Say

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

What!

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

  • Home
  • Archived Events

Events

Login Categories 9 Search Fees Locations 41 Organizers 8 Map

Keeping Your Company Safe

2010 ISSA Free event The event is overbooked
Network security solutions should improve your network security without compromising functionality.
Wednesday, 08. September 2010 - 13:00 till 11:00

The IT Blind Side: Why are so many organizations spending so much money on security, but still being surprised by breaches?

2010 ISSA Free event Your booking will be on the waitlist
By registering for this meeting, you will be eligible to receive a complimentary copy of Visible Ops Security book worth $21.95. Please go to the following URL for more information regarding this book: http://www.itpi.org/home/visibleopssec.php.
Thursday, 21. October 2010 - 08:00 till 07:00

Legal and Security Issues of Cloud Computing

2010 ISSA Free event Your booking will be on the waitlist
David Navetta - one of our own members - is a Lawyer with the InfoLawGroup. He has done a lot of work in this area including drafting and negotiating contracts for customers and service providers. The talk is focused on Legal and Security Issues of Cloud Computing and very timely and relevant given the number of cloud services big and small that are being offered. It is often difficult for organizations to analyze and understand the legal risks associated with Cloud computing and David will provide insight into negotiating tactics, difficult contract terms and examples of provisions where parties often take a hard line. The InfoLawGroup has created a "Bill of Rights" for cloud computing that can be used as a tool for cloud customers and providers alike when wrestling with these issues. Anyone currently involved in or considering entering the cloud in some fashion or another would not want to miss this meeting.
Wednesday, 10. November 2010 - 06:30 till 04:30

Look Before You Leap: A Gradual Migration to the Cloud

2011 ISSA Free event Your booking will be on the waitlist
The topic for our first meeting of the year 2011 is a different perspective on the topic we covered in the November meeting on cloud security and legal issues. To start off the year Adam Greenfield will provide a prospective on how to leverage the benefits of enterprise cloud technology in ways that are financially and operationally responsible. Let the cloud model work for you rather than trying to make your needs fit in to the cloud and get the most out of your investments.
Wednesday, 19. January 2011 - 06:30 till 04:30

To protect the kingdom, one must protect the key

2011 ISSA Free event Your booking will be on the waitlist
Properly encrypted data is essentially in a safe that no amount of dynamite will open. While it is necessary to protect a key, it is also necessary to have a process to circumvent the unavailability of a key, e.g. an employee forgetting a password or losing an authentication token.
Wednesday, 09. February 2011 - 06:30 till 04:30

Online Security for Young Adults

2011 ISSA Free event Your booking will be on the waitlist
This month's chapter meeting has very interesting topic and one that affects most of us either because we have or know kids that use a computer. The presentation focuses on the threats and risks when young adults go online. The talk discusses what kids do when they are online such as social networking, media access and downloads and how it is important for parents, guardians, teachers and other adults to understand the threats & risk they are faced with. The risks are often social and legal in nature but even physical safety is a concern.
Wednesday, 09. March 2011 - 06:30 till 04:30

The Psychology of Security

2011 ISSA Free event Your booking will be on the waitlist
Please join us on April 13th for a great presentation and session. This month's chapter meeting will be focusing on 'The Psychology of Security' - why users do the things they do. Our speaker discusses some of the rationales and underlying motivators behind why users tend to do practice insecure habits time and time again.
Wednesday, 13. April 2011 - 07:30 till 05:30

Hacking Back in Self-Defense: Is it Legal; Should it Be?

2011 ISSA Free event Your booking will be on the waitlist
Our June meeting looks to be an exciting one involving a legal and ethical discussion regarding "hacking back". In addition to the presentation, the June Chapter Meeting will be the venue for our annual board elections. Elections will be held at the beginning of the meeting and voting is open to all members is good standing. Board positions that will be open for vote are: President, Vice President - Members, Vice President - Sponsors, Director of Communications, and Recording Secretary. If you are a Denver Chapter Member and wish to run for one of these board positions, please contact Paul Herbka.
Wednesday, 08. June 2011 - 07:30 till 05:30

HIPAA Security: The Reality of Technical Vulnerabilities in Health Care Organizations

2011 ISSA Free event Your booking will be on the waitlist
The breach and theft of sensitive medical information continues to bring issues of information security and regulatory compliance closer to the forefront of information protection than ever before. Enhanced mobility, unbounded networks, and the sharing of digitized medical information have led to a corresponding increase in operational risk and cybercriminal activities. This presentation will focus on the 'how' and 'why' patient information is being targeted as well as historical and current technical vulnerabilities that continue to challenge today's health care entities. The talk will conclude with an overview of key risk management models and considerations for mitigating such risks.
Wednesday, 14. September 2011 - 07:30 till 05:30

So, You Wanna Build a SEIM?

2011 ISSA Free event Your booking will be on the waitlist
This presentation is intended for those who are thinking about building a Security Information Event Management (SIEM) system and those who have recently built a security monitoring infrastructure. We will cover choosing a solution, what to expect from the vendor you choose, what to expect once the solution is installed and who/what/when/where/why/how to monitor your security events.
Wednesday, 12. October 2011 - 07:30 till 05:30
Page 1/14
Start - Back - 1 2 3 4 5 ... - Next - End
1-10/138

Subscribe

Sign up to receive news
about our upcoming events

 

Recent Posts

View recent blog posts about
industry trends and events

View Blog