|
|
|
cp77fk4r
Global Admin
Registerd on: 01/01/1970, 04:00:00
Location:: Israel
Posts: 621
|
|
|
|
|
|
|
|
(http://www.idc-cema.com/index.php?showproduct=28037&content_lang=ENG)
This year IDC CEMA is expanding its IT Security Roadshow to Ukraine, Turkey, Serbia, South Africa, Israel, and Latvia. We are also hosting half-day Executive Briefings in the UAE, Qatar, Bahrain, Kuwait, Saudi Arabia, and Jordan.
The expansion reflects the continuing importance of IT security. It also reflects the changing nature of threats as well as the still underdeveloped realization of their seriousness: criminals find new ways to invade cyberspace, vandals unleash worms and viruses, unscrupulous scammers phish or spam email addresses, and con artists use social engineering to obtain usernames, PINs, and credit card numbers.
Because awareness has become almost as important as clear safeguards, we've invited some of today's most celebrated IT security experts to our events.
Kevin Mitnick – The world's most famous former hacker will be the keynote speaker of the Tel Aviv event, presenting 'The Art of Deception' and sharing his perspective on the threat of "social engineering"-a highly effective type of attack that exploits the human element of corporate security
Meir Hayon of The Anti-Computer Crime Unit of the Israeli Police will speak of 'From Geeks to Crooks' - the increasing level of sophistication of cyber criminals
Ariel Peled – Chairman of the Israeli chapter of The Information Systems Security Association (ISSA) who will speak of 'The Conflict Between Security and Privacy'
Dan Yachin – Research Director of IDC's Emerging Technologies Group and pioneering thought leader in the field of 'Information Leakage Detection and Prevention Technologies'
These speakers frame security in the larger context of business, strategy, technology, and human behavior, helping you make better decisions about policy and implementation. They serve to complement and introduce core presentations bringing you up to date on the latest IT security issues:
Turning Security Inside-Out
Revealing The Hidden Value of Compliance
Policy-Based Endpoint Security Management
Combining IT and Security Management
The shift-in Security Threats
Expecting The Unexpected - Dealing With Tomorrow's Threats
Securing The Mobile Enterprise
The Conflict Between Security and Privacy
Social Engineering
Who Should Attend
The IT Security Roadshow 2006 provides reliable content and expert advice on how to use modern information technologies to secure and protect the enterprise. It is therefore best suited for:
Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
Privacy Officers, Network Security Managers, Server Application Managers
Antivirus, Email Monitoring, VPN, and 3A Managers
IT security start up companies
Private equity Investors
The Register Page:
http://www.idc-cema.com/?formid=eventreg&prd_id=28037&content_lang=ENG
The Agenda:
http://www.idc.co.il/main/siteNew/index.php?page=2&action=sidLink&stId=192
I'll be there! :)
|
1f y0u c4N r34d th15 y0u R34lly n33d 2 g3T l41d |
|
|
|
|
codingr
Global Admin
Registerd on: 01/01/1970, 04:00:00
Location::
Posts: 91
|
|
|
|
|
|
|
|
Sure..ill be there too,
always wanted to hear one of those Mitnick's speechs.
Edit by : codingr At 17/02/2006, 15:43:30
|
|
|
|
|
|
cp77fk4r
Global Admin
Registerd on: 01/01/1970, 04:00:00
Location::
Posts: 621
|
|
|
|
|
|
|
|
:)
|
|
|
|
|
|
Cerades
Registerd on: 01/01/1970, 04:00:00
Location::
Posts: 4
|
|
|
|
|
|
|
|
Congrats cp77fk4r. What a great pleasure :P
Edit by : Cerades At 24/02/2006, 13:50:54
|
|
|
|
|
|
cp77fk4r
Global Admin
Registerd on: 01/01/1970, 04:00:00
Location::
Posts: 621
|
|
|
|
|
|
|
|
|
|