Curriculum Vitae - Education 2008

 

Education in Year: 2008                                            Page (Up) or (Down)

(ISC)2

  1. CISSP - Certified Information Systems Security Professional, Nov '07 to Nov '10


ISACA

  1. CGEIT - Certified in the Governance of Enterprise IT, Oct '08 to Jan ’12

  2. CISM - Certified Information Security Manager, Feb '03 to Jan '09


International Register of Certified Auditors (IRCA)

  1. ISMS Provisional Auditor, Dec '08 - '09

  2. ISMS Provisional Auditor, Dec '07 - '08


Information Technology Infrastructure Library (ITIL)

  1. ITIL: Foundation Certification v3, May '08


SunGard/Strohl Systems

  1. BIA Professional Software - Business Impact Assessment - Training, Apr '08


Intel

  1. Microsoft SCCM 2007 SP1 Intel vPro Training Videos Introduction, Nov '08


McAfee

  1. Technical: ePolicy Orchestrator 4.0 Essentials, Mar '08

  2. Technical: ePolicy Orchestrator 4.0 Introduction, Mar '08


Symantec

  1. STS - Symantec Endpoint Protection v11, Aug '08 ()

  2. SCS - Symantec Endpoint Protection v11.0 Administrator, Apr '08

  3. Partner Technical Training Class: Symantec Network Access Control 11.0 - Troubleshooting and Enforcers, Apr '08

  4. Partner Technical Training Class: Symantec Network Access Control 11.0 - Fundamentals, Apr '08

  5. Partner Technical Training Class: Symantec Endpoint Protection 11.0 - Technical Overview, Apr '08

  6. Partner Technical Training Class: Symantec Control Compliance Suite 8.5, Apr '08


Symantec Enablement Toolkit

  1. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Planning Methodology, Mar '08

  2. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Knowledge Transfer Methodology, Mar '08

  3. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Assessment Methodology, Mar '08

  4. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Initial Tuning Methodology, Mar '08

  5. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Deployment/Migration Methodology, Mar '08

  6. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Architecture Design Methodology, Mar '08

  7. Consulting Methodology: Service Offering: SEP/SNAC Enablement - Offering Overview SAV/SCS Migration, Mar '08

  8. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Network Audit and Remote Client Installation, Mar '08

  9. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Active Directory Integration, Mar '08

  10. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Component Placement, Mar '08

  11. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: System Architecture, Mar '08

  12. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Reporting, Mar '08

  13. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Logging, Mar '08

  14. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Client Organization and Location, Mar '08

  15. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Migration Overview, Mar '08

  16. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Administration Overview, Mar '08

  17. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Installation Overview, Mar '08

  18. Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - What is New, Mar '08

  19. Pre-Sales Technical: Symantec Endpoint Protection 11.x Tips for Performing a Successful Customer Demo, Mar '08

  20. Pre-Sales Technical: Symantec Endpoint Protection 11.x Technical Architecture, Mar '08

Novell

  1. Positioning & Selling Novell Access Manager 3, Feb '08


ISACA e-Symposiums

Application Security: Attack and Response, Aug ’08

  1. Bridging SOA and IT Governance: Policy or Peril
    Darren Jones, CMA, Director, CIO Solutions and Enterprise Information Management, Protiviti Canada

  2. The PCI Data Security Standard: A Practitioner’s Primer
    Ken Zeng, CISA, Sr. Director - Governance, Risk, & Compliance, Oracle

  3. Compliance: Where are we now?
    Ivan Wallis, U.S. West Applications Engineer, SSH Communications Security, Inc

  4. Gambling with security: Ignoring Web application security isn't just a compliance issue. It's a risk issue.
    Michael Weider, Director of Security Products, IBM Rational IBM Software Group

Security and Compliance Unite, Jul ’08

  1. Realizing the Business Benefits of Deploying a Practical Model for Information Security and Risk Management
    Vernon Poole, CISM,CGEIT, Head of Business Consultancy, Sapphire Technologies Ltd.

  2. Automating the Convergence of Security and Compliance
    Mark Seward, CISA, CISSP, Director Product Marketing Compliance, Qualys

  3. Compliance Integration and Security Alignment
    Roger Southgate, CISA, CISM, FCCA, MBA, Leader of the London COBIT Development Group and immediate past president of the London Chapter

  4. Risk and Compliance Management: An Approach Based on Real-world Statistics
    Simon Oxley, Managing Director, Citicus Ltd.

Security, Privacy and Trust, Jun ’08

  1. Identity Attributes Design
    Naiden Nedelchev, CISM, Technology Security Officer, Mobiltel EAD

  2. Security, Privacy, and Trust - Mission Impossible?
    Mike Small, Principal Consultant Security Management, CA

  3. Identity Management – Beyond Provisioning
    Meenu Gupta, CISA,CISM,CISSP, President, Mittal Technologies

  4. Assessing and Securing Wireless Networks
    Douglas Haider, CISA,CISM,CISSP,PMP, Principal Wireless Security Consultant, Accuvant

Data Protection/Data Security, May ’08

  1. Common Information Security Threats Inside Our Organizations
    Andrew Vesay, CISSP, Managing Partner. Practical Compliance Initiatives

  2. Meeting Global Compliance Intiatives While Protecting your Core Data Assets
    Rob Barnes, Manager of Consultant Relations, Application Security Inc.
    Toby Weiss, CEO, Application Security Inc

  3. Safeguarding Customer Data while Enabling Collaboration
    Bruce Hicks, Data Security Services, IBM ISS

  4. Protecting Data Privacy; A Practical Guide to Managing Risk
    Nathan Johns, Senior Audit Manager, Crowe Chizek

Assessing IT GRC Maturity, Apr ’08

  1. Enterprise Resiliency: Building Competencies to Adapt to Risk Environments
    Lisa Young, Senior Member, Technical Staff, Carnegie Mellon University

  2. IT Governance Strategy
    Renee Murphy, Managing Director, Fyoozhen Consulting

  3. IT GRC Maturity: Improving Business Results & Curtailing Financial Loss
    Jim Hurley, Managing Director, IT Policy Compliance Group, Symantec

  4. Enterprisewide IT Risk Assessment
    Julia Bird, Internal Auditor, City of Phoenix

PCI Compliance, Marc ’08

  1. CI and IT Governance
    Jim Cowing, CISSP, CISM, CITP, Managing Director , Digital Resources Group

  2. Understanding the Requirements - What are they and What's New on the Horizon
    Dorian Cougias, CEO, Network Frontiers and a member of the PCI Security Standards Council

  3. Specific Solutions to PCI and What to Look for in a Vendor
    Geoff Webb, Senior Product Marketing Manager, NetIQ

  4. The PCI Data Security Standard
    Steve Enevold, CISSP, GSEC, CISM, Director, Enterprise Security Architecture, Oracle

Application Security—The New Perimeter, Feb ’08

  1. Application Threat Modeling
    Tony UcedaVelez, Executive Director, VerSprite

  2. Building Business Case for Application Security Using Value Chain Model
    Robertas Vageris, CISA, CISM, Director, ASE.LT

  3. Why Should Your Web Applications Keep You From Sleeping at Night?
    Humbert Low, CISM,CISA,CPA,CISSP, Service Line Leader/Information Protection and Business Resilience Advisory Services, KPMG LLP

  4. Changing Technologies for Meeting your Security Needs
    Chris Wysopal, Co-Founder/Chief Technology Officer, Veracode


SANS Institute Webcast

  1. SQL Injection and My Oracle Database

Andrew R. Reese


Mobile: (717) 395-3063


Links to more detail:

  1. CV Overview

  2. CV Education

  3. CV Experience

  4. Security Practice

  5. Security Tips

  6. My Security Pledge