Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA Hawaii's 21st Annual ISSA Discover Security Conference
View Registrations Tell a Friend About This EventTell a Friend
 

Security Intelligence: You Can Never Have Too Much Come to our Discover Security Conference to learn more about the latest trends in cyber-security. Take an in-depth look at intelligence resources and network with some of the best cyber-security industry experts from around the globe. Find out how to combine current system protections and new advances to augment the security posture and capabilities of your organization.

10/15/2014 to 10/16/2014
When: 10/15/2014
8:00 AM
Where: Hale Koa Hotel, Honolulu, Hawaii
2055 Kalia Rd
Honolulu, Hawaii  96825
United States
Contact: Bryan Wagonseller

« Go to Upcoming Event List  

 ISSA Hawaii's 21st Annual ISSA Discover Security Conference

 Date:  October 15-16, 2014

 Location:  Hale Koa Hotel, Honolulu, Hawaii

 Cost (both days are included):

 ISSA Members: $40

 Non-Members: $90

 

 Registration:  http://www.issahawaii.org/register.cfm?eventID=273324

 Theme:  Security Intelligence: You Can Never Have Too  Much

Today's sophisticated attackers continue to circumvent  perimeter defenses and target the data and applications at  the heart of your business. Their goal is to attack the very  systems and data that help you create and keep customers,  manage and create intellectual property, and maintain a  positive cash flow.

Although technology has enabled us, like never before, to go  beyond our physical or mental limitations, we find that  technology can also be our enemy. Technology is enabling  people to cross boundaries, break ceilings, and change the  way we see and do things, almost everyday. But is it too  much? How do we protect ourselves from ourselves if the  technology we use to enable us becomes exploited by someone  else and used against us?

Cyber criminals are getting smarter and can skirt our  defenses and blend into the background noise of an  organization’s operations. They are skilled and patient  enough to perform stealthy reconnaissance of an  organization’s network over months or years. Eventually,  they can seize the right opportunity to steal sensitive  information assets in the form of intellectual property,  credit card numbers, and customer databases. As they  compromise the network, they easily can commit fraud, or  otherwise damage the enterprise.

The rash of major security breaches and fraud incidents are  making international headlines. This forces organizations  and cyber security professionals to address the growing  problems of advanced persistent threats, fraud, and insider  attacks. To address both the proliferation and magnitude of  these challenges, organizations need to consider a more  automated, proactive approach to security.

In short, organizations need to incorporate security  intelligence as an essential part of the business.

Come to our Discover Security Conference to learn more about  the latest trends in cyber-security. Take an in-depth look  at intelligence resources and network with some of the best  cyber-security industry experts from around the globe. Find  out how to combine current system protections and new  advances to augment the security posture and capabilities of  your organization.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information