Suits and Spooks II - Shaping a Revolution in Security Affairs will address the issue of information security systems in free-fall
January 21, 2012
PRESS RELEASE
WASHINGTON, D.C. -- When was the last time you were in a conference room with a Hollywood actress, the CISO of In-Q-Tel, two product managers from DARPA, an expert in money laundering, a world-class hacker, a spokesman for George Clooney's Satellite Sentinel Project, an expert on open source warfare, and a former CIA station chief -- all looking critically at the current state of information security?
As cyber attacks increase in quantity and complexity, organizations face mounting financial and strategic risks directly resulting from their dependence on flawed and outdated information security models.
Held in Washington, D.C. on February 8, 2012, the new edition of the Suits and Spooks Anti-Conference, "Suits and Spooks II - Shaping a Revolution in Security Affairs" will address the issue of information security systems in free-fall, and seek new, innovative solutions. The one-day event will host a multi-disciplinary set of innovators and disruptive thinkers. Its informal setting will allow extensive interaction and collaboration among speakers and attendees, aiming to produce new thinking on how to re-shape information security.
"Suits and Spooks" is the creation of Jeffrey Carr, author of Inside Cyber Warfare, and founder and CEO of executive cyber protection firm Taia Global, Inc. - www.taiaglobal.com
The conference is open to all.
VENUE: February 8, 2012 - 7:30AM to 4:30PM Waterview Conference Center
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024