You're invited

You're invited
You're invited
Unifying vulnerability information with incident logs can go a long way in helping organizations better understand the critical threats to their environment. According to the NSA's Tony Sager, it's all about coupling knowledge of holes in the overall operations with an understanding of the types of events recorded in log files. In this way, IT security staff can work together to establish a set of best practices and standards of operation.

Sager will be addressing these concerns in his keynote address as SC Magazine hosts its Annual Spring IT Security Executive Forum at the Westin Hilton Head Island Resort & Spa in Hilton Head, S.C.

Among the other speakers at this year's exclusive event, you'll hear from Gene Fredriksen, CISO, Tyco International, who will speak on data handling security; while Scott Crawford, research director of  Enterprise Management Associates, speaks on compliance and risk management planning; and Dan Lohrmann, CISO, State of Michigan, will address locking down the network. Additional educational sessions will be led by other leading security practitioners.

The SC Magazine Forum is designed to provide IT security executives with a stimulating, informative and useful experience in a relaxing setting. In addition, attendees will schedule meetings with vendors who have been carefully selected to meet their individual business requirements.
The vendors in attendance at the
SC Forum are leaders in the industry. Registrants will be sent a list of participating vendors before the Forum so they may choose which ones they would like to meet. Each meeting is 30 minutes long, and as the vendors are notified in advance of their meeting schedule, they will already know your basics. 

To book your place, simply submit the form on our site, www.scmagazineus.com. Remember, there are only 50 delegate places, so please book now.

Any questions, please email Events Coordinator Natasha Mulla or call her at 646-638-6108.
close

Next Article in Features

Sign up to our newsletters

More in Features

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Urgent care: Safeguarding data at health care providers

Urgent care: Safeguarding data at health care providers

Health providers have pressing reasons to now embrace security, says INTEGRIS Health's John Delano. Karen Epper Hoffman reports.

Deciphering cloud strategy

Deciphering cloud strategy

There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.