Organizations/Events - Page 20.5

Discover Organizations/Events News

Security: From Theory to Practice

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Secure Trusted Operating System Consortium (STOS) announced Friday the keynote speakers for its fifth annual symposium to be held December 1-5, 2003 at George Washington University in Washington, DC. Anyone involved in securing Mac OS X or BSD systems or . . .

Security spec gets an upgrade, broader backing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Trusted Computing Group passed a milestone in its efforts to improve computer security this week, announcing a key update of its specification. The update comes as the TCG adds Sun Microsystems Inc. to its membership and forms a new working . . .

Clarify security ROI, experts urge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies will have to change the way they sell security products, analysts have advised. The security-selling problem stems from IT staff and management executives holding different views on what constitutes a return on investment (ROI).. . .

Knowledge Center: Four ways to secure your company on a shoestring budget

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If your company lacks the basics--antivirus software, firewalls and other basics--then your organization is in serious trouble. The only way you can survive in this situation is if you are not connected to the outside world at all. If you are in this unfortunate situation and can't convince your senior management of the extreme danger of this position, then I'd suggest you polish your resume, hone your skills and start packing.. . .

The State of Information Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The best place to start is with what "The State of Information Security 2003" survey doesn't include. It doesn't include some stark bit of data that will make you slap your forehead and exclaim, "Oh, that's the problem!" It doesn't include figures that suggest a secret formula for setting a security budget.. . .

Taking the Security Message to the Suits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Where does the security buck stop? All of the certifications and training in the world won't make any difference to the security of corporate networks if senior managers and top executives don't understand the problems and requirements faced by security professionals, a consultant and former CIO said in a Wednesday keynote speech here at the Security Decisions 2003 conference.. . .

Network Security Symposium 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are network intrusion detection systems (NIDS) still relevant? With the emphasis shifting to network intrusion protection in the last two years, this technology looks like it is on its last legs. But is it? Related to intrusion detection and protection . . .

Will Security Professionals Get Promoted?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As CEOs turn to security professionals to protect the enterprise, it's about time some security professionals became top executives themselves. Security is finally becoming a primary IT job function. But does it mean that security professionals will be granted their own role in executive management?. . .

InfoSecWriters Book and Training Kit Giveaway

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Von Spangler submits Currently the Info-Sec Writers Guild - a non-profit organization (www.infosecwriters.com) - has security/hacking books and training kits that they're giving away as prizes for the "Best Security Papers" of the month contest. Basically anyone who submits . . .

IEEE Begins Standard to Create Baseline for More Secure Operating Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The ability to enhance security in information systems and networks is limited by the operating systems that underpin them. Recognizing this, the Institute of Electrical and Electronics Engineers (IEEE) has begun work on a standard to formulate consistent baseline security requirements for general-purpose (GP), commercial, off-the-shelf (COTS) operating systems.. . .

Program focuses on security response

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Computer Emergency Response Team (CERT) Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response.. . .

CERT Conference

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Matthew G. Marsh submitsThe Fifth Annual CERT Conference on Computer Security and Information Assurance will be held August 5-7, 2003. The online registration site is now open. Early bird registration closes July 10th. . .

Information Assurance Conference 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This conference is designed by and for those responsible for Information Assurance programs in the public sector. The three-day agenda includes sessions on planning, managing, and funding IA initiatives throughout government enterprises. September 15 - 17, 2003 . . .

CeBIT America 2003 show preview

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If not center stage, Linux and Open Source software certainly occupy a credible place within the upcoming CeBIT America 2003 conference and exhibition taking place at New York City's Jacob K. Javits Convention Center, reflecting the growing acceptance and use of . . .

Security Policy Monitoring Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the quest for an ironclad information-security program, organizations typically take a textbook approach: First, a business-impact analysis and asset-assessment study identify critical data needing protection and the servers where that data resides. Then, security policies are developed from these studies, your business plan and organizational goals.. . .

Major Internet Standards Group Working On Fast Plan To Can Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Everybody has a plan to end spam these days. But the work the Anti-Spam Research Group is doing is different. The ASRG has the prestige to get its proposals put in place. The group is affiliated with the Internet Engineering Task Force (IETF), which sets the standards for the fundamental technologies that make the Internet possible.. . .

Open-source leaders pitch Linux policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Leaders of several major open-source projects have joined George Washington University's Cyber Security Policy and Research Institute to push for greater government use of the Linux operating system.. . .

Hivercon 2003 Call For Papers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Following the success of last year's event, organization has begun for the HiverCon 2003 Corporate Security Conference. To be held in Dublin on November 6th-7th the venue is the Jurys Ballsbridge Hotel set in the heart of the city center. . .