REGISTER

Information Security

buildingthe

12 Jan 2010 2:00 pm Presenting Calem Sima, CTO ASC and Katherine Lam, SaaS Product Manager, HP

This presentation will cover:

endpoint

8 Dec 2009 4:00 pm Presenting Jason Stradley; BT, Sr. Security Consultant

Jason Stradley is a visionary security executive with an entrepreneurial spirit and the ability to execute against his vision.

protecting

8 Dec 2009 6:00 am Presenting Steven Furnell, Plymouth University, School of Computing

Prof. Steven Furnell is the head of the Centre for Security, Communications and Network Research at the University.

tweetspam

13 Aug 2009 6:00 pm Presenting Susan L. Lyon, Of Counsel, Perkins Coie LLP

Aocial media in the new Web 2.0 world has proven to be an effective new marketing tool but one that also creates some interesting privacy challanges.

enabling

8 Dec 2009 3:00 pm Presenting Eric Maiwald, Vice President and Research Director at Burton Group

Today's workforce is increasingly on the move and enterprises must meet the demands for secure access to information systems to support new business models.

barclays

8 Sep 2009 10:00 am Presenting Becky Pinkard, Barclays Bank, Head of Attack and Data Monitoring

Becky was recruited by Barclays to develop the global monitoring programme with the goal of supplying real-time alerting of critical security and data leakage

exploits

13 Aug 2009 3:00 pm Presenting David W. Campbell; Leader; OWASP

The Web is a Dangerous Place: Expolits and Defenses for a Web 2.0 World.

thecrucial

8 Dec 2009 11:00 am Presenting Arlene Yetnikoff; DePaul University, Director of Information Security

The role of Endpoint Security is crucial

ibm

8 Sep 2009 5:00 am Presenting James Rendell, IBM, Senior Technology Specialist

James Garnered Extensive pre and post-sales consulting experience while working for US-based technology companies . . .

cis

13 Aug 2009 1:00 pm Presenting M. Ryan Calo; Residential Fellow; Stanford Law School

In online privacy today, notice is king. Notice is how we deal with the conflict between the preference of internet companies to gather as much user dat as possible and the rights of users to control their information.

8 Dec 2009 10:00 am Presenting Michael Bacon, Information Security Visionary, CEO of Grimbaldus Group

Michael is on of the UK's leading information security professionals

gss

8 Sep 2009 6:00 am

Presenting David Hobson, Global Secure Systems Ltd, Managing Director

Threat Assessments, Attacks, & Countermeasure are . .

scott

13 Aug 2009 12:00 pm Presenting Julie Machal-Fulks; Partner at Scott & Scott LLP

Since February 2005, the identities of approxomately 98 million people have been exposed because of data leaks. This presentaion examines 

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top