Blog Posts Tagged with "Conferences"

7fef78c47060974e0b8392e305f0daf0

Fear and Loathing in Infosec: The Black Mass

May 02, 2012 Added by:Infosec Island Admin

Gesticulating and making odd sounds, the hackers milled and jerked around like some strange species of black raptors. Babbling incoherently about arcane knowledge in the hopes of one upping the other hapless technoweens in the room....

Comments  (0)

296634767383f056e82787fcb3b94864

SEALs, Spies, Security, and Celebrity

May 01, 2012 Added by:Jeffrey Carr

When the largest security companies in the world have had their source code stolen by hackers, our present security model is broken. Matt Brazil, a former U.S. embassy commercial officer in Beijing, will show executives how to survive in China without losing their secrets...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Value of Security Conferences

April 19, 2012 Added by:Rafal Los

What's interesting is the question of business value. Management sends employees to 'security conferences' to learn something and bring it back to the organization. But what value do the ever-increasing number of security conferences provide as stand-alone events?

Comments  (1)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Chicago 2012 Presentation Lineup

April 19, 2012 Added by:Security BSides

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

Second Annual Cyber Security Summit (Prague) Write-up

April 15, 2012 Added by:Robert M. Lee

An important aspect of the conference was the ability to network with people from a wide variety of sectors. Establishing new connections, sources of information, and building friendships opens up avenues for much needed information sharing. Emphasis must be placed on education...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

What Do You Call a BlackHat in Amsterdam?

March 16, 2012 Added by:Javvad Malik

It was my first BlackHat and I’d agreed to cover the event for Infosec Island. Those in attendance would have seen me with Jim Shields of Twist & Shout lugging around camera’s lights, microphones trying to convince people to say a few words to the camera...

Comments  (1)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Charleston 2012: Operating In-Security

March 16, 2012 Added by:Security BSides

A combination of students, professionals, geeks and tinkerers gathering to discuss Information Security, hear awesome talks and bring security into our everyday lives. Our mission is to provide an inclusive, inspiring and motivational environment to discuss and collaborate...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

A Post BSidesSF and RSA Post

March 15, 2012 Added by:Jack Daniel

The RSA Conference was the RSA Conference. It was better than the past few years as far as content. It is not the place for cutting edge research, and the expo is all about selling security products. It can be disillusioning to see the crass commercial side of our business...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Don't Miss the TECHEXPO Cyber Security Hiring Event

March 13, 2012 Added by:Infosec Island Admin

Are you a Cyber Warrior and seeking a new employment opportunity? Don't miss the TECHEXPO Cyber Security hiring event March 20th. Bring resumes and interview for the many opportunities, and learn from our guest speakers William M. Jimenez, Paul de Souza, and Richard Bejtlich...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

The Security BSides Las Vegas Mentorship Program

March 08, 2012 Added by:Security BSides

We all know how hard it can be to find your voice, or translate data into talking points that won't lose your audience, so we're looking to pair first time conference speakers with a mentor who has a solid track record in public speaking to work with them from CFP to the podium...

Comments  (0)

E798c5a2fdb044f3be4e6204eb13abcc

Atlantic Security Conference 2012 Wrap Up

March 05, 2012 Added by:Darryl MacLeod

If you’re IT professional, and not necessarily one with a security focus, attending a conference like this would be well worth it. The threats discussed are very real and active. They will never go away, but that doesn’t mean the white hats should start waving white flags...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

RSA Conference 2012 Wrap-Up

March 04, 2012 Added by:Robb Reck

RSA 2012 is in the books. The crypto-geniuses have gone home and are again working on solving our most challenging technical problems. The rest of us have returned home with some new insights and an improved plan for implementing security in our own little corners of the world...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

RSA Conference 2012: Day One Highlights

February 28, 2012 Added by:Robb Reck

The biggest key to the success of any security program is achieving goal congruence with the organization. Every security objective should directly support the overall objectives of the company. Security must figure out how our projects contribute to the organization’s success...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Security: UR Doin It Rong

February 22, 2012 Added by:Wendy Nather

A number of talks at conferences focus on what we are doing wrong. The reason for this is practitioners are afraid to talk about how they're defending themselves for fear that someone will take it as a challenge and de-cyber-pants them before they've even gotten to the Q&A session...

Comments  (3)

1b061b1cec6b5898e5326992d9461610

Infosec: Where is Our “Long Tail”?

February 20, 2012 Added by:Dave Shackleford

The “long tail” concept illustrates the subtle, often overlooked 20% market that tends to be more niche. We need those organizations that are desperate to find unusual solutions that are not available at all right now. And we need small startups to provide them...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »