Upcoming Computer Security Conferences – Oct 15th, 2010

The following are upcoming computer security conferences, seminars, webinars and webcasts.

If I have missed any that you know of, please let me know.

All information listed for each topic is from the corresponding company’s website.

Conferences and Shows

Netwitness User Conference
Where: Ronald Reagan Building, Washington, D.C.
When: October 25th – 26th, 2010

Free user conference. Keynote Speaker Richard Clarke and Orson Swindle. Join other members of the worldwide NetWitness user community for two incredibly informative full days:

  • Meet key NetWitness development and engineering staff and executives
  • Learn about new features, upcoming and planned product developments
  • Exchange ideas and use cases with fellow NetWitness government and commercial clients, partners and freeware community users
  • Dramatically improve your investigatory skills and learn new and valuable uses for NextGen

The Computer Forensics Show
Where: Fort Mason Center in San Francisco
When: November 1-2, 2010

The Computer Forensics Show is the don’t miss event of the year for all IT Security, Legal, Accounting, Risk Management, Executive and Law Enforcement professionals.

For IT professionals already familiar with computer forensics, The Computer Forensics Show assembles the leading minds and operational experts in the industry who will inform you about industry developments, technology advances and trends.

For individuals and companies currently not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your bottom line.


Mining the Mountain: Streamlining Vulnerability Management – Core Security
When: Tuesday, October 19, 2010
Time: 2pm EDT/ 11am PDT

While at Iron Mountain, Peter Ridgley implemented a multi-tiered approach to security testing that reduced the typical number of reported vulnerabilities in the company’s security tests by several orders of magnitude. Please join Core Security Technologies for a live webcast where Peter will draw from this experience and share his process for isolating critical, real-world exposures from among volumes of vulnerability data.

The Growing Risk of Advanced Threats – Netwitness
When: Wednesday, October 20, 2010
Time: 2 PM EST

The webinar will discuss:

  • Are advanced threats a major, growing problem for organizations?
  • Are organizations ready to deal with advanced threats against their organization?
  • What is most at risk to an organization when it does not detect an advanced threat?
  • What are key problems in managing advanced threats that target their organization and what should organizations do? 

The Evolving and Systemic Nature of Global Internet Threats – FS-ISAC and Verisign
When: Thursday, October 28, 2010
Time: 1:00pm ET / 10:00am PT

In this webinar, Danny McPherson, VP of Research and Development at VeriSign, will share an analysis of empirical Internet routing, traffic, and attack data collected from 110 ISPs globally over a two year period to illustrate a discernible evolution of the Internet architecture – to include network interconnection strategies, application, and traffic distribution over time.

Busy on October 28th? Be sure to register and receive a link to the on demand replay.

Five Burning Questions Series: Big Four IT Security Roundtable – Appsec
When: Thursday, November 11, 2010
Time: 2:00 PM – 3:00 PM EST

Do you know what your auditor uses to audit your database systems? Are you familiar with the “best practices” that the Big Four apply relative to enterprise database systems?

Application Security, Inc. has assembled a high level panel of respected global IT Security auditors and consultants from the Big Four to share their most effective methodologies for IT security audits.

SANS Webcasts

Usually I list the SANS webcasts individually, but there are just too many of them that look really good, and they are all taking place this month. Here are just a few that really stuck out:

Pen-Testing a Proprietary Target
Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors
What every Network Forensics Analyst needs to know about IPv6
Cyberwar or Business as Usual? – The State of International Cyber Security Efforts
An inside look at Stuxnet

Check out SANS.org for a full list.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.