NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
   
Conference Overview

InfoSec World Conference & Expo 2013
April 15-17, 2013
Expo Dates: April 15&16
Walt Disney World Swan and Dolphin, Orlando, FL

View E-brochure.

Keynote Speakers

Why "Good Enough" Isn't Anymore (And What You Can Do About It)
Joshua Corman, Director, Security Intelligence, Akamai Technologies


Changing the Mindset: Creating a Risk-Conscious Culture
John P. Pironti, President, IP Architects, LLC


Cybersecurity at the Crossroads: Where Are We Headed?
Prof. Howard Schmidt, Former White House Cyber-Security Coordinator


Opening Up a Second Front on Risk Management: Integrating Cybersecurity into Business Processes
Dr. Ron Ross, Fellow, National Institute of Standards and Technology

Sessions Will Include:
›› Managing Cloud Risk
›› The Android vs. Apple iOS Security Showdown
›› Getting the Most from Your Logs
›› Website Impersonation Attacks
›› Expanding Work Boundaries Securely Through Virtualization & Mobile Devices
›› Big Data, Big Security Questions: Securing Petabytes of Data
›› Free Tools to Monitor and Secure Your Wi-Fi Network
›› Data Forensics: Top 10 Things Not To Do
›› Best Practices in Testing Anti-Malware
›› Windows Ethical Hacking
›› Selecting an MDM for Your BYOD Strategy
›› Proactive, Quick-Hit Security Measures
›› Cybersecurity for Critical Infrastructure Control Systems
›› Social Networks as the New Threat Vector: Policy and Legal Considerations
›› Implementing the NIST Risk Management Framework
›› Conducting a Big Data Forensics Operation

Featured Summits
CISO Executive Summit
Sunday, April 14

Cloud Security Summit

Thursday, April 18

IT Audit Management Summit
Wednesday - Friday, April 17-19

Hands-On Track
Monday, April 15 & Tuesday, April 16
Ethical Hacking with Your Eyes Closed
With the changing landscape of computing risks and the broadening protocol and application layers, today's information security professionals must be able to cope with blended threats and new "zero day" attacks using modern infrastructures. BYOD and cloud-based computing assets change the landscape of today's organizational security. Or do they? How do you assess the security of the unknown or unfamiliar?

Take a Look at Some of the Sessions from 2012
Keynote Address: Making Sense of (in)Security
Keynote Address: Catching the Cybercriminals
Mac Triage: Do You Know What You're Missing?
Protecting Against Malware on Mobile Platforms
Helping IT Control Risky Androids and iPhones
Cloud Security Summit Opening Remarks
Cybersecurity's Dilemma: Proactive Change vs Reactive Response
Managing Data in SharePoint
Android Forensics Demo
Pen Testing and Forensics in the Virtual Environment
Core Competencies of Internal Auditors
An Introduction to Cloud Forensics
Developing a Sustainable Audit Data Analytics Program
Moving to a World-Class Analytics and Continuous Auditing Program
A Virtualized Attack Environment: Can You Attack Everything?
Eliminating Fear in Cloud Computing
How Attackers are Targeting and Using Cloud Services

Join InfoSec World on Twitter
Join InfoSec World at LinkedIn

Interested in exhibiting or sponsoring?
Contact: Paul Moschella, Sponsorship & Exhibit Sales, 508-532-3652 or pmoschella@misti.com


 Follow Us on Twitter

Platinum Sponsors

Gold Sponsors

Global Education Sponsor

Association Sponsors

Media Sponsors