2nd Annual Trusted Computing Conference

The 2nd Annual NSA Trusted Computing Conference & Exposition, hosted by the National Security Agency, taking place 20 -22 September in Orlando, FL is just around the corner.  This year’s conference presents the theme, “Using COTS Technologies to Deliver Decisive Defensive Advantage.”   Join senior executives and IT security thought leaders from government, industry and academia, and be a part of the discussions about the security of vital data, networks and critical enterprise applications.

To get the latest scoop about the conference, be sure to read “Trusted Computing Group Experts and Members to Address Attendees of the NSA Trusted Computing Conference & Exposition,” featured in Yahoo! Finance. Want to find out more about the speakers highlighted in this article; take a moment to check out the conference agenda.

 
Registration is still open! We encourage you to take a look at the extensive topics addressed, explore the expertise of our speakers, and consider the benefits of this conference for you personally and for your organization as a whole.
 
We hope that you’ll join us in Orlando to define the future of trusted computing!
 
Follow NSA Trusted Computing Conference & Exposition on Twitter @NSA_TC_Con
 
Important Links:
1. Registration
2. Agenda
3. Exhibitor Listing
4. Hotel – Book your room reservation by Friday, 2 September to ensure reduced rate.
 
For the more information about this and additional conferences, please visit www.ncsi.com or call 888-603-8899.
Exhibit space contracts are now available! For more information please email conferencesales@ncsi.com.

Mobile Security eSymposisum – LIVE next Thursday

SC Magazine is offering you a new opportunity to earn CPE credits at no cost and with no travel required.

SC eSymposium: Mobile Security

Date: Thursday, September 8 at noon
Location: Your computer

Earn CPE credits for attending*

Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/?ZXU=1678658&ZXD=116990750

To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial – one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they’re often brought from home. So, just how are companies supposed to secure these things – some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We’ll provide some answers.

Platinum sponsors:
Accellion
Ping Identity
Thawte

Featured exhibitor:
WinMagic

SC World Congress 24/7 exhibitors:
ArcSight
Cisco
Secunia
Solutionary
Sophos

Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/?ZXU=1678659&ZXD=116990750

For more information, please e-mail mailto:maggie.keller@haymarketmedia.com

*SC Magazine is a designated (ISC)2 CPE provider. CPE credits will be issued to only live attendees with (ISC)2 credentials.

Security Conference “DerbyCon” Makes a Splash in the Information Security Field with a Huge Speaker Lineup. A New Hackercon is Born

DerbyCon is a new hacker conference in the heart of Louisville, Kentucky’s 4th Street Live. DerbyCon isn’t just another security conference, we’ve taken the best elements from all of the conferences we’ve ever been to and put them into one. This conference is a place you can call home, where you can meet each other or new people, party, and learn.

Welcome to a new age in security conferences, a new beginning, and a new way to share in the information security space. Our goal is to create a fun environment where the security community can come together and share ideas. Before we even released the CFP, our speaker list has filled up with of some of the industry’s best and brightest minds. That fact alone shows that DerbyCon is poised to change the face of security cons.

Some of these speakers include:

Dave Kennedy (ReLIK) – Founder DerbyCon, Creator Social-Engineer Toolkit, Fast-Track
Adrian Crenshaw (Irongeek) – Founder, DerbyCon, Irongeek.com, Co-Host, ISD Podcast
Martin Bos (PureHate) – Founder, DerbyCon, Question-Defense, BackTrack Developer
HD Moore (hdm) – Founder Metasploit, CSO Rapid7
Chris Nickerson – Founder Lares Consulting, Exotic Liability
Kevin Mitnick – Founder, Mitnick Security Consulting
Ed Skoudis – Founder, InGuardians, SANS Instructor
Bruce Potter (gdead) – Founder, The Shmoo Group, Co-Founder/CFO, Ponte Technologies
Chris Gates (carnal0wnage) – Rapid7, Attack Research
Chris Hadnagy (loganWHD) – Founder, Social-Engineering.org
Paul Asadoorian – Tenable Networks, Founder, Pauldotcom
Larry Pesce (haxorthematrix) – NWN Corporation, Co-Host, Pauldotcom
James Lee (egypt) – Rapid7, Metasploit Development Team
Peter Van Eeckhoutte (corelanc0d3r) – Founder, corelanc0d3r Team
Carlos Perez (darkoperator) – Tenable Networks, Metasploit Development Team
Jim O’Gorman (elwood) – Founder, Social-Engineer.org
Thomas D’Otreppe (Mister_X) – Creator, Aircrack-ng
Int0x80 – Dual Core Music

DerbyCon offers both conference level talks as well as high-end two-day training for those wanting to do additional activities. There are a number of events scheduled including the awesome appearance of nerdcore rapper Int0x80 from Dual Core. Capture The Flag (CTF), Network King of the Hill, Lockpick Village, Soldering Village, and Marathon “Hacker Movie” Theater are just a few of the events scheduled. BSIDES Kentucky will also be running at the same time as the training. There will always be something for people of different interests to do while at DerbyCon, whether it be the talks during the day or training and BSIDES at night.

DerbyCon is from September 30 – October 2nd, 2011. Tickets to this event are limited – registration begins Friday, April 29, 2011. If your interested in speaking or to be a trainer, Call For Papers is now officially open and accepting submissions. Be sure to check out http://www.derbycon.com for more information about the con and to register!

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics

 

Aug 4, 2011 | ALBUQUERQUE, NM – The cybersecurity executing arm of the United Nations has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries.

Created by EC-Council, the Global CyberLympics is a series of ethical hacking games comprised of both offensive and defensive security challenges that will take place starting from September across six continents. Teams will vie for regional championships, followed by a global championship round to determine the world’s best cybersecurity team. The EC-Council is sponsoring over $400,000 worth of prizes at the CyberLympics.

The Global CyberLympics is supported by the International Multilateral Partnership Against Cyber Threats (IMPACT), the cybersecurity executing arm of the United Nations’ specialized agency – the International Telecommunications Union (ITU). With this support, the Global CyberLympics hopes to be able to promote its mission to 136 partner countries.

“The Global CyberLympics could help to foster a greater sense of partnership and cooperation between countries on the issue of cybersecurity,” said Mohd Noor Amin, Chairman of IMPACT. “By sharing knowledge, training and resources, we can help to improve the level of cybersecurity in many countries and regions around the world.”

“Our purpose with the Global CyberLympics initiative is to help establish true cybersecurity partnerships across borders,” said Jay Bavisi, Chairman of the Global CyberLympics Organizing Committee and president of EC-Council. “We are very proud and honored for this initiative to be supported by key players in the information security community, including IMPACT, the world’s first United Nations-backed global alliance for cybersecurity, as well as some of the most reputable events such as GITEX, the largest IT tradeshow in the Middle East region, and Hacktivity, the largest hackers conference in central and eastern Europe.”

The games come at a crucial time as global cyber threats appear to be escalating. According to the U.S. Cyber Consequences Unit, the annual loss of intellectual property and investment opportunities is $6 to $20 billion as a result of hacking. In a recent article about cyber espionage attacks against the US, the magazine Vanity Fair even referred to 2011 as “the Year of the Hack.”

The EC-Council’s mission with the Global CyberLympics is to unify global cyber defense through the games, along with the following objectives:

  • Capacity Building: Discover new talents, methods and ideas; and to encourage development in the field of information security. Besides discovering gifted hackers and cyber-defenders, the Global CyberLympics will also inspire the development of Information security professionals of the future.
  • Raising Awareness: Educate the global community, especially in developing nations and third world countries, on the issues of Information security, and encourage further development of the field. This will raise awareness towards increased education and ethics in information security.
  • Global Peace: Foster friendshipand create cohesiveness between information security professionals, whether as an individual, representing a corporation or for a national agency, and encourage frequent exchange of essential information, technology and skills.

Regional championships will be held in various locations across different continents, and co-hosted with reputable IT/information security conferences and tradeshows, as follows:

  1. North America Eastern | Hacker Halted USA – Miami, USA
  2. North America Western | TakeDownCon – Las Vegas, USA
  3. South America | H2HC – Sao Paolo, Brazil
  4. Europe | Hacktivity – Budapest, Hungary
  5. Middle East & India | GITEX – Dubai, UAE
  6. Asia Pacific | Hacker Halted APAC – Kuala Lumpur, Malaysia
  7. Africa | TakeDownCon – Johannesburg, South Africa

The CyberLympics world final is tentatively scheduled for the first quarter of 2012, with its venue still being decided.

EC-Council has selected iSight Partners’ Threatspace platform as the Official Technology Partner of the Global CyberLympics 2011-12.

Registration for the Global CyberLympics is open, and more details can be found at the official Global CyberLympics website: http://www.cyberlympics.org.