Information security began by protecting the corporate perimeter to keep the nefarious actors out. The perimeter is now less tangible, however the data is still the end target. This theme will focus on methods, such as the ones listed below:
- Data Loss Prevention
- Data Discovery
- Data Classification
- Database Monitoring
- Database Vulnerability Assessments
- Data Encryption
- Sanitizing Test and Development Data
Such tools help us understand where our data is and how to guard it at the last possible level of protection: the actual data itself.Event RegistrationAgendaVenueRooming ReservationsTransportation OptionsQuestions
This event is co-located with with the 2012 Rocky Mountain Information Security Summit.
Event RegistrationCISO Executive Members:Click here to register for this ISSA CISO Executive Forum. Rooming reservations can be made at the host hotel as described below.
CISO Guests: Click here to register as a guest. Please note all guest must meet Membership Criteriato attend.
Sheraton Denver Downtown Hotel
1550 Court Place
Denver, Colorado USA 80202
Group Reservation Code: Please state that you are affiliated with ISSA
Rooming reservation can be made at the Sheraton Denver Downtown Hotel.
Please make your reservations no later than 5:00 PM onApril 23, 2012 to take advantage of the $169 (+ tax) discounted rate.
CISO Members: Please make your reservation at the Sheraton Denver Downtown Hotel. ISSA will make arrangements with the facility to pay for one room night at the $169 (+ tax) rate for all confirmed members.
If you are making your hotel reservations after 5:00 PM on April 23, 2012 please contact Anna Vembu (1 503 214 2294), to check on the availability of remaining discounted rooms.
Click here for transportation options
Please contact Anna Vembu at ISSA International Headquarters
1 866 349 5818 ext. 105
Direct: 1 503 214 2294