Events
Security Decisions Conference

Date: 15 October-17 October 2003
Location: Palmer House Hilton, Chicago, USA
Organizer: Information Security Magazine
Homepage: http://securityconf.techtarget.com/

You're overworked and understaffed. But you have to keep fighting. Rapid response to critical security vulnerabilities in an uncertain world is not an option. It's an absolute necessity. You have to pull upper management's heads out of the sand and make them feel your pain. You have to whip users into shape and build awareness of essential security policies. Failure is not an option!

It's time to take control. Gain pull-no-punches expertise to tackle everything from intrusion detection and disaster recovery to network security, employee monitoring, virus protection, denial of service attacks and more.

Information Security magazine, widely regarded as the most authoritative publication for those responsible for the security of the enterprise, has joined forces with SearchSecurity.com to bring you the most definitive real-world solutions to today’s most critical security challenges - and with no vendor sales pitches disguised as conference content!

Unlike other conferences, Information Security Magazine's Security Decisions Conference offers you a chance to talk to leading CSO's in the industry. In our EXECUTIVE CONNECTION sessions, Andy Briney, editor in chief, Information Security Magazine talks with these executives in a one-on-one format and then you have some open mic time to ask these executives your most crucial security questions. This impressive line up includes:

- Mary Ann Davidson, Chief Security Officer, Oracle
- Harriet Pearson, Chief Privacy Officer, IBM
- Scott Charney, Chief Security Stategist, Microsoft Corp.


Other Events
Add Event
Archive



Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //