
John Pironti
President IP Architects, LLC.
- Rowley MA
Experienced, knowledgable, dynamic, high energy speaker who is an industry thought leader information risk management and security and has a
Social
Biography
Industry Expertise
Areas of Expertise
Accomplishments
John Kayers Speaking Award
Award for being top speaker globally for ISACA.
Education
Rochester Institute of Technology
Bachelor of Science
Imaging Systems Management
1996
Rochester Institute of Technology
Bachelor of Science
Imaging Systems Management
1996
Affiliations
- CGEIT, CISA, CISM, CISSP, CRISC, ISSAP, ISSMP
Links
Sample Talks
Threat and Vulnerability Analysis
In order to create an appropriate security solution for an organization you must first understand the problem that you are trying to solve with the solution. Threat and Vulnerability Analysis techniques utilize methodologies which attempt to quantify the capabilities and willingness of an adversary to attack a solution as well as the inherent weaknesses which exist within the solution. Once you understand these concepts you can then create appropriate countermeasures and risk management techniques which can turn potentially devastating attacks into an operation's anomalies. This presentation will discuss some of the key considerations which need to be addressed during a threat and vulnerability analysis activity and the best practices which are associated with this type of activity.
The Future of Information Security - What's Next?
Information risk management and security has evolved from a technical specialty into a core and essential business function. The people, processes, procedures, and technologies that are utilized to protect information infrastructure and data are changing and evolving at a rapid pace. So too have the capabilities of the adversaries from whom we need to protect ourselves from. The fast paced introduction of new concepts and technologies such as mobility, virtualization, cloud computing, and social networking have dramatically advanced and changed the way we do business as well as the footprint for our critical data assets. They have also expanded the threat landscape that needs to be understood and approached proactively by organizations to ensure they are able to identify and appreciate the threats and vulnerabilities that exist in their ecosystems and how integrate this information into their risk management activities. This session will discuss how adversaries and threats they pose are evolving as well as the emerging trends and industry leading practices in information risk management and security that are being used to proactively protect information infrastructure and data assets from them. The areas that will be discussed in this session include current and evolving industry leading practices and concepts including governance and organizational models and concepts, threat and vulnerability management capabilities, and advances in both attack and protective methods, practices, and technologies.
Developing Metrics and Measures for Effective Information Security Governance
Information security has become a critical issue within organizations, and a key success factor for businesses. In order to effectively maintain the integrity and security of an organization’s information infrastructure effective security metrics and measures must be developed, implemented, and monitored. This presentation will discuss the concept of enterprise security metrics and measures and the concepts and topics that must be considered when developing, implementing, and monitoring them. These topics will include the identification of measurable points and activities, the development of meaningful metrics and measures, monitoring concepts, and reporting strategies. Case studies and scenarios will also be used to demonstrate operational scenarios for the benefits and challenges of this concept throughout the presentation.
Style
Availability
- Keynote
- Moderator
- Panelist
- Workshop Leader
- Host/MC
- Author Appearance