SANS Chicago 2011
/
0 Comments
SANS comes to downtown Chicago, October 23-28. This event offers our top instructors and an intimate opportunity to learn, network, and practice the hands-on skills that will boost your career.
The new Audit407: The Foundations of Auditing Information Systems will be taught at SANS Chicago 2011. It’s a prequel to the SANS Audit 507 course and is meant to prepare auditors with the baseline of knowledge necessary to take them from being just a security professional to being an effective IS auditor. AUD407 will be taught by SANS Senior Instructor James Tarala.
Please note that MGT525 is one of our offerings. This is a rare opportunity to take this PMI course at a regional training event.
SANS MGT525 Project Management course has a strong focus on effective communication, risk analysis, continuous monitoring, and utilizes project case studies that highlight information technology services as deliverables.
SANS Baltimore 2011, Baltimore, MD, Save $250 until September 7
This is your final reminder that SANS will be hosting hands-on security
management, technical security, and computer forensics training at SANS
Baltimore 2011 October 9-15! * Register & pay for any five- or six-day
course by Wednesday, September 7, 2011, to receive up to a $250 discount
and get the best computer security training money can buy. Have you
registered yet? (http://www.sans.org/info/85424)
Mobile Security eSymposisum – LIVE next Thursday
To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they're often brought from home. So, just how are companies supposed to secure these things - some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We'll provide some answers.
TECHNICAL SECURITY CONFERENCE (FREE FOR GOVT) : GET Continuing Education Credits
EC-Council is bringing some technical training classes to DC which culminates with a one-day highly technical security seminar on Aug 25 and it is free for all Government employees!..... and subsidized for the rest to just $99 !
Unlike other conferences, participants will not be rushed through the presentations, and they can actually learn about the specific topics that are being presented. Renowned security and cyber warfare experts - Jeff Bardin and Richard Stiennon, will be the keynotes for this seminar.
The pricing of the event is kept very low to ensure that budget cuts do not affect the community.
NSA Trusted Computing Early Bird Rate Runs Out Friday!
To ensure the reduced early bird registration rate, be sure to sign up for the 2nd Annual NSA Trusted Computing Conference & Exposition by Friday, 12 August! Join hosts, the National Security Agency, on 20 - 22 September in Orlando, FL, to explore the conference theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage."
The National Security Agency is pleased to announce the addition of three new exceptional speakers to the agenda:
SECURITY 660: Advanced Penetration Testing, Exploits, and Ethical Hacking
As a perpetual student of information security, I am excited to offer this course on advanced penetration testing. Often, when conducting an in-depth penetration test, we are faced with situations that require unique or complex solutions to successfully pull off an attack, mimicking the activities of increasingly sophisticated real-world attackers.
Security Innovation Introduces Software Security Summer Series
Security Innovation today introduced its inaugural Software Security Summer Series, where the company will offer six free eLearning courses from its industry-leading curriculum over the next six weeks. The courses are part of TeamProfessorTM, the company’s computer-based training library with an emphasis on the software development lifecycle and defensive coding techniques. The courses were developed to train developers, architects, designers and group managers on how to build security into the core, fixing the systemic issues of insecure software.
EC-Council 2011 Security Events
Hacker Halted USA, October 21-27 in Miami, is the EC-Council's flagship IT security event for both technical experts and C-Level executives. It hosts lots of technical training courses and a two-day conference with exhibits. The conference track themes include cloud security, SCADA, and timely topics chosen by peer review and input from 450 training companies worldwide. SecurityOrb subscribers can receive a $100 discount on the two-day conference or the six-day Training/Conference Package by inserting the code HHMP31 when prompted. www.hackerhalted.com/2011
IT Governance, Risk and Compliance Conference
At ISACA’s IT Governance, Risk and Compliance Conference you will discover how to enhance the value that IT provides your enterprise, and learn how to ensure IT-related risks are managed and how to assure outcomes including performance and compliance.
You will also learn from knowledgeable practitioners and benefit from ISACA’s IT governance frameworks and professional guidance.
The Top 10 Reasons Why You Should Attend Hacker Halted USA 2011
With a comprehensive agenda, and an international line up of speakers, Hacker Halted USA 2011 promises to be premier information security conference of the year in the East Coast.
Held in Miami for the 3rd year in a row, we will be expecting a strong turnout of Information Security professionals to attend this event and there will be many exhibitors showcasing the latest technologies and tools in Information Security.
Learn from the likes of Bruce Schneier, Philippe Courtot, George Kurtz, Jeremiah Grossman, Barnaby Jack, Moxie Marlinspike, Charlie Miller, Thomas Roth, Anton Chuvakin and many other best brains in the information security space.