Information Security Blog

Security Sherpa to Speak on Securing an Organization at 2012 International Conference on Cyber Security

Security Sherpa to Speak on Securing an Organization at 2012 International Conference on Cyber Security

Hamilton, NJ (PRWEB) December 08, 2011

As an expert in Cyber Security, John Verry (Pivot Point Security) takes his role as “Security Sherpa” (guide) quite seriously, believing that security is a path not a destination. Committed to helping entities of all sizes and shapes achieve their security goals, Verry has led hundreds of high-profile security assessments across diverse noteworthy systems in government, telecommunications, critical infrastructure, finance and transportation for over ten years.

A frequent speaker on information assurance, Verry often emphasizes management’s role in controlling information security risk. He writes the Risky Business blog on the Pivot Point Security website and has authored numerous information assurance white papers and articles. Prior to Pivot Point Security, Verry was the primary architect for Police Central, where he developed highly secure criminal justice solutions for some of the United States’ largest law enforcement agencies.

On January 11, At the 2012 International Conference on Cyber Security, John Verry will be speaking about, It Takes a Village… To Secure An Organization. How to leverage your competitors and attackers to be more secure.

Information Security personnel generally think of information security as an “us against them” proposition – but in an increasingly connected world – the line between “us” and “them” is more and more blurred. In the “old” days, security was an insulated concept – something security personnel imposed on everyone else, keeping the village “us” safe from the non-village “them”.

Forward thinking security practitioners realize that there is a great deal to be learned from “them” – information that is invaluable in shaping and contextualizing what we see, how we respond to it, and ultimately in making us more secure. The presentation illustrates interesting new ways organizations are leveraging information from “them” via real life experiences/examples.

The 2012 International Conference on Cyber Security will be held at Fordham University in the McNally Amphitheatre from January 9 – 12, 2012.

Presentation by John Verry from Pivot Point Security: Wednesday, January 11, 2012; 2:15pm – 2:40pm

New York City
McNally Amphitheatre
Fordham University
113 West 60th Street
New York, NY 10023

About Pivot Point Security:

Continually evolving technology, business requirements, regulations, and threats make “being secure” and “proving you’re compliant” increasingly complex. The only logical response: Simplify. Pivot Point Security makes it easier to prove that you are secure and compliant. Pivot Point Security knows how important compliance is – and your Cyber Security issues. For more information visit


Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Whitepaper: Stop Wasting Money on Penetration Testing


Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Is ISO 27001 Right for (Y)our Organization?


Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Free Whitepaper: Five Best Practices for SIEM


The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

About the Author:

A Pivot Point Security Press Release

Add a Comment

Share This