KANSAS CITY, MISSOURI

November 5, 2003

Workshop 1: Computer Security is Good Business (Part 1):Understanding information security in terms of your business

Learn how to define information security and its importance for your organization. Learn to create a security policy that supports your mission. Learn of common threats, how to determine the extent to which you should be concerned and common information security practices which you can use to operate more securely.

8:30am Welcome

8:45am Making the Right Investment
Learn how to define information security (IS) for your organization and demonstrate the necessity of IS in your operations. Hear examples of the most common types of threats to information security and understand how to do a cost-benefits analysis to determine the extent to which your organization should proactively address known threats.

10:00am Defining Your Information Security Needs
Learn to create a security policy that supports your organization's mission. Understand the fundamentals of risk assessment and risk mitigation.

11:15am Common Information Security Practices
Internet, E-mail, Desktop, Personnel learn common Best Practices and procedures and operate more securely.

Networking Lunch

Workshop 2: Computer Security is Good Business (Part 2): Common Practices, Mechanisms and Technologies

Learn practices and procedures commonly implemented to increase information security. Firewalls, intrusion detection systems, anti-virus software - get an explanation, in plain English, of these and other technologies used to protect computer systems. Hear an FBI agent speak on federal computer crime.

1pm Welcome

1:15pm Common Information Security Practices
Internet, E-mail, Desktop, Personnel Learn common Best Practices and Procedures and operate more securely.

2pm FBI Special Agent on Federal Computer Crime and InfraGard
Are you a victim? Would you know how to recognize a federal computer crime or how to respond? Hear an FBI Special Agent speak on fighting federal computer crime and federal crime prevention.

3pm Mechanisms and Technologies of Information Security
Hear an overview of current technologies used in reducing IS vulnerabilities and learn of NIST resources available to your organization.