Events
E-Signatures '08: Business, Legal & Technology Trends

Date: 12 November-13 November 2008
Location: Omni Shoreham Hotel, Washington DC
Organizer: ESRA
Homepage: http://www.esignrecords.org

The Electronic Signature and Records Association (ESRA) will once again hold its annual conference in Washington, DC in November. This year, the ESRA conference will analyze a remarkably wide range of industries currently employing e-signature and electronic record technologies to improve business processes, including financial services, consumer products, banking, insurance, construction, equipment financing, government systems & services (civilian & military), cable television, mortgages and notarization.

The conference will run approximately a day and a half. ESRA members, non-members and press are urged to attend. Detailed conference information, a PDF conference brochure, and online registration are available on the ESRA Web site.

Distinguished speakers at the event will include David Whitaker, Senior Company Counsel, Strategy & Operational Risk Group, Wells Fargo Bank NA; Kay Bross, Senior PKI Specialist, Information Security & Solutions, Procter & Gamble; Donna Leaman, Asst. Vice President & Senior Legislative Counsel, USAA; John Hanna, Chief Information Security Officer, U.S. Government Printing Office; Jeremiah Buckley, Partner, Buckley Kolar LLP; Margo Tank, Partner, Buckley Kolar LLP; and Tim Lordan, Executive Director, Internet Education Foundation.

Topics to be featured include case studies of major corporate implementations of e-signature and electronic records technologies in consumer products, financial services, banking, mortgage, equipment acquisition credit, and cable television sales, among others. Also, featured will be examinations of insurance industry policy issues, legal & regulatory issues, e-notarization trends, and other timely subjects.

Other Events
Add Event
Archive



Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //