IEEE NoVA Chapter

presented by


6:00p Food, networking, and socializing
7:00p Opening remarks
7:15p Technical presentation
8:15p Q & A session
8:30p Conclusion and remarks


Disclaimer: The information presented by the speaker is based on open/public information and any views expressed are his own.

Download Jeffrey Calcatera's presentation

BIO

Mr. Calcatera is a Information Management systems Program Manager with over 25 years of professional experience on a variety of advanced technology programs. His division provides Systems Integration and Data Architecture engineering for enterprise-based information management applications. Earlier in his career, Mr. Calcatera held positions as a systems engineer with Texas Instruments' Equipment Group, Dallas, Texas and the Melpar Division of E-Systems, Inc., Falls Church, Virginia. Mr. Calcatera holds a B.E.E. degree from the University of Detroit, Michigan and several advanced engineering courses at UDM and George Washington University, D.C.

ABSTRACT

It's so simple to assume someone's identity today! Last year, in the United States alone, there was an estimated $48 billion in business losses attributed to identity fraud—and $5 billion in personal losses. Find out how to minimize your risks—both low-tech and internet security will be discussed.

Presentation includes guidance from the Federal Trade Commission (FTC) and tips from various industry experts, including 'Secure Document Consultant,' Frank W. Abagnale, Jr., the real 'Catch Me If You Can' Man. Topics include:

  • How big of a problem is ID Theft? What are the costs to society?
  • What information do the Criminals really want to know about you?
  • How do ID thieves Get and Use your Personal Information?

Risk mitigation advice and guidance includes:

  • How you can minimize your chances of becoming a victim
  • Low-Tech and High-Tech tips from industry experts
  • Internet Security and PC options for protecting your Identity
  • Safe on-line shopping with Virtual Account Numbers.
  • What are some of the basic things that software professionals can do to secure private information?