Access "Kevin Mitnick security conference shrouded in secrecy"
This article is part of the May 2003 issue of Buying spree: 2003 product survey results
Would anyone who wants to attend Kevin Mitnick's "360º Security Summit" please stand up? I dare you! I double dare you...and you know you can't say no to a double dare. Mitnick is trying to shield his guests from the scrutiny and ridicule that would most certainly follow their soliciting advice from a convicted hacker. Our favorite ex-con is making his first foray into the world of self-promoting infosec conferences under a veil of secrecy. Only accepted C-level applicants will be allowed to attend his two-day event at an undisclosed location, and the $4,995 fee must be paid in advance. Attendees' identities will be kept confidential, and a nondisclosure agreement on the application form intends to keep details about the October retreat equally cloaked. The location won't be revealed until 45 days before the event, and even then attendees must get their travel agents to sign NDAs before booking flights. This is really covert, kind of like that "double secret probation" in Animal House. This exclusiveness also means no onlookers, and absolutely no press. (... Access >>>
Premium Content for Free.
Shrinking IT security budgets may affect product rollouts
by Andrew Briney and Frank Prince
IT professionals are planning massive security rollouts over the next three years. But shrinking IT security budgets may throw a wrench in the works.
Enterprise Inspector: A must-have for Microsoft vulnerability scanning
by Mike Bobbitt
Shavlik Technologies enhances its freeware to create Enterprise Inspector.
Buying IT security products? Learn to recognize vendor hype
by Linda Wise, Contributor
Some vendors will do or say just about anything to get you to buy their products. Whether the products work as advertised is another story.
- Shrinking IT security budgets may affect product rollouts by Andrew Briney and Frank Prince
Using identity management tools to manage user accounts, populations
by Neil Roiter
For four organizations, identity management means getting a grip on their user populations...and that's just the beginning.
Profile: Gil Shwed, Check Point co-founder, CEO
by Anne Saita
Check Point's co-founder and CEO needs to pick another winner if he's to maintain the company's strong market presence.
- Using identity management tools to manage user accounts, populations by Neil Roiter
Shiny-blinky things: Security of IT security products often overlooked
by Andrew Briney
When buying IT security products, enterprises often neglect to consider whether the products themselves are secure.
Kevin Mitnick security conference shrouded in secrecy
by Lawrence Walsh
The famed ex-con hacker's "super-secret" security conference shields executives from public view.
IT security career advice: Landing an information security job
by Jay Heiser, Contributor
The information security job market is tough. Jay Heiser offers IT security career advice for smart job-hunting.
Identifying which type of firewall is right for you
by Fred Avolio, Contributor
Packet filters, proxies, stateful inspection--which type of firewall is right for your enterprise? Here's how to decide.
- Shiny-blinky things: Security of IT security products often overlooked by Andrew Briney
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...