Access "Events: Information security conferences for August 2006"
This article is part of the August 2006 issue of Special manager's guide: Monitoring identities
SEPTEMBER Access Intelligence Seminar Series www.events.techtarget.com/ai September 19, 21, 26 Hosted by Information Security This free one-day seminar delivers tips, tactics and techniques to get the most out of your identity and access management initiatives. Events will be held Sept. 19 in Washington, D.C.; Sept. 21 in Dallas, Texas; and Sept. 26 in New York City. IT Security World Conference & Expo 2006 www.misti.com September 25-27 San Francisco, CA MIS Training Institute's annual conference offers sessions on managing risk and technology. Johnny Long will tackle black hat myths, and CA chief security strategist Ron Moritz will moderate a panel of white hats. The CISO Summit returns, kicking off the event. OCTOBER SANS Network Security www.sans.org October 1–9 Las Vegas, NV The 12th annual conference features 20 training courses with instructors Eric Cole, Stephen Northcutt, Ed Skoudis and Mike Poor, among others. Topics include wireless networks, hacker techniques, intrusion detection, and securing Windows and Unix. GSE, GSM, GSC certification exams ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
- What's a Hot Pick?
-
Single Sign-On Explained
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
1 is the loveliest number -
It's a Dirty Job...
SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty details.
-
Security Event Management
Check Point Software Technologies' Eventia Analyzer 2.0 and Eventia Reporter
-
Web Application Break-In
THREATS It's time to protect online assets from increasing attacks.
-
Buyers look for demonstrable success in innovative companies
Cool Tech Ain't Enough.
-
Akonix Systems' Akonix A-Series Product Review
In this product review, get information on instant messaging (IM) Akonix Systems' Akonix A-Series appliance. Get tips on configuration, installation, reporting and policy control.
-
Vendor Security Product News and Updates
Learn about the latest products and security updates from vendors like Crossbeam, Airmagent and Marshal. Get pricing information as well as setup and installation tips.
-
- At Your Service: August 2006 managed services security news
- Events: Information security conferences for August 2006
-
User authentication options: Using two factor authentication for security
Discover how using two-factor authentication can improve organizational security. Weigh your authentication options and choose the right product for your enterprise.
-
Three Pitfalls to Avoid
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
3 strikes, you're out -
IDP/Network Access Control
ForeScout Technologies' CounterACT
-
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.
-
Instant Messaging: Symantec IM Manager 8.0
Symantec's IM Manager 8.0
-
Columns
-
Editor's Desk: Consolidation is in
Synergistic Solutions
-
Layer 8: Personal devices put enterprise data at risk
Creeping Consumerization
-
Perspectives: Frame security as a business concept
Security efforts are considered operational, even when CISOs manage to interact with executives.
-
Ping: Heidi Kujawa
Heidi Kujawa
-
Editor's Desk: Consolidation is in
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO