2012 Conference Overview

The ongoing challenge of cybersecurity is often seen solely as a technology issue; however, for those in charge of securing data, the challenges extend far beyond hardware and software. Breaches and incidents may be initially detected in the technical layer, but successful response, remediation, and prevention requires an enterprisewide effort. From managers to mission owners, all layers of the organization must come together to ensure a secure network of systems. The Cybersecurity Conference will examine the technology, policy, and standards needed to manage risk yet optimize efficiency. 

    Track 1: Communication and Strategy for Cybersecurity Programs

The roles of today’s cybersecurity professionals are increasingly demanding. IT departments are dealing with budget challenges, policy updates, standards compliance, and new approaches such as bring your own device (BYOD) and the cloud. With all these changes, communication and strategy become more critical than ever. From information analysts and management teams to the CIO, articulating the value and necessity of cybersecurity takes skill. This track delves into the challenges of moving from rote, tiresome paperwork to true prioritized compliance, and instructors highlighting the importance of policy to prevent incidents.


    Track 2: Tactics, Tools, and Technologies for Incident Prevention and Response

Cybersecurity is about so much more than monitoring your systems. Today’s environment is about detecting, mitigating, repairing, or often re-architecting – prevent and respond. It involves networks, mobile devices, and the cloud. Secure enterprises require a diverse team: technical analysts and engineers, policy and compliance experts, managers, end users, and executives to support and fund this team’s efforts. Sessions here offer insight about the tools and data needed to support the metrics and information that will improve communication among technical and executive levels.

>>Get the full list of sessions here.
 

Full Conference Registration Includes:

  • Two Full Days of Conference Sessions
  • Bonus Access to the Cloud & Virtualization Conference and the Mobile Government Conference Sessions
  • Three Keynote Presentations
  • Featured Plenary Sessions
  • Access to the Shared Exhibit Hall and Free Exhibit Hall Education
  • VIP Networking Reception
  • Continental Breakfast and Lunch
  • Digital Conference Materials Post Event
New for 2012 - The Cybersecurity Conference was co-located with the 2012 Cloud & Virtualization Conference and the 2012 Mobile Government Conference. Registration for the Cybersecurity Conference.


 



  

Three Events in One!

 





Partnering Media