Please join us at the Information Security Summit 2014

Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

May 29, 2014  8:00AM – 1:00PM

MassBay Community College

50 Oakland Street  | Wellesley Hills, MA 02481

Early Bird Special: $35 (before March 1, 2014)

After March 1st: $45

Pre-registration required.

SecSumm_2014
Join us for the 2nd Annual Information Security Summit and discover new ways to lead the creation of the secure digital enterprise!

Featured Topics:

  • User awareness and Training / Social Engineering
  • Cloud and security
  • APT's (advanced persistent threats)
  • Secure mobile applications and BYOD
  • Risk management and compliance
  • Identity management

 

Click here for more information & to register!

 

Please join us at the Information Security Summit 2014

Related Insights

Four Steps to Respond & Recover from Sophisticated Security Attacks

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners, network security, security software, Data Security, Security Regulations, credit card security, Mobile Devices, Security Threat, Information Security, Mobile Apps, Information Security Summit, Hackers, endpoint security system, Cloud Security, Compliance & Privacy, security policy, cybercriminals, financial security, Events, information security tips, Compliance, Mobile Protection, security research, Mobile Security, cannabis, cybersecurity, Enterprise
Introducing our Quarterly Newsletter: the Data Security Review

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners, network security, security software, Data Security, Security Regulations, credit card security, Mobile Devices, Security Threat, Information Security, Mobile Apps, Information Security Summit, Hackers, endpoint security system, Cloud Security, Compliance & Privacy, security policy, cybercriminals, financial security, Events, information security tips, Compliance, Mobile Protection, security research, Mobile Security, cannabis, cybersecurity, Enterprise