Speaking Engagements


Orange County Oracle Users Group Meeting
Adrian Lane, CTO, IPLocks, Inc.
Session: Sustaining Compliance
September 13, 2006
Irvine, CA

CSI 32nd Annual Computer Security Conference & Exhibition
Dr. Nicholas Imparato
Session Title: "Database Security and Global Brand Value"
Session Track: Critical Issues
November 14-16, 2005
Washington DC

The 2005 Annual Teradata PARTNERS User Group Conference and Expo
Adrian Lane, CTO, IPLocks, Inc.
Session Title: "Don't Become the Next Headline"
Take your business to the next level of success. Join 2,800 Teradata professionals in connecting with colleagues and industry experts from around the world. Hear what your peers have to say as acclaimed speakers, industry experts, and technical gurus discuss Teradata and partnership solutions that can grow your business.
Session Track: Delivering & Evolving your BI/DW Strategy
September 18-22, 2005
Orlando, FL

The Finance & Accounting Forum
Adrian Lane, CTO, IPLocks, Inc.
Addressing the Information Security Lifecycle and Protecting Critical Information Assets from Negligent and Malicious Acts
This Forum is FMS' most popular and prestigious event. Its unique blend of powerful educational sessions, Marketplace exhibits and networking opportunities will help you stay abreast of the critical issues facing your institution. The Forum offers four tracks, each focused on a specific topic in the financial services industry. You may select to follow one track or mix and match sessions from several track to best meet your needs: Accounting, Finance, Internal Auditing, and Strategic Issues.
June 12 - 14, 2005
Las Vegas, NV

Secure IT 2005 Conference
Adrian Lane, CTO, IPLocks, Inc.
Security Inside the Perimeter: Keys to Protecting Proprietary Information within the Database and Achieving Regulatory Compliance
Information is the most important resource any organization controls. Ensuring the confidentiality of information is crucial in today's world. To help guard against the increasing risk of identity theft, corporate espionage, data pirating, cyber terrorism, and information security breaches, the California State University is proud to present Secure IT 2005, an information technology and network security conference, in San Diego, California. The conference will focus on key issues related to information and network security, with presentations provided by recognized experts and exhibits by some of the nation's leading organizations.
April 19-22, 2005
San Diego, CA

IAPP National Summit 2005
Dr. Nick Imparato
Panel; Communicating Privacy - Getting Invited into the Executive Suite
Privacy = Trust = Brand Loyalty
The equation is simple. Protect your customer’s privacy; they’ll trust your brand. But protecting privacy is a tough job. You need to comply with a bewildering mix of legal, technological, and industry standards before you can begin using privacy to build ROI. So join us and take a deep dive into the latest strategic thinking on privacy at the IAPP National Summit, March 9-11, in Washington, DC. Network with top-level professionals, learn from regulators, and gain valuable perspective from industry leaders. The agenda is packed with information for the new privacy pro to the seasoned expert and everyone in between. Learn from your colleagues and gain new insights into the most pressing issues facing industry.
March 9 - 11, 2005
Washington, DC

Share Systems Management Symposium
Glinda Cummings
Vigilance at the Source – Database Security that Never Sleeps
Driven by regulations or security policy, corporations are under pressure to mitigate business process and information risks while maintaining day-to-day business productivity. An atmosphere of dynamic tension is growing in the tug of war, pitting controls against empowerment that puts added stress on management, security and IT. When in reality, each corporation's primary focus should be on assuring complete, accurate and reliable information (data). In the face of conflicting objectives, this can best be accomplished by protecting the source - the databases that house mission critical business and financial information. Continuous, automated auditing and monitoring of database privileges, database security parameter settings, transaction monitoring, user behavior trends, access usage and much more are the essential key to ensuring protection. This presentation describes the requirements for database monitoring that can help you strike a balance between business productivity and controls.
February 27 - March 4, 2005
Anaheim, CA

UK Trade & Investment Information Security Panel
Christine Crandell
The International Enterprise: Information Security as a Strategic Opportunity
February 16, 2005
Sony Metrion
San Francisco, CA