Suits And Spooks Anti-Conference Aims to Redefine SecuritySuits And Spooks Anti-Conference Aims to Redefine Security
Suits and Spooks II - Shaping a Revolution in Security Affairs will address the issue of information security systems in free-fall
January 21, 2012
WASHINGTON, D.C. -- When was the last time you were in a conference room with a Hollywood actress, the CISO of In-Q-Tel, two product managers from DARPA, an expert in money laundering, a world-class hacker, a spokesman for George Clooney's Satellite Sentinel Project, an expert on open source warfare, and a former CIA station chief -- all looking critically at the current state of information security?
As cyber attacks increase in quantity and complexity, organizations face mounting financial and strategic risks directly resulting from their dependence on flawed and outdated information security models.
Held in Washington, D.C. on February 8, 2012, the new edition of the Suits and Spooks Anti-Conference, "Suits and Spooks II - Shaping a Revolution in Security Affairs" will address the issue of information security systems in free-fall, and seek new, innovative solutions. The one-day event will host a multi-disciplinary set of innovators and disruptive thinkers. Its informal setting will allow extensive interaction and collaboration among speakers and attendees, aiming to produce new thinking on how to re-shape information security.
"Suits and Spooks" is the creation of Jeffrey Carr, author of Inside Cyber Warfare, and founder and CEO of executive cyber protection firm Taia Global, Inc. - www.taiaglobal.com
The conference is open to all.
VENUE: February 8, 2012 - 7:30AM to 4:30PM Waterview Conference Center
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Build a Case for a Password Manager