Blog Posts Tagged with "Conferences"

69dafe8b58066478aea48f3d0f384820

Emerging Companies Can Delay SOX Compliance

October 24, 2011 Added by:Headlines

New companies with a market capitalization under USD 1 billion will now be able to opt-out of regulations within section 404 of the Sarbanes-Oxley (SOX) Act for the first ten years after going public. This option was previously available to companies under USD 75 million...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance and Evolution to GRC Conference

October 20, 2011 Added by:Infosec Island Admin

The SOX Compliance series is targeted at a focused group of senior level executives to maintain an intimate atmosphere for the delegates and speakers. Since it is not a vendor driven conference, the higher level focus allows the delegates to network with their industry peers and speakers...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Get Your SOX Compliance On

October 12, 2011 Added by:Infosec Island Admin

SOX Compliance & Evolution to GRC Conference is a unique opportunity to review the required blend of compliance and risk-based strategies and methodologies necessary to meet federal mandates while delivering greater efficiency across their GRC footprint...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Taking on Mobile and Wireless Security at TakeDownCon

October 10, 2011 Added by:Infosec Island Admin

TakeDownCon has raised the bar and set the standards of what a true technical IT security conference is supposed to be. It aspires to be the ideal platform for information security professionals to congregate to learn, network and share their knowledge...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Conference Focused on Trusted Computing

October 10, 2011 Added by:Headlines

"Generally speaking, trusted computing technologies ensure that hardware and software behave as designed. These solutions prevent malicious computer attacks by combining commercially available, off-the-shelf IT tools. The bad guys are forced to break a sweat, and they still lose..."

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Don't Miss the Security BSides Kansas City Event

October 07, 2011 Added by:Security BSides

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

TakeDownCon Las Vegas: Mobile and Wireless Security

October 05, 2011 Added by:Infosec Island Admin

Due to the rapid escalation of threats affecting wireless operations, TakeDownCon Las Vegas now brings you a highly technical platform which addresses highly technical knowledge which focuses on securing your channels, your data, and ultimately and most importantly – your very own privacy...

Comments  (0)

A8054e07abdfdcadb09322585cb2e085

Wow! So That Was DerbyCon...

October 03, 2011 Added by:Michael SecurityMoey

One talk that I thought was absolutely phenomenal was "Steal Everything, Kill Everyone, Cause Total Financial Ruin" with Jayson Street who walked through his antics and general mayhem. There was one major take away I got from Jayson’s talk: If your users are doing dumb stuff, it’s yours fault...

Comments  (2)

7e364bbac217114a59e547b354e7f7ad

DerbyCon Talks You Don’t Want to Miss

September 28, 2011 Added by:Gary McCully

When people think of PenTesting, they immediately think of Buffer Overflows, Weak Passwords, and SQL Injection. What people fail to realize is that in many cases it is easier to use “features” of applications already installed to get a foothold into a corporation’s network...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance and Evolution to GRC - Chicago

September 23, 2011 Added by:Infosec Island Admin

The SOX Compliance series is targeted at a focused group of senior level executives to maintain an intimate atmosphere for the delegates and speakers. Since it is not a vendor driven conference, the higher level focus allows the delegates to network with their industry peers and speakers...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

Notes on the GrrCON Information Security Conference

September 22, 2011 Added by:Jim Palazzolo

The goal of the conference was dissemination of information and giving individuals the ability to network with others in the field. What impressed me was the diverse pool of individuals at the conference. It was not uncommon to see someone sporting a purple mohawk, or pin stripe suit...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Call for Interviews: Hacker Halted - Miami

September 22, 2011 Added by:Infosec Island Admin

Infosec Island will be conducting a series of video interviews with companies and vendors at the Hacker Halted conference in Miami, FL in late October. The interviews offer the opportunity for companies to highlight their knowledge of emerging trends in the information security field...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides is Coming to Dallas / Fort Worth

September 16, 2011 Added by:Security BSides

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance and Evolution to GRC Conference

September 14, 2011 Added by:Infosec Island Admin

While maintaining the focus on the continual optimization of the SOX program, 22nd edition conference will draw on the more recent challenges being faced by SOX professionals in light of the recent economic climate and new Dodd-Frank requirements...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Don't Miss the Security BSides Missouri Event

September 13, 2011 Added by:Security BSides

The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Black Hat’s Place in Enterprise Information Security

August 17, 2011 Added by:Robb Reck

Throughout the Black Hat briefings, I didn’t once hear the words “defense in depth” or “return on investment.” What I got instead is examples of how the bad guys are going to break into specific systems. Black Hat doesn’t have a management track, the focus is on hands-on attacks and of systems...

Comments  (3)

Page « < 3 - 4 - 5 - 6 - 7 > »