Kai Axford will be speaking on two topics at GovSec which will be help on April 2 – 4 at the Washington Convention Center in Washington, DC. SecurityOrb.com had the esteem opportunity to pick his brains. Listen below to the interview. […]
Alan Paller of SANS Institute Speaks at ISSA-LA Information Security Summit on Cybercrime
Director of research at SANS Institute Alan Paller will keynote at the Los Angeles Chapter of the Information Systems Security Association’s Information Security Summit. He will speak on new research showing how to combat cyber attacks […]
At the beginning of this year, the Department of Defense (DoD) released a new strategy that called for increased investments in technological innovation, specifically in the areas of cybersecurity and intelligence systems. Before implementing these advances, the DoD and industry will need to be armed with the knowledge and insights to apply these technologies in a secure environment. The FOSE 2012 Defense Innovations Conference will provide answers to the latest threats, how to adapt enterprise-wide programs, as well as solutions to protecting and achieving the DoD mission. Attendees will be able to participate in sessions focused on Cybersecurity, Mobile Device and Application Security, Enterprise Resource Planning Systems and Biometric Integration. FOSE 2012 will take place April 3-5, 2012 at the Walter E. Washington Convention Center in Washington, D.C.
SecurityOrb.com had the opportunity to speak with Mischel Kwon, the Program Chair of the Cybersecurity Conference at FOSE and will also be presenting the “Threat Intelligence – New Products and Their Payoff” […]
The Counter Terror Expo US , being held May 16-17, 2012 at the Walter E. Washington Convention Center , will feature a panel of elite counterterrorism journalists to discuss the challenges that they face in covering global counterterrorism issues. The panel, “Media Perspectives on Covering Global Counterterrorism,” is scheduled for Wednesday, May 16 at 9:15 a.m. immediately following Michael Leiter’s keynote address.
Organizers of Counter Terror Expo US
According to a survey by InfoSecurity magazine that stated IT professionals’ average salaries overall decreased by 5.5%, while those in IT security increased by 3.1% show that experience in security is a valuable skill.
Furthermore, The US Department of Defense (DoD) Directive 8570.1-M requires every part-time or full-time military member or defense contractor that has access to a privileged DoD system to be held by trained and CERTIFIED personnel in a commercial certification to enhance Information Assurance (IA) of the US Department of Defense’s (DoD) information, information systems, and networks. […]
Security assessments can fall into many categories and an organization’s core competency often dictates which ones management is more interested in conducting. For example, an organization that has an external presence may be very interested in how they appear to the outside world and how well they are protecting their internal resources from external entities trying to harm them. Whereas, another governmental institution maybe more concerned with their internal security posture and controls as compared to how they appear to the outside world. They may have a pressing need to verify internal access control, password compliance and proper network segmentation as opposed to what protocols are accessible from the public network. The actual type of assessment performed usually depends on the organization’s mission as well as their overall security need. […]
Today’s High Level Conference on Privacy and Protection of Personal Data, held simultaneously in Washington, DC and Brussels with the participation of Vice-President Viviane Reding and Secretary John Bryson, represents an important opportunity to deepen our transatlantic dialogue on commercial data privacy issues. The United States and the European Union clearly share a commitment to promoting the rights of individuals to have their personal data protected and to facilitating interoperability of our commercial data privacy regimes. […]