New Security Technologies for Protecting Sensitive Data
A Passport Program Event
Pre-registration is now unavailable.
Registration will be available at the door.
With the huge advancement in technology over recent years, data theft is the new 'invisible' crime, and poses a real threat to banks and businesses alike. It is a 'faceless' crime, which makes it extremely appealing to those criminals with the technical know-how. Long gone are the days of over-the-counter theft, with virtually all 'bank robberies' now being committed over the internet or telephone, using data and information stolen from elsewhere. There are two main forms of data theft, the first with the intention of stealing someone's identity, and the second being the theft of information.
Data theft: Stealing information
Stealing the identity of someone is a relatively straightforward, yet very dangerous form of data theft; criminals find, steal and use information about a person that is readily available, to allow them to pose as somebody else. The intention behind this form of data theft is to gain monetary rewards. An example of this is credit card applications. Data theft in the context of stolen or compromised information is equally un-nerving and dangerous. Criminals who compromise servers or computers to access information won't necessarily have a specific target in mind, but will simply see what sensitive data is at hand and, take it. In the case of credit card fraud, the true owner of the stolen identity can end up owing tens of thousands of dollars on multiple cards, without even realizing or spending one penny of it themselves. With so much public data and personal details on computer systems throughout the world, it is imperative that businesses holding such information are vigilant in regards to safe-guarding against data theft.
Highly sensitive data theft
This is especially hard on proprietary information and intellectual property, which are reportedly two of the largest targets by perpetrators of data theft. Customer lists, research and development, financial data and personal information are all highly lucrative and more importantly, very private. With this information in hand, data theft criminals can use this information to adopt new identities or use this very personal information to their own, more often than not, financial benefit.
Data Protection Technologies
This is forcing business to look at security differently. Come and listen to a panel of IT security experts who will discuss new trends in securing sensitive data.
Raj Dhingra (bio)- VP of Products, Marketing and BD, PortAuthority Technologies
Peter Laakkonen (bio)- Advisor and Business Consultant Network and Wireless Security, SecVen Partners
Kurt Lennartsson (bio)- Technology Coach IT Security, Kurt Lennartsson Consulting
Asheem joined Greylock in 2003. His areas of interest include enterprise infrastructure, security, networking and mobile. Asheem represents Greylock on the boards of CipherTrust, Imperva, Palo Alto Networks, PortAuthority Technologies, Securent and Xsigo Systems. He is also on the board at Sourcefire and was previously on the board at NetBoost (acquired by Intel).
Prior to joining Greylock, Asheem spent over fifteen years in industry operating roles helping create, grow and lead multiple technology businesses and product lines to market leadership positions. Most recently, Asheem was vice-president of business development and product management with Check Point Software Technologies. During his 6.5 year tenure, Check Point became one of the world's fastest growing and most profitable companies. Prior to Check Point, Asheem was vice-president of marketing with CoroNet Systems (a venture-backed startup acquired by Compuware), where he helped create and define a new product category for application-aware network monitoring. Previously, Asheem held strategic marketing and product line positions with SynOptics/Bay Networks and AT&T Bell Laboratories.
Asheem is a Charter Member of TiE Silicon Valley. Born and raised in India, Asheem holds B.S. and M.S. degrees in electrical and computer engineering from Case Western Reserve University in Cleveland, Ohio.
Raj Dhingra is responsible for corporate marketing, product strategy and business development at PortAuthority Technologies. Raj is a seasoned business executive with a track record of building category leaders in high-growth markets. Raj formerly served as senior vice president of marketing for McAfee, where he was responsible for corporate and product marketing of the McAfee network and system security products. During his tenure, the McAfee IntruShield family of network IDS/IPS products, acquired from IntruVert Networks, became the #1 worldwide market share leader. Prior to joining IntruVert Networks, he was chief operating officer and senior vice president of marketing at SonicWALL Inc., a developer of Internet security solutions. Before SonicWALL, Raj held several senior management positions at 3Com, including vice president of business development, and vice president and business manager of 3Com's SuperStack division. Raj is an IT security expert and has provided thought-provoking perspectives at industry conferences and for television, trade journals and business media.
Peter Laakkonen is a senior executive with +18 years track record of success in the high tech industry. Peter started in networking in mid 80's as President of Mikronet, the leading LAN/WAN solutions distributor in Scandinavia. After that Peter founded F-Secure Inc.(www.f-secure.com) in Silicon Valley in 1995 and ran the company as CEO for 7 years. Peter boot strapped F-Secure to the market and technology leader for securing distributed and mobile enterprises and to highly successful IPO in 1999. Peter left the company 2001 to found SecVen Partners - boutique strategic advisor and consultancy in the network and wireless security. Peter is currently running Kaspersky Lab’s technology licensing and OEM sales entity in Americas. Peter is a member of SDForum and Silicon Vikings.
Kurt Lennartsson, security technology focused executive, bringing more than 20 years of experience in the security industry directing, designing and developing software and hardware for computer security. He brings a wealth of expertise in the areas of software for mobile security such as hard disk encryption, PKI, personal firewalls, email security VPNs, smart cards, smart-phones, and two factor access control systems, intrusion detection and prevention systems. Before starting his own consultant company in 2005, coaching companies in Software Development, Product Management, Security Certifications and Patenting IP, Kurt headed Engineering at RedCannon Security, at startup company in the Client Internet Security space. Prior to RedCannon, Lennartsson co-founded Pointsec Mobile Technology Inc., a leader in the mobile encryption security space. He served as the senior vice president of strategy and technology at the company. Before Pointsec, Lennartsson held management positions with Protect Data AB (Parent Company of Pointsec), Ericsson and RSA Security (through contracted single source representation in Northern Europe).
Lennartsson has a background in Electronics Engineering and is a Certified Information Security Systems Professional (CISSP). Kurt is a member of Silicon Vikings.
Calvin Powers is a solution designer in IBM's Security Strategy group, focusing on governance, risk, and compliance. He works extensively with customers analyzing the requirements and applying IBM capabilities to a wide variety of domains, including privacy management, security breach notification laws, PCI Data security standards, COBIT and ITIL alignment, data protection strategies and technologies, and Sarbanes-Oxley compliance.
6:00-7:00pm Registration, Networking & Appetizers
7:00-9:00pm Panel Discussion
Silicon Valley Bank
3005 Tasman Drive
Santa Clara, CA 95054
$20 Passport Program Members
$20 SDForum Platinum Pass Members
$25 SDForum, ANZA & Silicon Vikings members
Pre-registration is now unavailable.
Registration will be available at the door.