SANTA CLARA, Calif., Feb 13, 2012 (BUSINESS WIRE) –RSA Conference: what: RSA Conference will hold its annual teleconference with three leading information security analysts to discuss the latest trends in information security. This teleconference precedes RSA® Conference 2012, taking place February 27-March 2, and will provide a preview of three program sessions along with a discussion of today’s top security trends including mobile security, Web 2.0 security and Hacktivism. the teleconference will feature research and commentary from John Kindervag of Forrester, Pete Lindstrom of Spire Security and Andrew Hay of 451 Research. Hugh Thompson, Program Committee Chair of RSA Conference, will act as the moderator. in addition to a trend discussion, the analysts will preview the below sessions: — John Kindervag, Forrester – “Managing Advanced Security Problems Using Big Data Analytics” — Pete Lindstrom, Spire Security – “Where will InfoSec Be in 2020?” — Andrew Hay, 451 Research – “Mobile Device Security: Is the Enterprise Up for the Challenge?” This call will also feature a 15-minute Q&A prior to the conclusion of the call. When: Wednesday, February 15 at 11:00 a.m. ET./8:00 a.m. PT Where: Domestic toll-free: 800-243-6403 International toll: 719-325-2139 Confirmation Code: 181896 *Please dial in five minutes early Who: John Kindervag, Forrester ——————————————————————– John Kindervag is a Senior Analyst at Forrester who covers Wireless and Network Security. He is a leading expert on wireless security, network security, security information management and PCI data security. Prior to joining Forrester, John served as the senior security architect with security consultancy Vigilar. He also started the security practice for Flair Data Systems, where he was a principal security consultant. in addition to his participation in this teleconference, John will participate in the following RSA Conference 2012 sessions, “Managing Advanced Security Problems Using Big Data Analytics” on Thursday, March 1 at 8:00 a.m. and “Zero Trust: Case Studies and Lessons Learned” on Friday, March 2 at 10:10 a.m. Pete Lindstrom, Spire Security ——————————————————————– Pete Lindstrom is the Research Director at Spire Security and covers Information Security issues, including Identity Management and Internet Security. He is well-known for his work in practical enterprise security metrics, where he has advised and taught many security professionals. On the technical front, his most recent accomplishments include research findings in the areas of Web 2.0, virtualization, and cloud computing security. Previous to Spire, Pete served in a similar role at Burton Group and Hurwitz Group. in addition to his participation in this teleconference, Pete will participate in the following RSA Conference 2012 sessions, “Where will InfoSec Be in 2020?” on Tuesday, February 28 at 3:50 p.m. and “Software Liability: our Saving Grace or Kiss of Death?” on Wednesday, February 29 at 12:00 p.m. Andrew Hay, 451 Research ——————————————————————– Andrew Hay is a Senior Security Analyst for 451 Research’s Enterprise Security Practice (ESP). He provides technology vendors, private equity firms, venture capitalists and end users with strategic advisory services – including competitive research, new product and go-to-market positioning, investment due diligence and tactical partnership, and M&A strategy.
Prior to joining the 451 Group, Andrew worked in the Information Security Office of the University of Lethbridge in Alberta, Canada. in addition to his participation in this teleconference, Andrew will participate in the following RSA Conference 2012 sessions, “Mobile Device Security: Is the Enterprise Up for the Challenge?” on Thursday, March 1 at 8:00 a.m. and “SCADA and ICS Security in a Post-Stuxnet World” on Friday, March 2 at 9:00 a.m. Moderator: Dr. Herbert “Hugh” Thompson, Program Committee Chair of RSA Conferences and Chief Security Strategist, People Security ——————————————————————– Dr. Hugh Thompson is Program Committee Chair of RSA Conferences and Chief Security Strategist at People Security. Dr. Thompson is responsible for identifying domestic and global trends within the ever-changing security landscape to help set the agenda for RSA Conference. A world-renown application security expert, Dr. Thompson is also an Adjunct Professor of Computer Science at Columbia University, has co-authored four books, more than 30 papers and 10 peer-reviewed conference papers. in addition to his participation in this teleconference, Hugh will be one of the speakers at the day-long Security Basics seminar at RSA Conference 2012 on Monday, February 27 beginning at 8:30 a.m. He will also be participating in the session, “Elephant in the Room: Intellectual Property Hacking” on Tuesday, February 28 at 3:50 p.m. about RSA Conference RSA Conference helps drive the global information security agenda with annual events in the U.S., Europe, and Asia. throughout its 21-year history, RSA Conference consistently attracts the best and brightest in the field, creating opportunities to learn about information security’s most important issues through face-to-face and online interactions with peers, luminaries and emerging and established companies. As information security professionals work to stay ahead of ever-changing security threats and trends, they turn to RSA Conference for a 360-degree view of the industry. RSA Conference seeks to arm participants with the knowledge they need to remain at the forefront of the information security business. More information on events, online programming and the most up-to-date news pertaining to the information security industry can be found at rsaconference.com . RSA and the RSA Conference logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. all other products and/or services referenced are trademarks of their respective companies. SOURCE: RSA Conference SHIFT Communications Mike Fearon, 617-779-1807 Copyright Business Wire 2012
Trends in home security systems
Best internet security program 2012
What are the 2012 trends of cloud computing in networking
Esr background check
Best network software ever 2012