https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png 0 0 SecurityOrb_Staff https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png SecurityOrb_Staff2011-09-14 13:13:062011-09-14 13:13:06Last Chance to register for 2nd Annual NSA Trusted Computing Conference & Exposition
The 2nd Annual NSA Trusted Computing Conference and Exposition, hosted by the National Security Agency, kicks off in less than one week, September 20 – 22, in Orlando, FL! This year’s conference presents the theme, “Using COTS Technologies to Deliver Decisive Defensive Advantage.” Don’t miss the opportunity to be a part of the discussions about the security of vital data, networks and critical enterprise application and define the future of Trusted Computing!
It is not too late, registration is still open! Take a look at the extensive topics addressed, explore the expertise of our speakers, and consider the benefits of this conference for you personally and for your organization as a whole.
Below are some of the distinguished keynote speakers who will be presenting at the conference. To see a full list of speakers, please view the conference agenda:
- Mr. Tony W. Sager
Chief Operating Officer for the Information Assurance Directorate, National Security Agency
- Mr. Michael A. Lamont
Chief, Network Solutions Office, National Security Agency/Central Security Service (NSA/CSS) Commercial Solutions Center (NCSC)
- Mr. Howard J. Ettinger
Chief, Trusted Computing and Platform Services Division, National Security Agency/Central Security Service (NSA/CSS) Commercial Solutions Center (NCSC)
- Mr. Neil Kittleson
Trusted Computing Portfolio Manager, National Security Agency/Central Security Service (NSA/CSS) Commercial Solutions Center (NCSC)
- Mr. John Lambert
Senior Director, Security Engineering and Network Security, Trustworthy Computing, Microsoft
- Ms. Frances Fragos Townsend
Senior Vice President, MacAndrews and Forbes Holdings, Inc.; Former Homeland Security Advisor
- Mr. Sumit Gwalani
Product Manager for Chrome OS Security, Google
In between sessions, take the opportunity to view some of the featured technologies from our 50+ exhibitors. These technologies include, but are not limited to:
- Access Control Devices
- Cyber Security Technology
- IT Systems Security
- Secure Communications
Don’t wait, register today!