Trainer

Ben Rothke

Ben Rothke, CISSP, CISM, CISA is a New York city based Information Security professional and has over 20 years of industry experience in information systems security and privacy.

His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design & implementation of systems security, encryption, cryptography and security policy development.     

Ben is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill), and writes security and privacy book reviews for the RSA Conference blog and Security Management.

He is a frequent speaker at industry conferences, such as RSA and MISTI, is a member of ASIS, and InfraGard, and hold the CISM, CISA, CGEIT, CRISC, CISSP certifications, and is an ISO 27001 lead auditor.

Speaking Engagements:

2020

Mind The Sec 2020

Deployment Strategies for Effective Encryption

Secure360

The PCI Dream Team: Solving the Biggest PCI DSS Nightmares

2019

 

ISC2 Congress

The PCI Dream Team: Solving the Biggest PCI DSS Nightmares

2018

 

InfoSec World 2018

Effectively Implementing and Managing Electronic Data Disposal and Destruction

RSA 2018

Ransomware - How not to be a victim, and what to do when you become one

2017

 

RSA 2017

Countering Cyberespionage

InfoSec World 2017

Dealing with Cyberextortion, Ransomware and Other Bad Stuff

CyberSecurity World

Dealing with Cyberextortion, Ransomware and Other Bad Stuff

2016

 

RSA 2016

Habits of an Effective CISO

InfoSec World 2016

Selecting an eGRC software tool and not living to regret it

2015

 

InfoSec World 2015

In Memory of Barnaby Jack: Why Medical Device Makers Don’t Get InfoSec

2014

 

RSA 2014

Now That You’re In, How Do You Get Out? Terminating Cloud Services

InfoSec World 2014

See Dead Hard Drives: Effectively Implementing & Managing Electronic Data Disposal & Destruction

2013

 

RSA 2013

Deployment Strategies for Effective Encryption

2012

 

RSA 2012

  • What Happens in Vegas Goes on YouTube: Security and Corporate Social Networks
  • Building a Security Operations Center (SOC)

InfoSec World Conference 2012

  • Effectively Implementing and Managing Electronic Data Disposal and Destruction
  • Deployment Strategies for Effective Encryption

2011

 

RSA 2011

  • Old Media Where Art Thou? Handling Media Destruction
  • What Happens in Vegas Goes on YouTube: Security and Corporate Social Networks

ISACA Euro CACS 2011

Social Networks and Information Security: An Oxymoron or Can You Have Both

Secure360

Effectively Implementing and Managing Electronic Data Disposal

Interop Las Vegas 2011

Social Networks and Security - Can You Have Both?

ISACA NACACS

Social Networking and Information Security

Cloud Security Alliance Congress

The Cloud is in the Details: Security Policy and Privacy Requirements in the Era of Cloud Computing

2010

 

Interop New York

Social Networks and Security - Can You Have Both?

Secure360

Building a Security Operations Center (SOC)

Computer Forensics 2010

Deployment strategies for effective encryption

Infotec 2010

Social Networks and Information Security - Oxymoron or can you have both?

RSA 2010

  • Corporate Information Security and Social Networks
  • Tales from the Info Security Reading Room: Most of the Best and a Little of the Worst

2009

 

CSI 2009

Stimulate Your Career as a Security Professional

RSA Europe 2009

Building a Security Operations Center (SOC)

Secure360

  • So You Want to Become a Security Professional

RSA 2009

  • PCI in 2009: A Look at the Legal and Practical Aspects of the DSS
  • Corporate Information Security and Social Networks
  • Time Synchronization – Your Logs Depend On It

2008

 

MEITSEC 2008

  • Building a Security Operations Center (SOC)
  • The Five Habits of Highly Secure Organizations

RSA Europe 2008

The Time is Now: The Convergence of Networks, Time Synchronization and Information Security

IT Security World

  • Deploying NAC: IS the benefit worth the cost?
  • HSPD-12: Making Less Money Return More Security

Airport Operations Area conference

Biometrics & Aviation 2008: The Opportunities and the Challenges

ISC West

Building a Security Operations Center (SOC)

RSA 2008

  • Biometrics 2008: Opportunities and Challenges
  • Computer-Generated Liability (panel)

InfoSec World 2008

Deployment Strategies for Effective Encryption

2007

 

CSI Conference 2007

The Five Habits of Highly Secure Organizations

RSA Europe 2007

  • So You Want to Become a Security Professional
  • Design Before Implementation -The Need for a PKI Methodology
  • Computer Security Certifications – Separating Paper Certifications from Indispensable Ones

Conference on Preventing Data Leakage

Encryption Strategies for Compliance

Infosecurity Canada

Everything an audit professional needs to know about know about encryption and cryptography in 60 minutes

InfoSec World 2007

  • So you want to be a CISSP
  • Biometrics 2007: Opportunities and Challenges
  • How to Plan for Endpoint Security

Patchlink 360

Anatomy of an Information Security Audit and How To Pass It

RSA 2007

  • The Five Habits of Highly Secure Organizations
  • The Options Backdating Fiasco: Time-Based Data Control Issues Leads to Compliance Problems, Shareholder Lawsuits and Criminal Indictments.
  • Promoting an Effective Infosec Program to Senior Management

2006

 

CSI Conference 2006

Using Network Admission Control

SIA Technology Management Conference

What Every Employee Needs to Know About Information Security

CSI NetSec 2006

Biometrics 2006: Opportunities and Challenges

Technology Managers Forum:  Security Strategies for the Enterprise

The Problem with Security Monitoring: Who Does What, When--and to Whom

InfoSec World 2006

  • Biometrics 2006: Opportunities and Challenges
  • Everything you need to know about cryptography in 90 minutes
  • The Time is Now: The Convergence of Networks, Time Synchronization and Information Security

STKI Summit 2006

  • Information Security Best Practices
  • Building a Information Security Operations Center
  • Design before Implementation, the Need for a PKI Methodology

2005

 

CSI Conference 2005

Sarbanes-Oxley for the Security Professional

Rackspace Security & Innovation Summit 2005

Best Practices in Information Security

Cyber Security in the Financial Services Sector

Building a Corporate Security Operations Center (SOC)

C3 Expo

Computer Security and Privacy Regulations

Collaborative Technologies Conference

Securing Your Collaboration Efforts from Malware Threats

Security Leadership Conference 2005

Best Practices in Purchasing Security Products

InfoSec World 2005

  • Sarbanes-Oxley for the Security Professional
  • Biometrics: Effective security architecture and deployment strategies

2004

 

CSI Conference 2004

Design Before Implementation, The Need For A PKI Methodology

Cyber Security in the Financial Services Sector

  • Sarbanes-Oxley for the Security Professional
  • Biometrics: Is it a practical cybersecurity solution?

Security Leadership Conference

Best Practices on Purchasing Information Security Products

HealthSec 2004

  • Everything you need to know about cryptography in 90 minutes
  • Auditing Firewalls

Vanguard Security Conference 2004

  • Auditing Computer Systems
  • Writing computer Security Policies

SIA Technology Management Conference

Sarbanes-Oxley for the Information Security Professional

CSI NetSec 2004

Caveat Emptor – How to purchase information security products

Homeland Security Summit

Information Sharing Intelligence: It’s a Two-Way Street

Conference Board:  Business Continuity, Security & Crisis Management

IT Security, Cyberterrorism and Cyberisk

CA World 2004

How to purchase information security products

InfoSec World 2004

2003

 

InfoSecurity Conference NY 2003

CSI 2003

ASIS International Conference 2003

Computer Security and Privacy Regulations and Standards

ISACA Network Security Conference

Computer Security and Privacy Regulations and Standards

CA World 2003

Computer Security and Privacy Regulations and Standards

CSI NetSec 2003

ISSA New York Metro Annual Security conference 2003

Computer Security and Privacy Regulations

2002

 

InfoSecurity Conference NY 2002

Caveat Emptor – How to purchase information security products

CSI Annual Conference 2002

21 CFR Part 11 Week

HP World 2002

Vanguard Annual Conference 2002

NetSec 2002

  • PKI for Dummies

HealthTech 2002

  • HIPAA and its security implications

ISSA New York Metro Annual Security conference 2002

  • Computer Security Regulations: From HIPAA, GLBA to E-SIGN and more
  • Privacy On The Internet - Why You Should Care And What You Can Do

CA World 2002 Conference

The World is Turning to PKI - Should You? - invited

RSA 2002

HIPAA and its security implications

Legal Tech 2002

Information Security - No Quick Fix

2001

 

InfoSecurity Conference NY 2001

Why Internet Hackers are Not Your Biggest Threat

CSI Annual Conference 2001

  • PKI for Dummies
  • Digital Certificates and e-signatures

RSA Europe 2001

Design before implementation, the need for a PKI methodology – invited

HealthSec Conference and Expo 2001

  • PKI for Dummies
  • Digital Certificates and e-Signatures

NetWorld+Interop 2001

Introduction to PKI (full-day course)

HP World 2001

A Pragmatic Approach to Purchasing Information

Security Products

CA World 2001

The World is Turning to PKI - Should You?

CSI NetSec 2001

  • A Pragmatic Approach to Purchasing Info Security Products
  • Using PGP

Vanguard Enterprise Security Expo 2001

ISSA New York Metro Annual Security conference  2001

The World is turning to PKI - should you?

InterWorks 2001 Conference

 

  • A Pragmatic Approach to Purchasing Information Security Products
  • Using PGP
  • Introduction to PKI and Certificate Authorities

ISACA North America CACS Conference 2001

  • Cryptography: the IS Auditor's Perspective
  • HIPAA and its security implications

E-Finance Expo 2001

The World is Turning to PKI - Should You?

Electronic Payments 2001

e-Security for Consumer Markets

InfoSec World Conference 2001

Auditing Checkpoint Firewalls