Chat with Shafi Goldwasser ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT and Weismann Institute

Professors Shafi Goldwasser (r) and Silvio Micali (l) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Shafi Goldwasser is the RSA Professor of Electrical Engineering and Computer Science at MIT, and Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), as well as a professor of Computer Science and Applied…


Chat with Silvio Micali ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT

Professors Silvio Micali (l) and Shafi Goldwasser (r) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Silvio Micali, the Ford Professor of Engineering at MIT and a Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), is a recipient of the Gödel Prize from ACM SIGACT and EATCS. A Fellow…


David Alan Grier 2013 President IEEE-CS, Top International Technology and Policy Authority

David Alan Grier is the 2013 President of the IEEE Computer Society. He has served the society as its Vice President of Publications, Director of Magazines, and Editor in Chief of the IEEE Annals. He writes on the subject of technology and its social implications. His books include: "When Computers Were Human" (Princeton 2005), "Too…


Chat-Theresa Grafenstine Inspector General U.S. House of Representatives

The Honorable Theresa M. Grafenstine is the Inspector General of the U.S. House of Representatives (House). Ms. Grafenstine brings a variety of public service and non-profit experience to the House. Over the past twenty years, she has served in the Inspector General community in both the legislative and executive branches of the Federal Government. She…


Dave Roath: Leader PwC U.S. IT Risk & Security Assurance Practice

Dave is a Risk Assurance Partner that leads the PwC U.S. IT Risk & Security Assurance practice. He resides in New York, NY. Dave has more than 20 years of experience in Business Process and IT risk, IT security, IT audit and compliance/regulatory readiness. Dave has a strong background in delivering IT Risk Management and…


Speakers & Topics You Can't Miss--Security Education Conference Toronto Oct 1- 3, 2012 MTCC Toronto

SecTor is less than three weeks away and our speaker line-up is better than ever! Once again we’re bringing the world’s leading security professionals to Toronto. The second round of speakers has just been announced. Three are listed below, but be sure to check out the schedule to see all the keynotes, sessions and activities,…


Chat with Jerrard Gaertner International Leader in IT Security, Forensics, Governance, Auditing

Jerrard Gaertner CA•IT/CISA, CEGIT, CISSP, CIPP/IT, CIA, CFI, I.S.P., ITCP Jerrard Gaertner is Director, Technology Assurance Services at a major accountancy and advisory firm. He is a graduate of MIT and a chartered accountant specializing in information technology and information systems auditing. Jerry is certified in the Governance of Enterprise IT (ISACA), a Certified Information…


April 12 ACM Webinar: "Security: Computing in an Adversarial Environment"

The ACM is the world’s largest educational, scientific and professional association well known for their Turing Awards (the Nobel Prize of Computing http://en.wikipedia.org/wiki/Turing_Award) and their special interest groups (http://www.acm.org/sigs). What You’ll Learn: · The security mindset—what it is, why it’s needed · The social side of security—usability, adoption, identity, trust · A deeper dive on…


Interview Bashir Fancy CEO: Award-winning International Leader in Risk Management, Security, Fraud, Audit, Governance

Bashir Fancy — CEO Corporate Solutions & Services Inc. Bashir Fancy is a senior executive with extensive and progressive risk management, financial, operations, systems, customer service, product management, audit and governance experience globally. Mr. Fancy specializes in strategic planning and taking a pro-active, holistic approach in a fast paced financial, credit card and retail business….


April 12 Webinar: "Security: Computing in an Adversarial Environment"

Register NOW for ACM’s second-ever, free learning webinar, presented on Thursday, April 12, 2012 at 2 PM EST! Space is limited. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or…