Access "Events: Information security conferences for February 2007"
This article is part of the February 2007 issue of Tips for navigating the maze of global security regulations
MARCH Infosec World Conference & Expo 2007 www.misti.com March 19-21 Orlando, Fla. MIS Training's annual conference plans tracks on regulations and information security, securing service-oriented architectures, a security overview of Vista, and next-generation threats like RFID, VoIP and VoWi-Fi. Keynote speakers include FBI unit chief Daniel Larkin and the co-founder of Harvard's Berkman Center for Internet & Society, Jonathan Zittrain. Special programs include "An Evening with Ira Winkler," as well as the CISO Executive Summit and Security Compliance Summit. ShmooCon www.shmoocon.org March 23-25 Washington, D.C. This annual hacker convention features three tracks this year. Day one is a series of 30-minute tracks, a mix of technology and light-hearted sessions, followed by day two's focus on exploits and day three's look at innovative hardware and software. Attendees can also join other attendees, vendors and researchers in the ShmooCon Labs and try to build a secure enterprise-class network. Secure IT Conference 2007 www.secureitconf.com March 27-29 ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unified threat management: Fortinet's FortiGate 3600A
Fortinet's FortiGate 3600A
-
Encrypt It
Unencrypted data at rest is data at peril.
-
New tools target ISPs to stop botnets
Security vendors are bringing the botnet fight to ISPs and carriers.
-
Intrusion Prevention: Juniper Networks' ISG 2000 with IDP
Juniper Networks' ISG 2000 with IDP
-
Endpoint Security: ScriptLogic's Desktop Authority 7.5
ScriptLogic's Desktop Authority 7.5
- At Your Service: February 2007 managed security services news
- Events: Information security conferences for February 2007
-
Unified threat management: Fortinet's FortiGate 3600A
-
-
Security system products latest releases: Archsight, Finjan, Sophos
Get information, such as price, features, protection and support, on the most recently released versions of security products, such as Archsight logger and Sophos Security Suite.
-
Vulnerability scanning review: PatchLink's PatchLink Update 6.3
PatchLink's PatchLink Update 6.3
-
IPS by the Numbers
Choosing the right intrusion prevention technologies and products is a complex task, but following these six steps will make it simpler.
-
Information security blueprint for architecture and systems
A formalized security architecture diagrams how you should handle the changing threat and regulatory environments.
-
HIPAA privacy records and guidelines: How to achieve compliance
Learn how to achieve compliance with HIPAA certification and learn to avoid and fix risks with password security, privacy regulations, records, guidelines.
-
Cyber-Ark Enterprise Password Vault 4.0 product review
by Tom Bowers, Contributor
Product review of Cyber-Ark Enterprise Password Vault, a password management and security tool that manages passwords and controls privileged accounts.
-
Going Global
Organizations sending data abroad must be prepared to comply with a slew of privacy and security regulations.
-
Security system products latest releases: Archsight, Finjan, Sophos
-
Columns
-
Ping: Josh Seeger
Josh Seeger
-
Layer8: Is risk management for real?
Fad or For Real?
-
Perspectives: Suite Spot
All-in-one security suites offer an array of advantages versus best-of-breed.
-
Editor's Desk: Can someone call an exterminator?
A Bug's Life
-
Ping: Josh Seeger
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO