|Date:||13 December-13 December 2005|
|Location:||Golden Gate Holiday Inn, San Francisco, California, USA|
|Organizer:||IEEE Computer Society|
Example uses include employment of large shared storage systems for cost reduction and, for convenience, wide use of transiently-connected storage devices offering significant capacities and manifested in many forms, often embedded in mobile devices.
Protecting intellectual property, privacy, health records, and military secrets when media or devices are lost, stolen, or captured is critical to information owners.
A comprehensive, systems approach to storage security is required for the activities that rely on storage technology to remain or become viable.
This workshop serves as an open forum to discuss storage threats, technologies, methodologies and deployment.
- ICS Summit 2014
Organized by SANS - 17 March - 18 March 2014
- 3rd Annual Cyber Security for Energy & Utilities
Organized by IQPC - 23 March - 26 March 2014
- SyScan 2014
Organized by SyScan - 31 March - 4 April 2014
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.