Ben Rothke, CISSP, CISM, CISA is a New York city based Information Security professional and has over 20 years of industry experience in information systems security and privacy.
His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design & implementation of systems security, encryption, cryptography and security policy development.
Ben is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill), and writes security and privacy book reviews for the RSA Conference blog and Security Management.
He is a frequent speaker at industry conferences, such as RSA and MISTI, is a member of ASIS, and InfraGard, and hold the CISM, CISA, CGEIT, CRISC, CISSP certifications, and is an ISO 27001 lead auditor.
Speaking Engagements:
2020 |
|
Deployment Strategies for Effective Encryption |
|
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares |
|
2019 |
|
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares |
|
2018 |
|
Effectively Implementing and Managing Electronic Data Disposal and Destruction |
|
Ransomware - How not to be a victim, and what to do when you become one |
|
2017 |
|
Countering Cyberespionage |
|
Dealing with Cyberextortion, Ransomware and Other Bad Stuff |
|
Dealing with Cyberextortion, Ransomware and Other Bad Stuff |
|
2016 |
|
Habits of an Effective CISO |
|
Selecting an eGRC software tool and not living to regret it |
|
2015 |
|
In Memory of Barnaby Jack: Why Medical Device Makers Don’t Get InfoSec |
|
2014 |
|
Now That You’re In, How Do You Get Out? Terminating Cloud Services |
|
See Dead Hard Drives: Effectively Implementing & Managing Electronic Data Disposal & Destruction |
|
2013 |
|
Deployment Strategies for Effective Encryption |
|
2012 |
|
|
|
|
|
2011 |
|
|
|
Social Networks and Information Security: An Oxymoron or Can You Have Both |
|
Effectively Implementing and Managing Electronic Data Disposal |
|
Social Networks and Security - Can You Have Both? |
|
Social Networking and Information Security |
|
The Cloud is in the Details: Security Policy and Privacy Requirements in the Era of Cloud Computing |
|
2010 |
|
Social Networks and Security - Can You Have Both? |
|
Building a Security Operations Center (SOC) |
|
Deployment strategies for effective encryption |
|
Social Networks and Information Security - Oxymoron or can you have both? |
|
|
|
2009 |
|
Stimulate Your Career as a Security Professional |
|
Building a Security Operations Center (SOC) |
|
|
|
|
|
2008 |
|
|
|
The Time is Now: The Convergence of Networks, Time Synchronization and Information Security |
|
|
|
Biometrics & Aviation 2008: The Opportunities and the Challenges |
|
Building a Security Operations Center (SOC) |
|
|
|
Deployment Strategies for Effective Encryption |
|
2007 |
|
The Five Habits of Highly Secure Organizations |
|
|
|
Encryption Strategies for Compliance |
|
Everything an audit professional needs to know about know about encryption and cryptography in 60 minutes |
|
|
|
Anatomy of an Information Security Audit and How To Pass It |
|
|
|
2006 |
|
Using Network Admission Control |
|
What Every Employee Needs to Know About Information Security |
|
Biometrics 2006: Opportunities and Challenges |
|
Technology Managers Forum: Security Strategies for the Enterprise |
The Problem with Security Monitoring: Who Does What, When--and to Whom |
|
|
|
|
2005 |
|
Sarbanes-Oxley for the Security Professional |
|
Best Practices in Information Security |
|
Building a Corporate Security Operations Center (SOC) |
|
Computer Security and Privacy Regulations |
|
Securing Your Collaboration Efforts from Malware Threats |
|
Best Practices in Purchasing Security Products |
|
|
|
2004 |
|
Design Before Implementation, The Need For A PKI Methodology |
|
|
|
Best Practices on Purchasing Information Security Products |
|
|
|
|
|
Sarbanes-Oxley for the Information Security Professional |
|
Caveat Emptor – How to purchase information security products |
|
Information Sharing Intelligence: It’s a Two-Way Street |
|
Conference Board: Business Continuity, Security & Crisis Management |
IT Security, Cyberterrorism and Cyberisk |
How to purchase information security products |
|
InfoSec World 2004 |
|
2003 |
|
InfoSecurity Conference NY 2003 |
|
CSI 2003 |
|
ASIS International Conference 2003 |
|
ISACA Network Security Conference |
|
CA World 2003 |
Computer Security and Privacy Regulations and Standards |
CSI NetSec 2003 |
|
ISSA New York Metro Annual Security conference 2003 |
Computer Security and Privacy Regulations |
2002 |
|
InfoSecurity Conference NY 2002 |
Caveat Emptor – How to purchase information security products |
CSI Annual Conference 2002 |
|
21 CFR Part 11 Week |
|
HP World 2002 |
|
Vanguard Annual Conference 2002 |
|
NetSec 2002 |
|
HealthTech 2002 |
|
ISSA New York Metro Annual Security conference 2002 |
|
CA World 2002 Conference |
The World is Turning to PKI - Should You? - invited |
RSA 2002 |
|
Legal Tech 2002 |
Information Security - No Quick Fix |
2001 |
|
InfoSecurity Conference NY 2001 |
Why Internet Hackers are Not Your Biggest Threat |
CSI Annual Conference 2001 |
|
RSA Europe 2001 |
Design before implementation, the need for a PKI methodology – invited |
HealthSec Conference and Expo 2001 |
|
NetWorld+Interop 2001 |
Introduction to PKI (full-day course) |
HP World 2001 |
A Pragmatic Approach to Purchasing Information Security Products |
CA World 2001 |
The World is Turning to PKI - Should You? |
CSI NetSec 2001 |
|
Vanguard Enterprise Security Expo 2001 |
|
ISSA New York Metro Annual Security conference 2001 |
The World is turning to PKI - should you? |
InterWorks 2001 Conference
|
|
ISACA North America CACS Conference 2001 |
|
E-Finance Expo 2001 |
The World is Turning to PKI - Should You? |
Electronic Payments 2001 |
e-Security for Consumer Markets |
InfoSec World Conference 2001 |
Auditing Checkpoint Firewalls |