Thursday, April 11, 2013

EITC to host free Cyber Security Summit next week

The Eastern Idaho Technical College Foundation will hold its second Cyber Security Summit on the EITC campus April 18 from 8 a.m. to 4:15 p.m.

Last year, more than 200 IT professionals from business, government and education attended this event. Once again, admission is free. To register, follow this link: http://eitccss2.eventbrite.com/

Here are brief biographies of the speakers:

Chris Roberts (keynote): “The Evolution of Hacking”
Roberts is founder, CISO and lead engineer for One World Labs, a consulting firm providing research, vulnerability assessment and remediation of IT Systems and physical structures. Globally recognized as one of the top experts in the field, Roberts has consulted on IT security, engineering, and architecture/design operations for many Fortune 500 companies in the finance, retail, energy and service sectors. He has also worked on, developed and implemented company-wide information security awareness programs and trains management and employees on IT security topics.

Here is a video of Roberts speaking last summer in Denver:



Tony Carothers: "Information Assurance and History: Learning from the past to secure the future.”

With over 25 years in the communications security industry, Carothers specializes in developing secure communications solutions for the government and private sector. Clients have included assignments the U.S. Air Force, Army and Secret Service. The private sector work has been more varied, with the highlight being the work he has done for the SANS Internet Storm Center over the past 15 years as a senior incident handler.

Eddie Mize: "Poking Holes in the Cloud"
Mize has 30 years in the computer industry, over 17 of them at InfoSec. He is an integration and security specialist with years of experience building information security programs and integrating multiple platforms and systems to provide comprehensive "best of class" secure solutions. He served on Cisco's Enterprise Advisory Board for Information Security, and has articles published in Network World, Pentest Magazine, and Hakin9 Magazine.

No comments:

Post a Comment