1. Mobile security blunders and what you can do about them Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant 2. About me….• Ben Rothke (too many certifications)•…
Deployment Strategies for Effective Encryption - Presentation by Ben Rothke given at the Computer Forensics Show & Conference - April 19-20, 2010New York, NY
1. Session ID: Session Classification: Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Building a Security Operations Center (SOC) TECH-203 Advanced 2. About me… Ben…
1. Social Networks and Information Security- Oxymoron or can you have both? Ben Rothke, CISSP PCI QSA Senior Security Consultant BT Professional Services April 13, 2010 2.…
1. Session ID: Session Classification: Ben Rothke, CISSP CISM Wyndham Worldwide Corp. WHAT HAPPENS IN VEGAS GOES ON YOUTUBE: USING SOCIAL NETWORKS SECURELY STAR-107 Intermediate…
1. Session ID: Session Classification: Ben Rothke, CISSP, CISA Information Security Wyndham Worldwide Corp. STU-R35B Intermediate The Five Habits of Highly Secure Organizations…
1. Social networks and security – can you have both? Ben Rothke, CISSP, CISM CISASession SE-31 May 12, 2011@benrothke 2. About me• Ben Rothke, CISSP, CISM, CISA• Senior…
Slide 1 1 Privacy on the Internet HP World 2002 – Session 568 Ben Rothke, CISSP Senior Security Architect QinetiQ Trusted Information Management [email protected]…