Sunday Mar 26

Archive for the ‘Events’ Category

Mar
27/15
The Official RSA Conference Guide by Industry’s Top Snarkers
Last Updated on Friday, 27 March 2015 07:03
Written by jj
Friday, March 27th, 2015
Share

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and entertaining take on the world’s largest security conference comes from us. Head over to the RSA Conference Blog site and soak in all the blogs you can find from the Securosis Team.

I’m delighted and honored to join my colleagues in contributing to this year’s conference Official (Unofficial) RSA Conference Guide. Like Rich said, I still can’t believe RSA gave us a mile-long leash; I’m looking around in disbelief, waiting for posts to disappear from the site. (more…)

Mar
23/15
InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi
Last Updated on Monday, 23 March 2015 12:00
Written by jj
Monday, March 23rd, 2015
Share

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi“. Since the event site doesn’t post the full abstract, I figured I’d share it here for you, and I’ll tweet the crap out of it so you can find it. (more…)

Tags: , , ,   |  Posted under Events  |  Comments  1 Comment
Mar
15/15
Your Favorite Speakers at Infosec World 2015
Last Updated on Saturday, 14 March 2015 09:04
Written by jj
Sunday, March 15th, 2015
Share

Okay, in full disclosure this probably isn’t going to be a list of YOUR favorite speakers, but it’s a list of some friend, colleagues, and mentors you don’t want to miss at this year’s Infosec World.

A key to the session ID codes is below, and my favorite schedule format is their at-a-glance you can get here http://www.infosec-world.com/OS15_Grid_for_Web.pdf. Infosec World 2015 is March 23-25 at Disney’s Contemporary Resort in Orlando, FL.

In no particular order… Oh, actually these are mostly alphabetical by last name. Deviant’s at the top because I wanted that handsome devil above the crease. That, and he’s doing an opening keynote. (more…)

Posted under Events  |  Comments  No Comments
Feb
17/15
IT Hot Topics Conference & Trainings 2015- Celebrating 30 years!
Last Updated on Tuesday, 17 February 2015 08:12
Written by jj
Tuesday, February 17th, 2015
Share

2015 marks the 30th anniversary of Carolina Advanced Digital, and the 13th anniversary of our annual IT Hot Topics Conference. New for 2015, we have a great lineup of certification trainings, extended social activities, new content, and special guest speakers.

The venue is beautiful and easy to access. The content is driven by the attendees. The speakers are always top-notch. In recent years, we’ve had the pleasure of hosting Katie Moussouris, Chris Hoff, Chris Nickerson, Mike Rothman, Zach Lanier, Deviant, Mike Murray, Shannon Tufts, Johnny Long, John McCumber, Ryan Linn, Tyler Shields, Patrick Miller, and more. (more…)

Tags:   |  Posted under Events  |  Comments  No Comments
Feb
17/15
Getting Involved in the Community- Join us live or later on Dark Reading Radio 2/18
Last Updated on Tuesday, 17 February 2015 05:21
Written by jj
Tuesday, February 17th, 2015
Share

Wednesday, February 18th at 1pm Eastern- listen live, or download and enjoy later, as Josh Corman and I join Dark Reading’s Tim Wilson, Sara Peters, and Curtis Franklin to challenge listeners to get more involved in the security community.

How To Get More Involved In the IT Security Communityimage-dark reading
with Jennifer Minella and Josh Corman on Dark Reading Radio
Date: 2/18/2015 1:00 PM New York/10:00 AM San Francisco
More information and registration

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.

###

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs