ORLANDO, FLORIDA

December 10, 2003

Computer Security is Good Business

8:30am Open/Welcome

8:45am Computer Security…What is it, what is information security, why is it needed, how much should we invest?
In this first seminar, learn how to define information security (IS) for your organization and demonstrate the necessity of IS in your operations. Hear examples of the most common types of threats to information security and understand how to do a cost-benefits analysis to determine the extent to which your organization should proactively address known threats.

10:00am Information Security…Defining Your Needs
Learn to create a security policy that supports your organization's mission. Understand the fundamentals of risk assessment and risk mitigation.

11:15am Common Information Security Practices
Internet, E-mail, Desktop, Personnel - learn common Best Practices and procedures and operate more securely. (Focus on procedures.)

Networking Lunch

1:15pm Common Information Security Practices (continued)
Internet, E-mail, Desktop, Personnel - Learn common Best Practices and Procedures and operate more securely. (Focus on personnel.)

2:00pm FBI Special Agent on Federal Computer Crime and InfraGard
Are you a victim? Would you know how to recognize a federal computer crime or how to respond? Hear an FBI Special Agent speak on fighting federal computer crime and federal crime prevention.

3:00pm Information Security…The Mechanisms and Technologies
Hear an overview of current technologies used in reducing IS vulnerabilities and learn of NIST resources available to your organization.