Blog Posts Tagged with "Conferences"

69dafe8b58066478aea48f3d0f384820

Don't Miss Security BSides in Los Angeles

August 12, 2011 Added by:Headlines

This is a community event - for all of us, by all of us. In exchange for it being a free event, you will be encouraged to be active. Come and talk, speak up, ask questions and participate throughout the event. It is a time for all of us to learn, share and explore without judgment, and con-fees...

Comments  (0)

A8054e07abdfdcadb09322585cb2e085

BSidesLV and DEFCON 2011 Summary

August 11, 2011 Added by:Michael SecurityMoey

If you have never been to DEFCON there is no way to describe it that would do it justice. DEFCON is draws hackers, crackers, and Feds. The old staples were there such as the lock picking, hardware hacking, Wall of Sheep, sky talks, Mohawk con, etc. This year also had many firsts...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Infosec Island's Scot Terban Replaces Aaron Barr at DEFCON

August 05, 2011 Added by:Headlines

"I look forward to talking about the hubris of LulzSec, Aaron Barr, and Anonymous as well as discuss the issues surrounding them. Cyber activism (hacktivism) is in its infancy and will likely turn into the next level of terrorism," Terban told Infosec Island...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Former HBGary Federal CEO Withdraws from DEFCON Panel

July 28, 2011 Added by:Headlines

"HBGary's choice to go the legal route to block Aaron from speaking in general about topics that are relevant to our industry is sad, and demonstrates that HBGary is not committed to advancing the information security field." Attrition.org's 'Jericho' told Infosec Island...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

OTA's Sixth Annual Online Trust Forum

July 13, 2011 Added by:Headlines

“As our lives, jobs and society are increasingly reliant on Internet services, we need to proactively address the issues and practices raised from the convergence of mobile, cloud and social media. User trust is proving to be a defining factor of business success, innovation and regulation..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Call for Interviews at Black Hat Vegas

July 07, 2011 Added by:Infosec Island Admin

Infosec Island will be conducting a series of short video interviews with select presenters and vendors at the Black Hat USA 2011 conference in Las Vegas, NV. The interviews offer the opportunity for subjects to highlight their knowledge of emerging trends in the information security field...

Comments  (0)

7377f47f95a1202ea8d330061b674dea

Gartner Security and Risk Management Summit 2011

June 14, 2011 Added by:Lawrence Pingree

Increases in the complexity and volume of targeted attacks coupled with the necessity for companies to address compliance issues continues to support healthy security market growth. We will be examining the key security issues at the upcoming Gartner Security and Risk Management Summit...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Summit Seeks Global Cybersecurity Collaboration

June 02, 2011 Added by:Headlines

“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way. Cybersecurity is now intertwined with international security, and you can't divorce it from that...”

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Looking Back at InterOP 2011 and Other Trade Shows

May 19, 2011 Added by:Rafal Los

The small cons are thriving, and the big trade shows are left trying to keep their attendance levels. Each attracts their own 'niche' - but we like it that way because people like me prefer to preach to the crowd who hasn't heard the message yet, and really needs to...

Comments  (0)

Cb7f24bc3f25d24cc77090478a2f30b5

The Dangers of Opening Your Mouth

May 03, 2011 Added by:Eric Irvin

It's important that we continue to listen as much as we talk, and dissect statements, data, and ideas as critically as possible. As the world of Information Security grows, we can not afford to be spoon-fed our thoughts and ideas from speakers, magazine articles, and vendors...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Information Security Conferences: Deadheading in 2011

April 13, 2011 Added by:Infosec Island Admin

To what end are these cons? Is it all about sharing information on hacks and tech? Is it all about partying and being wild? Is it some sense of counter culture that the community has latched on to in order to be different? I have news for you all - you are becoming one of two things...

Comments  (4)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit: Security in a Digital World

April 05, 2011 Added by:Ben Zvaifler

A new wave of cyber warfare has taken form, targeting our information and threatening the stability of our nation's government and corporations worldwide. Security and privacy professionals have answered with innovative techniques in a constantly shifting environment...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Web Application Security "White Elephants"

March 20, 2011 Added by:Rafal Los

We were both talking about things that aren't necessarily new to the security or app-dev community, but aren't being actively addressed. It hit me that there were two big white elephants in the room, and we happened to be talking about them in an open forum.. Finally...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit in Washington, D.C.

March 15, 2011 Added by:Ben Zvaifler

The Cyber Security Strategies Summit will focus on education, the key to navigating the security landscape in a world of uncertainty. Whether you are managing new initiatives, implementing new programs or designing new technologies, being informed is the deciding factor in winning the cyber war...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Things I Learned at the RSA Conference 2011

March 08, 2011 Added by:Robb Reck

Even in this down economy, thousands of companies determined that it was worth their time and money to send delegates. Security awareness is making great inroads to senior management. This is critical to us gaining the prioritization, budget and corporate pull needed to make real change...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit

February 28, 2011 Added by:Ben Zvaifler

Geared towards enterprise and government security officers, the Cyber Security Strategies Summit presents case studies that will build on your knowledge of the industry as well as open your eyes to changes and innovations in the space. Topics being covered will include...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »