Paul joined Owens Corning in 2002 as a security analyst and has previously held the role of security team leader as well. He was appointed to his current role in 2014. Prior to joining Owens Corning, he worked as a senior security architect for Nortel Networks leading penetration tests and network audits for Technology, Healthcare, Energy, Internet, and Manufacturing companies.
He has also served as a computer security officer at the Air Force Information Warfare Center where he performed vulnerability assessments, security product testing, and security architecture work.
Paul earned a bachelors degree in Computer Engineering from the University of Notre Dame, a
masters degree in Computer Science from St. Mary’s University, and a Graduate Certificate in
Analytics and Business Intelligence from Northwestern University.
Cyber hygiene is comparable to personal hygiene. Much like an individual engages in certain personal hygiene practices to maintain good health and well-being, cyber hygiene practices can help keep your data safe and well-protected. In this session, we will learn about cyber hygiene protection 101. Common everyday best practices that are logical and simple to apply in your day to day life. Whether at work or home, building routine Basic Cyber Hygiene into your daily habit will be worth a pound of cure.
Proficient Information Technology and Services Manager with over 37 years of results-focused leadership in a global manufacturing company. Experienced in ERP Master Data, IT Service Management, IT Security, IT Strategy, and IT Infrastructure. David, University of Findlay alumni, holds degrees in Computer Science, Business System Analysis, and an MBA. More information may be found at: https://www.linkedin.com/in/davidldrake/
Often, the term compliance is associated with a “check the box” mentality. The positive or negative impact may not be directly correlated to an effective cyber security posture. However, regulatory compliance and cyber security effectiveness are not mutually exclusive objectives. In fact, not being able to demonstrate cyber security effectiveness through a risk-based compliance framework may ultimately be more damaging, more costly, than the impact of a data breach alone! In this presentation we will discuss the relationship between compliance and effective cyber security practices. Provide an overview of major regulatory requirements for various industries. Why simply checking the box does not equal security.
A lifelong learner, Loren is an experienced information assurance executive with over 40 years of IT experience in a global manufacturing company. He is recognized for developing innovative IT solutions across a world-wide team environment. In addition, Loren has 20 years of course development and teaching experiences in information assurance, and he has demonstrated his passion and commitment to sharing through teaching and practice because learning and sharing form the essence of knowledge. More information may be found at: https://www.linkedin.com/in/lorenwwagner/
Associate Professor and Co-Chair of Computer Science
Office Location: 1104 Cory Street A