ࡱ > I K H @ 8 bjbjFF E , , ` B B B B 8 " , N $ ~ : , * , , , , , , $ R t P " P B B e f f f v B 8 * f * f f z f r kz| 2 f * { 0 f ] ] f B B B B ] f " f & P P D Security Seven Awards TechTarget's Information Security magazine, SearchSecurity.com and Information Security Decisions have created the Security Seven Awards to recognize the achievements of leading information security practitioners in seven vertical industries. Winners will be chosen from the financial services, telecommunications, manufacturing, energy, government, education and health care industries. The Security Seven will be honored at a special ceremony to be held on Oct. 19, 2005 at Information Security Decisions in New York. Winners will be notified in advance of the conference. In addition, each winner will be profiled in the pages of Information Security and online at SearchSecurity.com. Who is Eligible? Nominations are open to individual practitioners of information security who have made an impact on the advancement of, research of, application of and management of information security technologies, policies and practices. Vendors are not eligible for nomination. Information security vendors may submit nominations on behalf of end users. Criteria: A panel of judges will review the nominees' accomplishments and select the winners. How to Apply: To nominate an individual for The Security Seven Awards, please complete the attached form and return it to HYPERLINK "mailto:securityseven@infosecuritymag.com" securityseven@infosecuritymag.com Deadline: Nomination forms must be received by Aug. 1, 2005. Security Seven Nomination Form 1) Name of Nominee: _________________________________________________ Job Title: _________________________________________________________ Company/Organization: _____________________________________________ Vertical Industry: ___________________________________________________ Address 1: ________________________________________________________ Address 2: ________________________________________________________ Office telephone: ___________________________________________________ Mobile/cell phone: __________________________________________________ E-mail address: ____________________________________________________ 2) Your name and contact info (if different from nominee): _______________________ ______________________________________________________________________ 3) How many years has the nominee spent in the field of information security? Please list dates of employment, including dates employed at current job and dates employed at other info security-related positions: _______________________________________________________________________ _______________________________________________________________________ 4) List the nominee's credentials and certifications: _______________________________________________________________________ _______________________________________________________________________ 5) List the professional associations the nominee belongs to: _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ 6) Provide details on size of the nominee's security operation and the scope of the nominee's responsibility, such as the number of employees the nominee supervises and the unique security challenges the nominee faces in his/her job. (Please describe in 500 words or less.) ______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ 7) Provide details on the contributions that the nominee has made to the information security community, such as developing protocols and standards, conducting research, or creating networking and community-building initiatives. (Please describe in 500 words or less.) _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ 8) Describe the nominee's recent security projects or incident responses the nominee has spearheaded. (Please describe in 500 words or less.) _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ 9) Provide three references for the nominee, which may include supervisors or associates. Be sure to include the references' contact information. _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ Thank You! INCLUDEPICTURE "http://searchSecurity.techtarget.com/images/header_logo.gif" \* MERGEFORMATINET HYPERLINK "http://informationsecurity.techtarget.com/magHome" INCLUDEPICTURE "http://informationsecurity.techtarget.com/informationsecurity/images/magLogoHeader.gif" \* MERGEFORMATINET # 7 i [ n } " + - 7 = ସସ} %j h.8 h.8 CJ OJ QJ UaJ h. CJ OJ QJ aJ h.8 h.8 6CJ OJ QJ aJ h"K CJ OJ QJ aJ h#W CJ OJ QJ aJ h CJ OJ QJ aJ h#W h.8 6CJ OJ QJ aJ h.8 h.8 CJ OJ QJ aJ h.8 h.8 5CJ OJ QJ aJ ) - 7 b m L h@l dh 7$ 8$ H$ gd)b h@ dh 7$ 8$ H$ gd)b h8p dh 7$ 8$ H$ gd)b hp dh 7$ 8$ H$ gd)b gd.8 gd.8 $a$gd.8 5 7 = > ? ` a b k K ֶ~rfZK?0r h"K h.8 CJ OJ QJ aJ hJH CJ OJ QJ aJ h"K h)b CJ OJ QJ aJ h)b CJ OJ QJ aJ h"K CJ OJ QJ aJ h CJ OJ QJ aJ h"K h"K CJ OJ QJ aJ hPx CJ OJ QJ aJ h.8 5CJ OJ QJ aJ h.8 h.8 5CJ OJ QJ aJ h.8 h.8 CJ OJ QJ aJ h.8 h.8 0J CJ OJ QJ aJ %j h.8 h.8 CJ OJ QJ UaJ +j h.8 h.8 CJ OJ QJ UaJ K L a ( b d l t 6 7 8 : p q % @ " ииܸܸܸvvvjv h] CJ OJ QJ aJ h"K h.8 CJ OJ QJ aJ h"K hPx CJ OJ QJ aJ hPx CJ OJ QJ aJ h)b CJ OJ QJ aJ h CJ OJ QJ aJ h|?$ CJ OJ QJ aJ h8 CJ OJ QJ aJ hSJE CJ OJ QJ aJ h CJ OJ QJ aJ hJH CJ OJ QJ aJ h.8 CJ OJ QJ aJ ) c 7 5 k 9 # k C 7$ 8$ H$ gd.8 hp dh 7$ 8$ H$ gd)b h@l dh 7$ 8$ H$ gd)b ( p H f > 9 gd.8 d d &d 7$ 8$ H$ P gd. d d 7$ 8$ H$ gd.8 7$ 8$ H$ gd.8 " ' l m n o p ȸvevOv9*j h.8 h B*OJ QJ U^J ph333 *j h.8 h B*OJ QJ U^J ph !h.8 h B*OJ QJ ^J ph *j h.8 h B*OJ QJ U^J ph !h.8 h B*OJ QJ ^J ph333 h(T j h(T Uh"K hf CJ OJ QJ aJ h"K h.8 5CJ OJ QJ aJ h"K h.8 CJ OJ QJ ^J aJ h. CJ OJ QJ aJ h"K h.8 CJ OJ QJ aJ hm2 CJ OJ QJ aJ 3 4 5 6 7 8 gd.8 dh gd p - . / 0 1 2 3 4 5 6 7 8 ± ؆~z~k h"K hf CJ OJ QJ aJ h)b h(T h h.8 h $h.8 h B*OJ QJ ^J ph333 y( j h.8 h UmH nH u !h.8 h B*OJ QJ ^J ph *j h.8 h B*OJ QJ U^J ph *j h.8 h B*OJ QJ U^J ph333 !h.8 h B*OJ QJ ^J ph333 ) 0 1h:p8 / =!"#$% n {hX)jq ֽ*PNG IHDR 8 wB PLTE %!" 0,- !# h z z| SEAB 4 L<(%&>:< LT635512%+eacjeg-)* tpq5=BJ ^YZcj ^GCEs|C 956) plm PKL! yst[VX XTU NHIiqA=> UPRC?A201c_` +'(2.0# kgimij/6a]_ SNPV] :67zux ;B JFG-1VVX(E쓏 ֏~_e756 DG : bKGD H cmPPJCmp0712 H s TIDAThCY TSW~#!&cb@ b H-A((ZJA@ZRW+uֺVtL;f:}z%)s9p Xlևک/}q|͛72S"I-}qe08k 3g^Y6/feiqGҹiFdbQxn=!0'˳q_t9"w8!7FVrr>B2Ѿ;vʨg30#N pyj7?Amozţ'm;.e9jdn#7kQ%YwoQd$I b
ͮoi2#b1+fݹVsX⨴G{%+x%Yz/^'VŜ"-
i˹ݦnUPazU)4p_1_kQcLN jnChJⷝѳ`!}SN
k
UPٽv,%g2Ծ~tr{@(9r<@jW fh1$8/0PvT"k_Gu@XL Ûb);21kUa;ӗٮ1kc Cyc*:bm13azr\w+iJuXnackp,s7I^r\$GnpN2ܘ'v8%}VמzΧ#@BAX=B#ML!o)c%Y`L<(ӿbs1mV~Ov=p04@o;bXqYBﵧiQB(?ߩ%/4^xUIp0iZp?}i&X},cf#y(^eQ
x4 tz NH SGB_~6_fWF G&XK+JKCjRC:dQٮiBP' YtΏAlZh(0{VnHZ*b J( XhӍ!@N*To` $9Թ}1_sN)a03VB>98O2OGQm(Z_Ȁյun:r:h:/qdˇdOB~BKZ4=sM^,7K ZD^+a\V+"",0Ħ`fhUS060KXB5x8:ĉa7%
X;KJҕx=R£Q>C3[~B<|{Hj5z4!V'<[BClŜ8g)d
<5Y+P&Rhs((5K[KЄ?<͂.b0DD]bq֣
L
j/ac5wg#@/+A(I@;*uE^)bh<(62=u_4ѶVl=\1&j)OE999"
, [W 'q4]ȣk8/e
ƸRkHBjJUXx@`*b2;eFdVE:,)sjm2 gKj#P.ېY)kIqG%Cu#ʘD(^Ԩ56z-b$!#&
\\!y4,V%h'B~F(6%0LmHNц&1^LǞ4O`|Ox^gxk!o`KMrBAc(l>.^..FD귰Ptt}ĨU8DK3}sK ﴦe=7!s.