The Arizona Telecommunications and Information Council (ATIC)
And the Arizona Cyber Security Alliance (ACSA) Present...
The Case for Cyber Security in Small Businesses Workshop
A "How To" Workshop to Secure Your Business
Tuesday, February 24, 2004, 7:30 AM - 12:00 PM
At the ASU Downtown Campus, Phoenix, AZ
7:30 - 8:30 AM: Registration, Continental Breakfast, and Security Showcase
8:30 - 11:30 AM Program & Morning Break:
Welcome: Jerry Crow, EDS and Co-Chair of the ATIC Cyber Security Committee will open the workshop
and introduce the speakers. Matt Levesque of Cisco Systems, an event sponsor, will welcome the attendees.
Risks to the Small Business: What are the problems the small business faces when it chooses to use the
Internet? The added risks run the gamut from denial-of-service attacks to viruses from e-mails to the penetration
and possible destruction of critical business systems, or even internal threats from current or former employees.
Tom Fraker, Executive Director, Arizona Small Business Association (ASBA), will discuss why going to
the Internet may be necessary for a small business and how to protect your business when going there.
Cyberliability: An Examination of Legal Issues and Technical Solutions with Christopher Pierson, Attorney
with Lewis and Roca, who will address the legal issues associated with information data security; compliance
with federal and state laws; and business continuity, disaster recovery, and insurance solutions. Governor
Napolitano recently appointed him to the Office of Homeland Security's Coordinating Council.
Questions & Answers: A panel moderated by Cindy Donaldson, TL Solutions and Co-Chair of the ATIC
Cyber Security Committee, consisting of the speakers, government representatives, and others will discuss the
issues and take questions from the audience including:
Tom Fraker, Executive Director, Arizona Small Business Association (ASBA)
Oris Friesen, Future Information Technologies and Vice Chair of ATIC
Tom Liffiton, Special Agent, Federal Bureau of Investigation (FBI)
Ryan McCaigue, Dean of Academic Alliances, DeVry University
Christopher Pierson, Attorney, Lewis and Roca LLP
Steve Peters, CITA and Co-Chair of the Arizona Cyber Security Alliance, will briefly discuss how the
Alliance, its web site, and its tool kit provide practical tips and resources including databases of security
consultants and educational organizations to help you get started on the road to information security.
Jim Patzer, President of the Arizona Education Consortium (AEC), an education and training resource for
the state, will briefly discuss the education and training opportunities available that can help you to better secure
your business on the Internet.
11:30 AM - Noon: Security Showcase continues with representatives from education and training providers
and from security and technology companies who will be on hand to show their stuff and field your inquiries.
Cyber Security Event Speakers:
Jerry Crow, Senior IT Security Architect, EDS and Co-Chair of the ATIC Cyber Security Committee
Jerry Crow, whose career spans more than 35 years in information technology, is currently developing security
related managed service offerings. His focus areas include IT security, privacy and security policies.
Phone: 602-395-8286, E-mail: email@example.com, URL: http://www.eds.com/
Cindy Donaldson, Principal, TL Solutions and Co-Chair of the ATIC Cyber Security Committee
Cindy Donaldson is a Certified Information Systems Security Professional (CISSP) with nearly 10 years of
experience in Information Security. She has consulted organizations of all sizes in the areas of access control,
application security, security training, security policy, risk management, network security, and business continuity
and disaster recovery.
Phone: 480-241-5720, E-mail: firstname.lastname@example.org, URL: http://www.tl-solutions.net/
Tom Fraker, Executive Director, Arizona Small Business Association (ASBA)
Tom Fraker is Executive Director of the Arizona Small Business Association (ASBA). He has built a broad base
of business experience in growing private organizations, as well as developing nonprofit entities.
Phone: 602-265-4563, E-mail: email@example.com, URL: http://www.asba.com/
Oris Friesen, Future Information Technologies and Vice Chair of ATIC
Dr. Oris Friesen, a 35 year veteran in information science, chairs an Industry Advisory Board at Mesa Community
College that has developed a new program in network security, information assurance and cyber forensics.
Phone: 602-992-4504, E-mail: firstname.lastname@example.org, URL: http://www.orisfriesen.com/
Tom Liffiton, Special Agent, Federal Bureau of Investigation (FBI) and Arizona InfraGard Chapter
Tom Liffiton is a Special Agent with the Phoenix office of the FBI. He is part of the Computer Crime Unit and
serves as FBI liaison to the Phoenix chapter of InfraGard.
Phone: 602-650-3105, E-mail: email@example.com, URLs: http://www.fbi.gov/ & http://www.azinfragard.org/
Ryan McCaigue, Dean of Academic Alliances and Network & Communications Management,
Ryan McCaigue, with over 15 years experience in information technology, is Dean of the Network and
Communication Management program for DeVry University and has contributed to books on information security
and encryption, as well as authored several university strategic technology vision documents.
Phone: 602-870-9222, E-mail: firstname.lastname@example.org, URL: http://www.phx.devry.edu/
Jim Patzer, President, Arizona Education Consortium (AEC)
Jim Patzer is President of the Arizona Education Consortium (AEC), a source of information and assistance for
employers seeking educational services for employees ranging from noncredit skills-based courses to complete
graduate degrees in business or technical fields delivered in person or online. He is also Director of Extended
Campus Programs at Arizona State University (ASU).
Phone: 480-727-5282, E-mail: email@example.com, URL: http://azec.org/ & http://www.asu.edu/xed/
Steve Peters, President, Community Information and Telecommunications Alliance (CITA)
and Co-Chair of the Arizona Cyber Security Alliance (ACSA)
Steve Peters is President of CITA and Co-Chair of the ACSA. He is also member of the ATIC Board and its
Cyber Security Committee, Co-Chair of the ATIC Strategic Telecom Planning Committee, and a Board member
of the Southern Arizona Technology Council (SATC) and the Greater Arizona eLearning Association (GAZEL).
Phone: 520-321-1309, E-mail: firstname.lastname@example.org,
URLs: http://www.tucsonlink.org/, http://www.azsecurity.org/, http://www.satc-az.com/ & http://www.gazel.org/
Christopher Pierson, Attorney, Lewis and Roca LLP
Dr. Pierson is an attorney in Lewis and Roca's Intellectual Property and Technology and Litigation Practice
Groups. He established the firm's Cybersecurity & Cyberliability practice area. Dr. Pierson was appointed by
Arizona Governor Napolitano to the Office of Homeland Security’s Homeland Security Coordinating Council. He
provides both counseling and litigation services for all issues affecting information technology systems including
Phone: 602-262-5763, E-mail: email@example.com, URL: http://www.lrlaw.com/
Cyber Security Event Sponsors:
Cisco Systems, Inc. (http://www.cisco.com/)
Cisco Systems is the worldwide leader in networking for the Internet. Today, networks are an essential part of
business, education, government and home communications, and Cisco Internet Protocol-based (IP) networking
solutions are the foundation of these networks. Cisco hardware, software, and service offerings are used to create
Internet solutions that allow individuals, companies, and countries to increase productivity, improve customer
satisfaction and strengthen competitive advantage. The Cisco name has become synonymous with the Internet, as
well as with the productivity improvements that Internet business solutions provide. At Cisco, our vision is to
change the way people work, live, play and learn.
Contact: Matt Levesque, Account Manager, Phone: 602-778-2117, E-mail: firstname.lastname@example.org
Mike Rutigliano, Account Manager, Phone: 602-778-2057, E-mail: email@example.com
Alana Briggs, Account Manager, Phone: 602-778-2129, E-mail: firstname.lastname@example.org
Sapphire Security Services (http://www.sapphire-security.com/)
Sapphire Security Services provides information and network security management expertise to help you manage
organizational risks through speaking, consulting, and training. We also help develop your security strategy and
team through individual and team coaching. Debbie Christofferson, President (CISSP, CISM) has a Fortune 500
background based on 20 years of business and international experience across the U.S., Europe and Greater Asia.
Debbie lives in Arizona and is available for worldwide assignments.
Contact: Debbie Christofferson, President, Phone: 480-988-4194, E-mail: email@example.com
Cyber Security Educational Exhibitors:
ASU East College of Technology and Applied Sciences (CTAS - http://www.east.asu.edu/ctas/)
Arizona State University East is a "new campus for a new millennium," the third ASU campus to be created. The
presence of the College of Technology and Applied Sciences is a major factor that sets it apart, offering
baccalaureate degree, graduate degree and non-degree programs in technological fields that support professional
careers, lifelong learning and professional development. There are numerous security educational opportunities
available at ASU East’s Division of Computer Studies.
Contact: Dr. Timothy E. Lindquist, Professor, Director Division of Computer Studies & Associate Dean College
of Technology and Applied Sciences, Phone: 480-727-1029, E-mail: firstname.lastname@example.org
Dr. Bruce R. Millard, Associate Professor, Phone: 480-727-1734, E-mail: email@example.com
ASU Fulton School of Engineering (http://www.fulton.asu.edu/)
ASU Ira A. Fulton School of Engineering provides undergraduate and graduate programs for engineering,
computer science and construction students, giving them the knowledge and skills they need for success in a
technically oriented career. Our internationally recognized faculty engage in use-inspired research in collaboration
with, and for the benefit of, individuals, organizations and society. We will offer an Information Assurance and
Security Certificate Program that encompasses the scientific, technical, and management disciplines required to
ensure the trustworthiness of information systems and networks starting in Summer, 2004. This program provides
the fundamental knowledge for professionals to be aware of and analyze threats to their information systems and
networks, to select and deploy the appropriate countermeasures, including both technical aspect and management
aspect, to reduce their exposure to cyber threats.
Contact: Herb Finkelstein, Research Liaison Officer, Phone: 480-965-3493, E-mail: firstname.lastname@example.org
Juli McGinnis, Senior Program Coordinator, Phone: 480-965-4104, E-mail: email@example.com
DeVry University (http://www.phx.devry.edu/)
DeVry University provides applications-oriented education in technology, business, and management to
thousands of students each year at campuses, centers, and online. Network and information security content and
skills development are threaded though the Bachelor and Masters programs where you will develop skills that
directly apply to the workplace taught by faculty with industry expertise.
Contact: Barry Landon, Outreach Manager, Phone: 602-870-9201, E-mail: firstname.lastname@example.org
Keller Graduate School of Management (http://www.keller.edu/programs/certificates_infosecurity.html)
Keller offers a Master of Information Systems Management concentrating in Information Security (15-course
program). For students who wish to specialize in Information Security without completing the entire Masters
program, a certificate option is available in our Graduate Certificate in Information Security (7-course program).
This Information Security curriculum includes courses in: Network Security, e-business security, Database
Security, Information Security Law, Risk Mitigation & Contingency Planning, and Cryptography & Security
Mechanisms. We also offer courses in Security Management including Security Risk Analysis, Security
Administration & Operation and Forensic & Business Investigation Techniques.
Contact: James Northam, Director of Admissions, Phone: 480-827-1511, E-mail: email@example.com
Cathy Chung, Senior Director of Admissions, Phone: 602-870-0117, E-mail: firstname.lastname@example.org
Maricopa Infosec Academy (http://infosec.maricopa.edu/)
The Maricopa Infosec Academy enables you to earn a degree in IT Security from one of six Maricopa Community
Colleges or broaden your knowledge of IT security to advance your career.
Contact: Ray Moore, Adjunct Faculty, GateWay Community College
Phone: 602-286-8589, E-mail: email@example.com
Stephen Wetzel, Cisco/Information Security Director, GateWay Community College
Phone: 602-286-8585, E-mail: firstname.lastname@example.org
Mesa Community College (MCC) Business & Industry Institute (http://bii.mc.maricopa.edu/)
The MCC Business & Industry Institute provides a variety of Information Technology (IT) training leading to
industry certifications through their training partners such as Sun Microsystems, Microsoft, Oracle, Cisco, Novell
and Ascendant Learning. In the interest of serving the community of IT professionals, knowledge workers, IT
managers and information security officers in the Phoenix area, MCC's Business & Industry Institute has
A Certificate Program in Network Security
A Certificate Program in Information Assurance
An AAS Degree Program in Information Assurance
A state-of-the-art Certificate Program in Cyber Forensics being developed for approval later this year
Contact: Cynthia Robards, Education/Training Consultant
Phone: 480-461-6112, E-mail: email@example.com
MindWorks/BD Computrain (http://www.mindworksaz.com/)
MindWorks Technical Training in Scottsdale is a Microsoft Certified Training Facility designed to meet the
training needs of IT and IS customers in Arizona. MindWorks has the following courses available in a public or
private class setting: Microsoft Security Classes, CISSP, Security +, Cisco, and Novell. Mindworks is located at
1465 North Hayden Road in Scottsdale. Visit us for a personal tour of the facility or visit us online at
Contact: David Creps, Account Executive, Phone: 480-874-1500, E-mail: firstname.lastname@example.org
Beth Hickey, Account Executive, Phone: 480-874-1500, E-mail: email@example.com
The University of Advancing Technology (UAT) Professional Development Center (http://pdc.uat.edu/)
In business since 1983, the University of Advancing Technology (UAT) offers students a unique hyperlearning
environment combining the best of a time-honored college education driven by a focus on advancing technology.
The University offers accredited Bachelors and Masters degrees as well as Associates degrees. The Professional
Development Center (PDC) at UAT offers corporate and individual training classes in network and security
technology, resulting in certifications and skills you need to get ahead.
Contact: Curt Yaworski, Account Executive, Phone: 602-383-8275, E-mail: firstname.lastname@example.org
Tron Brinkmann, Director of Professional Development Center, E-mail: email@example.com
Webster University - Luke AFB (http://www.webster.edu/)
Webster University is a member and partner with the American Society of Industrial Security (ASIS), who has
sponsored Webster to launch a Masters degree program worldwide in Business and Organizational Security
Management. This program has been offered since 1986 and granted over 400 M.A.s in Business and
Organizational Security Management, of special interest to those in law enforcement, public administration, and
the private security field. Since its founding in 1915, Webster University has been at the forefront of adult
education with 100 campuses worldwide, 55 of them on military bases, with over 20,000 students.
Contact: Shaughna Vaughan, Academic Advisor, Phone: 623-536-6881, E-mail: firstname.lastname@example.org
Cyber Security Industry Exhibitors:
Aetria Corporation (http://www.aetria.com/)
Aetria Corporation is a leading provider of Managed Security Services for small and medium sized businesses.
Our technology-led, ROI driven solutions are focused on providing flexible outsourced services that protect
critical information assets from an ever-changing spectrum of threats and misuse. These services enable our small
and medium sized business customers to increase productivity by leveraging the Internet to securely conduct
business. Please visit our website at http://www.aetria.com/ for more information.
Contact: William Mattull, President and CEO, Phone: 877-502-6327 x83, E-mail: email@example.com
Cisco Systems, Inc. (http://www.cisco.com/) - See entry under Cyber Security Event Sponsors above
Edgeos, Inc. (http://www.edgeos.com/)
Edgeos' flagship service is EdgeSecure, information security technologies that completely automate the process of
hacker vulnerability assessment and external information security auditing for security professionals and
enterprises. EdgeSecure is a managed service providing the industry's first 100% automated, remote, and self-
adaptive hacker vulnerability assessment. Using Edgeos' services, customers cut vulnerability assessment costs
10X and increase productivity 80%.
Contact: Jay Jacobson, Chief Executive Officer, Phone: 480-961-5996, E-mail: firstname.lastname@example.org
Erik Stephens, VP Software Development, Phone: 480-961-5996, E-mail: email@example.com
iLinc Communications (http://www.ilinc.com/)
iLinc offer a suite of web conferencing and collaboration software and services that facilitate better
communication via the Internet. Each of our modular products consistently wins awards for best-of-breed
software, but they also integrated together. iLinc is committed to continuing to deliver the highest quality
products and services with the single purpose of empowering our clients to reach their business objectives through
more effective communication.
Contact: Michael Evans, Account Executive, Phone: 602-718-1514, E-mail: firstname.lastname@example.org
InterdictIT (aka AdPak Communications) has been providing SOHO, corporate and enterprise security products
and services since 1999, creating barriers against unauthorized access, AntiVirus detection and prevention,
network intrusion detection, and IP forensics. Our security teams will evaluate your business model and network
needs thoroughly, and then provide you with best-of-breed security solution to fit your operational needs and
Contact: David Bryant, President, Phone: 623-936-4800 x202, E-Mail: email@example.com
Microsoft Corporation (http://www.microsoft.com/)
Microsoft has a Trustworthy Computing Initiative helping to ensure a safe and reliable computing experience that
is both expected and taken for granted. For Microsoft, Trustworthy Computing is also a companywide initiative
that is changing how we do business. The goals we set for Trustworthy Computing are designed to deliver the
level of trust and responsibility that people expect from the computing industry: Security, Privacy, Reliability, and
Contact: David Mayer, Partner Engagement Manager, Phone : 602-776-3612, E-mail: firstname.lastname@example.org
Marie Roqueni, Senior Technology Specialist, Phone: 602-280-8600, E-mail: email@example.com
Bryan Vincent, President, BVA Inc., Phone: 602-307-1800, E-mail: firstname.lastname@example.org
Tele-Com-Solutions provides outsourced telecom services for enterprise clients, large and small. They represent
them to telecom providers and act on behalf of their clients to optimize telecom service and carrier selection and
value, providing contract negotiations, service ordering, bill auditing, and customer service. Their ASP software
offering inventories telecom circuits, managing and optimizing their use across multiple client sites.
Contact: Jay “Flash” Miringoff, President, Phone: 602-421-8255, E-mail: email@example.com
TL Solutions, LLC (http://www.tl-solutions.net/)
TL Solutions delivers technology and security solutions that improve business operations and minimize risk to
organizations of all sizes. Having worked with small businesses, our approach of using risk-based methodologies
enables us to provide cost-effective solutions, which include security education and awareness, risk management,
vulnerability assessment, disaster preparedness, access control, networking and technology evaluation.
Contact: Cindy Donaldson, Principal, Phone: 480-241-5720, E-mail: firstname.lastname@example.org
Dean McDonald, Information Security Analyst, Phone: 602-659-6967, E-mail: email@example.com
Danny Yong, Security Engineer, Phone: 623-582-0547, E-mail: firstname.lastname@example.org
Cyber Security Event Producers:
The Arizona Telecommunications and Information Council: ATIC (http://atic.researchedge.com/) is
Arizona's recognized and authoritative organization guiding technology policy development, serving as a
leading source of information and expertise on telecommunications and information technology matters. ATIC
develops, promotes and supports initiatives and guides adoption of effective public policies that encourages
wide-scale deployment and availability of telecommunications services and information technologies to insure
economic prosperity for the Arizona community, expand the region's global competitive advantage, enable
continued educational advancement and support an enhanced quality of life. ATIC’s Cyber Security Committee
serves as an advocate for cyber security in Arizona, which includes protecting both telecommunication
infrastructure and data content. As such, ATIC facilitates communication among stakeholders and provides a
forum to educate, to market, and to promote best practices of cyber security to the media, opinion leaders, and
the public at large. Contact ATIC at email@example.com or by phone at 602-254-5887.
The Arizona Cyber Security Alliance: ACSA (http://www.azsecurity.org/) is a project of the Tucson's
Community Information and Telecommunications Alliance (CITA - http://www.tucsonlink.org/). The statewide
Cyber Security Alliance helps the Arizona community understand the rising security threats and develop
strategies to reduce personal, customer and business risks. ACSA particularly targets IT professionals and
executives of small business and nonprofit organizations. CITA is a nonprofit organization dedicated to
Building Links to the Electronic Future that will support Arizona's educational, economic and community
development and is a leader working to ensure that all citizens, schools, businesses and community
organizations in Arizona have access to, and the ability to maximize the use of technology. Contact ACSA at
firstname.lastname@example.org or by phone at 520-321-1309.