Blog Posts Tagged with "Conferences"

7fef78c47060974e0b8392e305f0daf0

Join Infosec Island and Tripwire at Security BSides Las Vegas

June 27, 2012 Added by:Infosec Island Admin

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

Ba47ee356d05807f7e87764f6d3f7e12

Booth Babe Challenge: Show Me the Money

June 18, 2012 Added by:Michelle Klinger

The general consensus regarding whether booth babes are appropriate is a resounding NO, yet vendors still find it necessary to use this strategy. Even amidst complaints by conference attendees & public mocking on social media sites, vendors stick to their marketing guns and bust out the busty femaninas...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO Sponsored CyCon Tackles Cyber Security Issues

June 13, 2012 Added by:Headlines

Attribution is hard because of the nature of attacks, which tend to have several stages and the whole attack is spread over a long period of time. It is of no help either that the Internet is governed by multiple jurisdictions so international cooperation is necessary but often lacking...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Las Vegas Mentorship Program

June 07, 2012 Added by:Security BSides

One of the many great things happening this year at BSides Las Vegas is the New Speaker Mentor program. The goal is to encourage new speakers to participate in the community. A team of mentors will work with the new speakers to hone their presentation and provide support for them...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

EU-US Cybersecurity Awareness Meeting in Brussels

June 06, 2012 Added by:Headlines

The event is organized by the European Commission in co-operation with ENISA and the US Department of Homeland Security. The objective of the event is to bring intermediaries together in order to establish a reinforcing momentum in awareness raising and dissemination effort on topics pertaining to information security...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hallway Con: The Real Reason to Go to Security Conferences

June 04, 2012 Added by:Rafal Los

No matter how much we push to a connected world via digital mediums - the human interaction, the discussion, and the ability to have a deep and meaningful problem-solving session outside the confines of the office is one of the most valuable things you can ever provide for your organization...

Comments  (0)

8e6e3972318ff74b194801340248199e

BSidesDetroit: ConBlu, and a First Try at Presenting

June 03, 2012 Added by:Scott Thomas

The great thing about the people (and our industry as a whole) is that people attending were willing to share their thoughts and what they did to stave off burnout. The conference itself was awesome. The different tracks made it easy to have hallway-con, as well having a teaching area, and a lock-pick village...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Conferring about Security Conferences

May 30, 2012 Added by:Wendy Nather

There's a great discussion going on right now on Twitter about what's wrong with security conferences: Do we have too many? Are they focusing on the wrong things? Even if the hot topics are nominally the same, the perspectives and timbre of discussions will be very different...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

NIST Workshop: Safeguarding Health Information

May 30, 2012 Added by:Infosec Island Admin

The HIPAA Security Rule sets federal standards to protect the confidentiality, integrity and availability of electronic protected health information by requiring HIPAA covered entities and their business associates to implement and maintain administrative, physical and technical safeguards...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

A Meandering Rant on Sexism in Security

May 22, 2012 Added by:Jack Daniel

The depressing “booth babe” situation is an ongoing embarrassment. In the right contexts, I have nothing against attractive people, fast cars, or other things normally used to sell cheap beer - I just don’t believe that tech and security events are the correct contexts...

Comments  (2)

9f19bdb2d175ba86949c352b0cb85572

Who Are You Preaching to Anyway?

May 15, 2012 Added by:Neira Jones

Hard core security conferences continue to happen and continue to be successful, and long may it continue. We still need the techies to make sure we have the right tech to support the people and processes in our businesses. We also need the techies to try and keep ahead of the bad guys...

Comments  (2)

B09c361cbdc6cf629affdc7db30a186d

Security BSides Detroit Announces its June Schedule

May 15, 2012 Added by:Steven Fox, CISSP, QSA

The BSides conference is billed as a un-conference where practitioners go for clear unfiltered view of the industry. The conference features two tracks and thirty-two talks of local and national experts on a variety technical and non-technical subjects...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Making Things Worse by Asking all the Wrong Questions

May 14, 2012 Added by:Rafal Los

Blaming OWASP and developers for not adopting secure coding is silly. Uuntil the business cares about security, and developers have an incentive to write more secure code, tools and simple to use transparent technologies like that which OWASP provides won't get utilized...

Comments  (2)

53692ae1a8e713373b8a487ce89ee3e2

Are We Reaching Security Conference Overload?

May 13, 2012 Added by:Tom Eston

We have more security and hacking conferences than ever, but now there is also more overlap. These choices can make it harder for researchers to present new and relevant content and also tough to decide which conferences to attend from a attendee perspective...

Comments  (0)

Ad5130e786d13531cc0f2cde32dacd0f

Aren’t all Security Professionals Evangelists?

May 08, 2012 Added by:Andrew Weidenhamer

I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Seeks Industry Partners for Security Conferences

May 07, 2012 Added by:Infosec Island Admin

Through a combination of custom content publication that features products and services, video interviews with company personnel onsite, and traditional banner ad campaigns, organizations can better leverage the impact of attendance and participation at key industry events...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked