DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Securing your presence at the perimeter

1. Securing your presence at the perimeter Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant 2. About me…. • • • • Ben Rothke (too many certifications)…

Technology Mobile security blunders and what you can do about them

1. Mobile security blunders and what you can do about them Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant 2. About me….• Ben Rothke (too many certifications)•…

Technology The Cloud is in the details webinar - Rothke

1. The cloud is in the details –policy and requirements inthe era of cloud computing Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant 2. About me•…

Technology Rothke rsa 2012 building a security operations center (soc)

1. Session ID: Session Classification: Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Building a Security Operations Center (SOC) TECH-203 Advanced 2. About me…  Ben…

Technology E5 rothke - deployment strategies for effective encryption

1. Deployment Strategies for Effective Encryption Session E5 Tuesday April 3, 2012 9:45AM - 10:45AM Ben Rothke, CISSP CISM Wyndham Worldwide - Manager - Information Security…