First CAST Summit – EC-Council
The very first CAST Summit will be held in Washington DC from Aug 22 – 25 at the Hyatt Regency Bethesda.
There is a suite of advanced and technical security to choose from from Aug 22 – 24, and a special training seminar on Aug 25. This unique and specially designed series will cover topics such as advanced penetration testing, digital mobile forensics, application security, network defense and cryptography.
Recent spate of high profile IT security incidents has heightened the need for advanced security training. You or members of your organization can acquire the necessary skills at CAST Summit to better prepare for such attacks.
Special Promotion: Sign up for any CAST Workshop before Jul 22, and get an iPad 2.
For more information or to download the CAST Summit brochure, please visit http://www.eccouncil.org/castsummit or email me at leonard@eccouncil.org.
We hope to have you join this very unique designed program. Do pass this on if you think this will benefit your team members, colleagues or peers.
Best regards
Leonard Chin
Director of Marketing, Conferences & Events (EC-Council)
Director – Center of Advanced Security Training (CAST)
EC-Council 2011 Security Events
Hacker Halted USA – October 21-27, Miami, www.hackerhalted.com/2011
Hacker Halted Asia, November 17-19, Kuala Lumpur, www.hackerhalted.com
Takedowncon 2 – Mobile Security, December 2-7, Las Vegas, www.takedowncon.com
Hacker Halted USA, October 21-27 in Miami, is the EC-Council’s flagship IT security event for both technical experts and C-Level executives. It hosts lots of technical training courses and a two-day conference with exhibits. The conference track themes include cloud security, SCADA, and timely topics chosen by peer review and input from 450 training companies worldwide. SecurityOrb subscribers can receive a $100 discount on the two-day conference or the six-day Training/Conference Package by inserting the code HHMP31 when prompted.
The Federal Information Security Management Act (FISMA)
The Federal Information Security Management Act (FISMA) was established in 2002 as a Federal law designed to increase the security posture of Federal Systems and their supporting entities. Since its establishment, an increasing number of Federal information systems and databases have been integrated into non-Federal agencies, including municipalities, law enforcement, and contractors.
More Information on FISMA:
FOSE 2011 Conference & Expo Coming in July – Receive a 20% discount off the full conference rate
The FOSE Conference & Expo is returning to Washington, DC, July 19-21 – are you planning to attend?
If you’ve never been to FOSE before, then make 2011 the year you attend! There’s a reason (several, actually) why it’s the top government IT event in the country. FOSE features a FREE Expo with education sessions and over 400 IT solution providers, including Blackberry, Canon and Dell. Another excellent reason to attend FOSE: Apple founder Steve Wozniak will be one of this year’s keynote speakers!
This year’s Conference features advanced level sessions and keynotes across 5 tracks, including:
- Enabling the Mobile Government Workforce
- Cybersecurity, Network Defense and Information Assurance
- Next Generation Infrastructure Strategies
- Information Management & Collaboration
Interested in attending FOSE? Register today at http://bit.ly/FOSE20Reg for a 20% discount off the full conference rate!
HD Moore “Bounty: 30 Exploits, $5,000.00, in 5 weeks”
The Metasploit team is excited to announce a new incentive for community exploit contributions: Cash! Running until July 20th, our Exploit Bounty program will pay out $5,000 in cash awards (in the form of American Express gift cards) to any community member that submits an accepted exploit module for an item from our Top 5 or Top 25 exploit lists. This is our way of saying thanks to the open source exploit development community and encouraging folks who may not have written Metasploit modules before to give it a try.
All accepted submissions will be available under the standard Metasploit Framework license (3-clause BSD). Exploit selection is first-come, first-serve; please see the official rules for more information.
Contributors will have a chance to claim a vulnerability from the Top 25 ($100) and Top 5 ($500) lists. Once a vulnerability has been claimed the contributor will be given one week to work on a module. After a week the vulnerability will be open again to the community. Prizes will only be paid out to the first module contributor for a given vulnerability. The process of claiming a vulnerability is an attempt at limiting situations where multiple contributors submit modules for the same vulnerability. To stake a claim, send an email to bounty@metasploit.com with the name ofthe vulnerability from the list below. All claims will be acknowledged, so please wait until receiving the acknowledgement before starting on the exploit. Each contributor can only have one outstanding claim at a time.
IT Governance, Risk and Compliance Conference
At ISACA’s IT Governance, Risk and Compliance Conference you will discover how to enhance the value that IT provides your enterprise, and learn how to ensure IT-related risks are managed and how to assure outcomes including performance and compliance.
You will also learn from knowledgeable practitioners and benefit from ISACA’s IT governance frameworks and professional guidance.
