SANS Chicago 2011

/
SANS comes to downtown Chicago, October 23-28. This event offers our top instructors and an intimate opportunity to learn, network, and practice the hands-on skills that will boost your career. The new Audit407: The Foundations of Auditing Information Systems will be taught at SANS Chicago 2011. It’s a prequel to the SANS Audit 507 course and is meant to prepare auditors with the baseline of knowledge necessary to take them from being just a security professional to being an effective IS auditor. AUD407 will be taught by SANS Senior Instructor James Tarala. Please note that MGT525 is one of our offerings. This is a rare opportunity to take this PMI course at a regional training event. SANS MGT525 Project Management course has a strong focus on effective communication, risk analysis, continuous monitoring, and utilizes project case studies that highlight information technology services as deliverables.

SANS Baltimore 2011, Baltimore, MD, Save $250 until September 7

/
This is your final reminder that SANS will be hosting hands-on security management, technical security, and computer forensics training at SANS Baltimore 2011 October 9-15! * Register & pay for any five- or six-day course by Wednesday, September 7, 2011, to receive up to a $250 discount and get the best computer security training money can buy. Have you registered yet? (http://www.sans.org/info/85424)

2nd Annual Trusted Computing Conference

/
The 2nd Annual NSA Trusted Computing Conference & Exposition, hosted by the National Security Agency, taking place 20 -22 September in Orlando, FL is just around the corner. This year's conference presents the theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage." Join senior executives and IT security thought leaders from government, industry and academia, and be a part of the discussions about the security of vital data, networks and critical enterprise applications.

Mobile Security eSymposisum – LIVE next Thursday

/
To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they're often brought from home. So, just how are companies supposed to secure these things - some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We'll provide some answers.

Morto Computer Worm Infecting Computers via Remote Desktop Protocol (RDP)

/
A new worm called Morto has begun making the rounds on the Internet in the last couple of days, infecting machines via RDP (Remote Desktop Protocol). The worm is generating a large amount of outbound RDP traffic on networks that have infected machines, and Morto is capable of compromising both servers and workstations running Windows. If you have any questions or need assistance, please let me know and I will follow up with you. Additional Information: • http://threatpost.com/en_us/blogs/new-worm-morto-using-rdp-infect-windows-pcs-082811 • http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fMorto.A • http://blogs.computerworld.com/18870/morto_worm_spreading_fast_via_rdp?af

Security Conference “DerbyCon” Makes a Splash in the Information Security Field with a Huge Speaker Lineup. A New Hackercon is Born

/
DerbyCon is a new hacker conference in the heart of Louisville, Kentucky's 4th Street Live. DerbyCon isn’t just another security conference, we’ve taken the best elements from all of the conferences we’ve ever been to and put them into one. This conference is a place you can call home, where you can meet each other or new people, party, and learn.

1105 MEDIA ANNOUNCES KEYNOTES FOR INAUGURAL 2011

/
1105 Government Information Group, the leading provider of integrated information and media for the government information technology (IT) market, today announced new keynote presenters for its 2011 Geospatial Summit. The event will be held September 13, 2011 at the Hyatt Dulles in Herndon, Virginia. The opening keynote address, GIS to the Rescue: The Critical Role of Geospatial Technology in Disaster Response will provide an account of a real-world emergency response from veteran disaster relief expert Michael Byrne, Leader -National Incident Management Assistance Team - Blue (N-IMAT Blue), Federal Emergency Management Agency (FEMA), as well as the technical expertise of Russ Johnson, Director - Public Safety and Homeland Security, Esri.

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics

/
Aug 4, 2011 | ALBUQUERQUE, NM - The cybersecurity executing arm of the United Nations has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries.

TECHNICAL SECURITY CONFERENCE (FREE FOR GOVT) : GET Continuing Education Credits

/
EC-Council is bringing some technical training classes to DC which culminates with a one-day highly technical security seminar on Aug 25 and it is free for all Government employees!..... and subsidized for the rest to just $99 ! Unlike other conferences, participants will not be rushed through the presentations, and they can actually learn about the specific topics that are being presented. Renowned security and cyber warfare experts - Jeff Bardin and Richard Stiennon, will be the keynotes for this seminar. The pricing of the event is kept very low to ensure that budget cuts do not affect the community.

NSA Trusted Computing Early Bird Rate Runs Out Friday!

/
To ensure the reduced early bird registration rate, be sure to sign up for the 2nd Annual NSA Trusted Computing Conference & Exposition by Friday, 12 August! Join hosts, the National Security Agency, on 20 - 22 September in Orlando, FL, to explore the conference theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage." The National Security Agency is pleased to announce the addition of three new exceptional speakers to the agenda: