|
InfoSec World Conference & Expo 2013 April 15-17, 2013
Expo Dates: April 15&16
Walt Disney World Swan and Dolphin, Orlando, FL
View E-brochure.
Keynote Speakers

Why "Good Enough" Isn't Anymore (And What You Can Do About It)
Joshua Corman, Director, Security Intelligence, Akamai Technologies

Changing the Mindset: Creating a Risk-Conscious Culture
John P. Pironti, President, IP Architects, LLC

Cybersecurity at the Crossroads: Where Are We Headed?
Prof. Howard Schmidt, Former White House Cyber-Security Coordinator

Opening Up a Second Front on Risk Management: Integrating Cybersecurity into Business Processes
Dr. Ron Ross, Fellow, National Institute of Standards and Technology
Sessions Will Include: Managing Cloud Risk
The Android vs. Apple iOS Security Showdown
Getting the Most from Your Logs
Website Impersonation Attacks
Expanding Work Boundaries Securely Through Virtualization & Mobile Devices
Big Data, Big Security Questions: Securing Petabytes of Data
Free Tools to Monitor and Secure Your Wi-Fi Network
Data Forensics: Top 10 Things Not To Do
Best Practices in Testing Anti-Malware
Windows Ethical Hacking
Selecting an MDM for Your BYOD Strategy
Proactive, Quick-Hit Security Measures
Cybersecurity for Critical Infrastructure Control Systems
Social Networks as the New Threat Vector: Policy and Legal Considerations
Implementing the NIST Risk Management Framework
Conducting a Big Data Forensics Operation
Featured Summits CISO Executive Summit
Sunday, April 14
Cloud Security Summit
Thursday, April 18
IT Audit Management Summit Wednesday - Friday, April 17-19
Hands-On Track
Monday, April 15 & Tuesday, April 16
Ethical Hacking with Your Eyes Closed With the changing landscape of computing risks and the broadening protocol and application layers, today's information security professionals must be able to cope with blended threats and new "zero day" attacks using modern infrastructures. BYOD and cloud-based computing assets change the landscape of today's organizational security. Or do they? How do you assess the security of the unknown or unfamiliar?
Take a Look at Some of the Sessions from 2012 Keynote Address: Making Sense of (in)Security
Keynote Address: Catching the Cybercriminals
Mac Triage: Do You Know What You're Missing?
Protecting Against Malware on Mobile Platforms
Helping IT Control Risky Androids and iPhones
Cloud Security Summit Opening Remarks
Cybersecurity's Dilemma: Proactive Change vs Reactive Response
Managing Data in SharePoint
Android Forensics Demo
Pen Testing and Forensics in the Virtual Environment
Core Competencies of Internal Auditors
An Introduction to Cloud Forensics
Developing a Sustainable Audit Data Analytics Program
Moving to a World-Class Analytics and Continuous Auditing Program
A Virtualized Attack Environment: Can You Attack Everything?
Eliminating Fear in Cloud Computing
How Attackers are Targeting and Using Cloud Services
Join InfoSec World on Twitter
Join InfoSec World at LinkedIn
Interested in exhibiting or sponsoring? Contact: Paul Moschella, Sponsorship & Exhibit Sales, 508-532-3652 or pmoschella@misti.com
|