Organizations/Events - Page 20.75

Discover Organizations/Events News

Taking the Security Message to the Suits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Where does the security buck stop? All of the certifications and training in the world won't make any difference to the security of corporate networks if senior managers and top executives don't understand the problems and requirements faced by security professionals, a consultant and former CIO said in a Wednesday keynote speech here at the Security Decisions 2003 conference.. . .

Network Security Symposium 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are network intrusion detection systems (NIDS) still relevant? With the emphasis shifting to network intrusion protection in the last two years, this technology looks like it is on its last legs. But is it? Related to intrusion detection and protection . . .

Will Security Professionals Get Promoted?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As CEOs turn to security professionals to protect the enterprise, it's about time some security professionals became top executives themselves. Security is finally becoming a primary IT job function. But does it mean that security professionals will be granted their own role in executive management?. . .

InfoSecWriters Book and Training Kit Giveaway

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Von Spangler submits Currently the Info-Sec Writers Guild - a non-profit organization (www.infosecwriters.com) - has security/hacking books and training kits that they're giving away as prizes for the "Best Security Papers" of the month contest. Basically anyone who submits . . .

IEEE Begins Standard to Create Baseline for More Secure Operating Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The ability to enhance security in information systems and networks is limited by the operating systems that underpin them. Recognizing this, the Institute of Electrical and Electronics Engineers (IEEE) has begun work on a standard to formulate consistent baseline security requirements for general-purpose (GP), commercial, off-the-shelf (COTS) operating systems.. . .

Program focuses on security response

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Computer Emergency Response Team (CERT) Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response.. . .

CERT Conference

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Matthew G. Marsh submitsThe Fifth Annual CERT Conference on Computer Security and Information Assurance will be held August 5-7, 2003. The online registration site is now open. Early bird registration closes July 10th. . .

Information Assurance Conference 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This conference is designed by and for those responsible for Information Assurance programs in the public sector. The three-day agenda includes sessions on planning, managing, and funding IA initiatives throughout government enterprises. September 15 - 17, 2003 . . .

CeBIT America 2003 show preview

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If not center stage, Linux and Open Source software certainly occupy a credible place within the upcoming CeBIT America 2003 conference and exhibition taking place at New York City's Jacob K. Javits Convention Center, reflecting the growing acceptance and use of . . .

Security Policy Monitoring Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the quest for an ironclad information-security program, organizations typically take a textbook approach: First, a business-impact analysis and asset-assessment study identify critical data needing protection and the servers where that data resides. Then, security policies are developed from these studies, your business plan and organizational goals.. . .

Major Internet Standards Group Working On Fast Plan To Can Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Everybody has a plan to end spam these days. But the work the Anti-Spam Research Group is doing is different. The ASRG has the prestige to get its proposals put in place. The group is affiliated with the Internet Engineering Task Force (IETF), which sets the standards for the fundamental technologies that make the Internet possible.. . .

Open-source leaders pitch Linux policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Leaders of several major open-source projects have joined George Washington University's Cyber Security Policy and Research Institute to push for greater government use of the Linux operating system.. . .

Hivercon 2003 Call For Papers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Following the success of last year's event, organization has begun for the HiverCon 2003 Corporate Security Conference. To be held in Dublin on November 6th-7th the venue is the Jurys Ballsbridge Hotel set in the heart of the city center. . .

AU: Feds Praise Alternative Security Conference

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Patrick Gray submits The Australian Federal Police are taking firm steps toward forging closer ties with the underground hacking community as evidenced at a recent security conference. Ruxcon, a conference organised by and for the Australian computer security community . . .

XML security standard touted at show

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of application security vendors affiliated with the Organization for the Advancement of Structured Information Standards (OASIS) will next week announce a proposal for an XML standard for application vulnerabilities. The announcement will be made at the RSA Conference being held in San Francisco.. . .

New Security Paradigms Workshop 2003: Call For Papers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The workshop offers a constructive environment for experienced researchers and practitioners as well as newer participants in the field. The result is a unique opportunity to exchange ideas. NSPW 2003 will take place August 18 - 21 at the Centro Stefano Francini (CSF), the conference center of the Swiss Federal Technical Institute.. . .