I was pleased to hear this and pleased with how well the operations went, which was in large part due to the great folks working behind the scenes. These folks are all unpaid volunteers putting in countless hours to ensure things go well. The conference operations rivals larger national conferences in both quality of operations and content.
To recap the Information Security Summit ...
By the numbers:
- 6th year in existance
- 2 days
- 3 keynote sessions
- 36 breakout sessions
- 44 speakers
- 2 Birds-of-a-Feather sessions
- 12 sponsors
- 3 participating organizations
- ~350 attendees
- Theme was risk management
- Measuring and managing risk
- How your security program is costing you money?
- It’s 10 PM do you know where your risks are?
- Information risk vs. information security
- PCI compliance
- SOX compliance
- Security frameworks
- Threat modeling
- Web application security myths
- Application security testing
- Data encrypting
- E-discovery
- File remnants in Windows Vista
- Data leak prevention
- Penetration testing with Fast-Track
- Risks of social networking sites
- Tiger Team pen-testing
- Bootable CD/USB environments
- Malware techniques
- Illicit spam networks
- Phishing
- Identity theft protection
- Secure building designs
- Business Continuity Planning
See you next year at the Summit.
No comments:
Post a Comment