What's new for Secure IT 2008?
- 4 content tracks available:
- Information Security Management
Presentations on policy and compliance, strategic planning for security, survivability, business resiliency, and legal / legislative updates.
- Information Security Operational Practices & Technologies
Presentations on security web applications, wireless access security, computer forensics investigation, authentication and encryption, intrusion prevention and detection, etc.
- Research / Curriculum Development
Presentations on innovative curriculum programs and research in information security and assurance, institutional partnerships and careers in information security.
- Vendor Track
Presentations by commercial vendors on any aspect of information security and assurance related to the content tracks listed above, void of marketing for company or products.
- Benefit from in-depth pre-conference workshops
- Fewer competing concurrent sessions in 2008
- Registration discounts for attendees from higher education
Who should attend?
Anyone who is responsible for the security and privacy of information, including: CEOs, CIOs, CTOs, VPs of technology and network systems, directors of IT, directors of technology, systems architects, network administrators, network security officers, ISOs, financial managers, system administrators, health records administrators, admissions and student records administrators, and software and web developers.
The Secure IT 2008 conference is made possible through support from the California State University System and the California Community Colleges, and is hosted by California State University, San Bernardino.
If you are interested in sponsorship opportunities, contact Lorraine Frost at .
|