Raj Samani, McAfee CTO EMEA
About Raj Samani :
Raj is an active member of the Information Security industry, through involvement with numerous initiatives to improve the awareness and application of security. He is currently working as the VP, Chief Technical Officer for Mcafee EMEA, having previously worked as the Chief Information Security Officer for a large public sector organisation in the UK.
In addition, Raj is currently the Vice President for Communications in the ISSA UK Chapter, having previously established the UK mentoring programme. He is also on the advisory council for the Infosecurity Europe show, Infosecurity Magazine, and expert on both searchsecurity.co.uk, and infosec portal. He has had numerous security papers published, and appeared on television (ITV and More4). As well as providing assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3). He is also leading the global collaborative project used to evaluate objective measurement of IA maturity known as the Common Assurance Maturity Model (CAMM).
Next to his work Raj has also obtained;
CESG Listed Advisor Scheme, (CLAS), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Microsoft Certified Systems Engineer (MCSE – in NT4, Win2k, Win2003), Check Point Certified Security Administrator (CCSA in NG and 4.1), Check Point Certified Security Expert (CCSE - NG), Citrix Certified Administrator (CCA), QualysGuard Certified, RSA Certified Systems Engineer (SecurID), Cisco Certified Network Administrator (CCNA), as well as a BA (Hons), and MSc.
21.45h : close of evening
22.00h : close of Hoogstraeten Hotel Museum
April 28th, Coudenberghmusem, entrance until 20h via BELvue museum via the Warandepark entry. (official address Koningsplein 1000 Brussel)
From 20h onwards entrance via Hoogstraeten Hotel.
Free to attend, upon prior registration and confirmation.
You are welcome to join just for drinks, to freely visit the museum, participate in the talks or do all of the above combined.
Registration is easy, but mandatory, please visit Special LSEC, ISSA Spring event at the Eventbrite website.
Please register for
Part 1 : 16.30h and onwards visit to the Coudenberghmuseum
Part 2 : 18.00h and onwards evening activities and visit to the BELvue museum (until 20h)
Limited places available, seats granted on first come, first serve basis.
Please cancel your reservation at least 48 hours in advance, in order for us to proceed to a waiting list.
No cancellation 48 hours in advance and no show, will result in a cost of 150 € for our organizations, that we will invoice you.
For more information, suggestions and other, please contact lsecspring @ lsec.be.
Looking forward sharing Spring Blossoms and Flower ideas.
Are you a
leader in Security ? Do you want to share your expertise and join the
Leaders in Security as a Core Expert Member ?
Contact us via email! Or call +220.127.116.11.41 for a direct contact and more information.
An information set and your Membership Welcome Pack awaits you.
Copyright LSEC vzw 2007-2008 with the support of the IWT.
LSEC vzw Kasteelpark 10 - 3001 Heverlee - VAT BE BE 478 045 395 - fax. +18.104.22.168.69 - info @ lsec.be