1. “LIVE” PRODUCT DEMO: UNIFIED SECURITY MANAGEMENT IN UNDER 1 HOUR WITH ALIENVAULT ™Tom D’Aquino, Systems Engineers Justin S. Endres, Senior Vice President of Sales…
1. THE HISTORY OF LOOKOUT 2. John Hering, Kevin Mahaffey and James Burgess, three security researchers from USC, discovered a Bluetooth vulnerability in the Nokia 3610.…
1. Today’s Speakers Dr. Eric Cole Founder/President Secure Anchor Consulting LLC Mark Evertz Security Solutions Manager Tripwire, Inc. 2. You Can’t Stop Stupid -- RevisitedDr.…
Slide 1Ethnographic Fieldwork at a University IT Security Office Xinming (Simon) Ou Kansas State University Joint work with John McHugh, S. Raj Rajagopalan, Sathya Chandran…
Slide 1The role of threat intelligence in combating against targeted malware attacks Boldizsár Bencsáth Budapest University of Technology and Economics Department of Telecommunications…
1.31 Sponsored by Unisys Independently conducted by Ponemon Institute LLC Publication Date: July 2014 Critical Infrastructure: Security Preparedness and Maturity 2. 2 Part…
1. IT Infrastructure Support Application DevelopmentNetwork/Security Consulting Presented By Steven Williams, AS, MBA, MCP 2. About UsSunisle Technology Solutions, is a Managed…