Gartner Identity and Access Management Summit

How Can a Company Guarantee a Successful, Strategic Identity Access Management Program?

The Gartner Identity and Access Management Summit is right around the corner and leaders from all over the world will be coming to try to get this question answered.  Here are a few ideas from our ten years in the industry.

Strategic Identity and Access Management (“IAM”) projects can be difficult and the new challenges with mobile, social, and cloud compound the problem.  Protecting the perimeter is not enough anymore.  Safeguarding identities are the key to a truly secure enterprise.

The industry has seen way too many train wrecks with IAM.  To get beyond basic capabilities and really use IAM systems as a foundation for strategic IT, a company MUST take the time up front to consider the long-term plan.  Near-term, immediate priorities can be solved with client-based single sign-on, basic provisioning, simple roles and audit reports.  But with a short-term (and maybe short sighted) plan, a company can just as easily limit their ability to solve more complex problems.

Read more

Application Security Webinar

 Presented By:

  • Tony Vera, Senior Certified Security Specialist at IBM.
  • Ryker Exum, Information Security Consultant at PathMaker Group
  • Jason Bellomy, Manager of North American Sales for IBM’s Application Security Segment

In this 50 minute webinar you will:

  • Learn about the top security vulnerabilities that have yet to be addressed
  • See common live hacking scenarios
  • Hear about the current trends in mobile app security
  • Learn how to get a free security assessment for your company

About the key presenter, Tony Vera:

Tony is a Senior Certified Security Specialist at IBM. Since joining IBM in 1995 Mr. Vera has worked as a technical professional, with a wide range of clients in all aspects of the software engineering lifecycle. This work requires skills in the areas of product technical competencies, training, project management, contemporary software engineering technologies, and most recently, application security.

About Ryker Exum:

Ryker is an information security consultant with the Dallas, Texas based consulting firm PathMaker Group. He received his MBA and a graduate certificate from the NSA accredited, University of Dallas Information Assurance program. He holds several professional security certifications including CISSP, OSWP, CEH, and SSCP.

About Jason Bellomy:

Jason manages North American Sales for IBM’s Application Security segment. For 3.5 years he has led the Application Security Sales Team and helped integrate two IBM acquisitions, Watchfire and Ounce Labs, that make up the current IBM Application Security Portfolio.

Dallas PCI Event – April 9th

Best Practices for Protecting Payment Card Data (PCI) to help ensure compliance and reduce risk.

Event Overview

News headlines about the increasing frequency of stolen information and identity theft have focused awareness on data security and privacy breaches—and their consequences.

Payment card use is widespread today.  Along with growing global use, the industry has experienced a troubling increase in incidents of financial fraud. In response, the leading  payment card companies
worked together to develop a set of technical and operational requirements designed to protect cardholder data, commonly referred to as PCI DSS (Payment Card Industry Data Security Standard).

Recent high profile data thefts, along with industry statistics, indicate significant work remains to be done in most organizations to implement PCI DSS.

Topics to be covered:

•Current trends, issues and concerns around sensitive data security
• PCI and the changing Threatscape
• Looking beyond the compliance checkbox
• The future of the PCI-DSS
• What can be done to harden defenses against the exploitation of privileged users, unauthorized access and information-related vulnerabilities
•How to create a centralized data security platform 

Date: April 9th, 2013
IBM Technology Exploration Center (TEC)
1503 LBJ Freeway (Luna and 635), 5th Floor
Dallas, TX 75234-6059
8:30am – 11:00am

8:30 am         Breakfast and Registration

8:45 am          Welcome and Introduction

9:00 am          Keynote – Christian Nielsen, Pathmaker

10:00 am        Keynote – Michael Murphy, IBM

11:00 am        Closing Remarks

Christian Nielsen, Ph.D., PCI-QSACN

PathMaker Group

Christian has over 30 years of experience in security and networking technology. He has earned advanced degrees in Information Systems while staying active in the corporate world. In addition to his corporate career, Christian is training the next generation of master’s degree students in cyber security. Over the last several years, he has worked to assist business clients prevent and remediate the many security and compliance challenges they face.

MMMichael Murphy

Worldwide Solution Architect
Data Governance Center of Excellence

Mike Murphy is a Worldwide Solution Architect for the Data Governance Center of Excellence specializing in  real-time database protection solutions for reducing risk, simplifying compliance and lowering audit costs.
Over the last six years, Mike has worked with hundreds of customers conducting risk assessments and proposing technology solutions to protect against data breaches, and to ensure adherence to regulatory data protection standards such as HIPAA HITECH, PCI-DSS & SOX 404.

RSVP to or 817-704-3644