November 3, 2008

This Years Summit is Over

Well the Information Security Summit is done and by all accounts the conference was a big success. Have heard nothing but very positive comments from the attendees many saying they learned enjoyed the presentations learning a great deal from the speakers. The topics seemed to be very timely as well.

I was pleased to hear this and pleased with how well the operations went, which was in large part due to the great folks working behind the scenes. These folks are all unpaid volunteers putting in countless hours to ensure things go well. The conference operations rivals larger national conferences in both quality of operations and content.

To recap the Information Security Summit ...

By the numbers:
  • 6th year in existance
  • 2 days
  • 3 keynote sessions
  • 36 breakout sessions
  • 44 speakers
  • 2 Birds-of-a-Feather sessions
  • 12 sponsors
  • 3 participating organizations
  • ~350 attendees
Topics covered:
  • Theme was risk management
  • Measuring and managing risk
  • How your security program is costing you money?
  • It’s 10 PM do you know where your risks are?
  • Information risk vs. information security
  • PCI compliance
  • SOX compliance
  • Security frameworks
  • Threat modeling
  • Web application security myths
  • Application security testing
  • Data encrypting
  • E-discovery
  • File remnants in Windows Vista
  • Data leak prevention
  • Penetration testing with Fast-Track
  • Risks of social networking sites
  • Tiger Team pen-testing
  • Bootable CD/USB environments
  • Malware techniques
  • Illicit spam networks
  • Phishing
  • Identity theft protection
  • Secure building designs
  • Business Continuity Planning
A big THANK YOU goes out to all everyone who helped make this event a success - from the speakers to the sponsors to the volunteers and the attendees who supported it!
See you next year at the Summit.

No comments: