Cybersecurity 2013 – Security Management Strategies

Join us for our featured Fall program “Cybersecurity 2013 – Security Management Strategies,” taking place next Thursday in Washington, DC.

This complimentary*, half-day seminar will cover strategies for protecting your agency’s networks, data centers, and end users from malicious attacks and will reveal insights into current programs designed to equip Federal IT and security professionals with practical information for use in GFY 2013. See the program below:

Opening Keynote
Continuous Monitoring 2.0 – From Mobile to Cloud Computing Dr. Ron Ross,

Computer Scientist and NIST Fellow, Computer Security Division, National Institute of Standards and Technology, Department of Commerce

Focus on Mobile Security – Understand the Threat EnvironmentScott Montgomery, Vice President, Public Sector Solutions, McAfee
Creating a Roadmap for Cybersecurity Risk Reduction

Steve LeSueur [Moderator],Contributing Editor, 1105 Government Information Group
Dave Cook, i2 Business Development Manager, IBM
Lee Vorthman, CISSP Cyber Practice Lead, U.S. Public Sector, NetApp
Managing Cybersecurity — Take a Proactive ApproachSteve LeSueur [Moderator]

, Contributing Editor, 1105 Government Information Group
Cris Turner, Senior Consultant Federal Government Affairs, Dell

Closing Keynote
We Are Anonymous — Perspectives on Global Cyber Insurgency and the Future of Computer SecurityParmy Olson, London Bureau Chief, Forbes and author of We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Register today – this event is FREE* for government and military personnel.

*Industry attendee registration fee $50. Government registration status will be verified by email address or photo identification.

*Attendance at an FCW Executive Briefing may qualify for CompTIA Continuing Education Units. Please visit CompTIA’s Continuing Education Program here for more information:

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.