ISSA Hawaii's 21st Annual ISSA Discover Security Conference
Date: October 15-16, 2014
Location: Hale Koa Hotel, Honolulu, Hawaii
Cost (both days are included):
ISSA Members: $40
Theme: Security Intelligence: You Can Never Have Too Much
Today's sophisticated attackers continue to circumvent perimeter defenses and target the data and applications at the heart of your business. Their goal is to attack the very systems and data that help you create and keep customers, manage and create intellectual property, and maintain a positive cash flow.
Although technology has enabled us, like never before, to go beyond our physical or mental limitations, we find that technology can also be our enemy. Technology is enabling people to cross boundaries, break ceilings, and change the way we see and do things, almost everyday. But is it too much? How do we protect ourselves from ourselves if the technology we use to enable us becomes exploited by someone else and used against us?
Cyber criminals are getting smarter and can skirt our defenses and blend into the background noise of an organization’s operations. They are skilled and patient enough to perform stealthy reconnaissance of an organization’s network over months or years. Eventually, they can seize the right opportunity to steal sensitive information assets in the form of intellectual property, credit card numbers, and customer databases. As they compromise the network, they easily can commit fraud, or otherwise damage the enterprise.
The rash of major security breaches and fraud incidents are making international headlines. This forces organizations and cyber security professionals to address the growing problems of advanced persistent threats, fraud, and insider attacks. To address both the proliferation and magnitude of these challenges, organizations need to consider a more automated, proactive approach to security.
In short, organizations need to incorporate security intelligence as an essential part of the business.
Come to our Discover Security Conference to learn more about the latest trends in cyber-security. Take an in-depth look at intelligence resources and network with some of the best cyber-security industry experts from around the globe. Find out how to combine current system protections and new advances to augment the security posture and capabilities of your organization.