1. Latest News
  2. Submit Press Release
IEEE Computer Society Logo

IEEE Computer Society to Host Rock Stars of Cybersecurity

The unprecedented Target breach and US National Security Agency spying scandal have put cybersecurity in the global spotlight.

PRLog - March 25, 2014 - LOS ALAMITOS, Calif. -- LOS ALAMITOS, Calif., 25 March 2014 – The unprecedented Target breach and US National Security Agency spying scandal have put cybersecurity in the global spotlight. With cyberattacks on the rise, it's even more critical for enterprises and government agencies to know how to identify weaknesses and safeguard infrastructure from incursions.

IEEE Computer Society, the global community for technology leaders, has announced that it will host the Rock Stars of Cybersecurity (http://www.computer.org/portal/web/Rock-Stars/Cybersecurity)conference on 24 September in Austin, Texas. This must-attend one-day event will feature well-respected cybersecurity authorities from leading companies discussing how to secure operations and respond to today's security threats.

Speakers at the Rock Stars of Cybersecurity conference include

Peter Allor, Cyber Security Strategist - Federal, IBM
Peter Fonash, Chief Technology Officer, US Department of Homeland Security
Peder Jungck, Vice President and Chief Technology Officer, BAE
Sarath Geethakumar, Senior Director – Global Information Security, VISA,
Gary McGraw, Chief Technology Officer, Cigital, and
Brett Whalin, Vice President and Chief Information Security Officer, HP.

For a limited time, attendees can take advantage of Super Early-Bird registration (http://www.computer.org/portal/web/Rock-Stars/Cybersecuri...) and save more than 30 percent off full price. Register now at the affordable rate of $229 — for an entire day's worth of presentations, networking, and more. Team, member, and student pricing are also available.

At the Rock Stars of Cybersecurity (http://www.computer.org/portal/web/Rock-Stars/Cybersecurity) conference, attendees will learn:

Effective strategies for securing business operations
New and innovative approaches to responding to today's security threats
How government agencies are balancing cybersecurity threats and privacy
How to implement a secure enterprise architecture
Big data's implications for security analytics, and
Implications of the cybersecurity skills shortage on the ability to respond to attacks.

Sponsorship and exhibitor opportunities (http://www.computer.org/portal/web/Rock-Stars/Cybersecuri...) are also available. For more information, email Sandy Brown at sbrown@computer.org.

About IEEE Computer Society

IEEE Computer Society is the world's leading computing membership organization and the trusted information and career-development source for a global workforce of technology leaders including: professors, researchers, software engineers, IT professionals, employers, and students. The unmatched source for technology information, inspiration, and collaboration, the IEEE Computer Society is the source that computing professionals trust to provide high-quality, state-of-the-art information on an on-demand basis. The Computer Society provides a wide range of forums for top minds to come together, including technical conferences (http://www.computer.org/portal/web/conferences/home), publications (http://www.computer.org/portal/web/publications), and a comprehensive digital library (http://www.computer.org/portal/web/csdl), unique training webinars (http://www.computer.org/portal/web/webinars), professional training (http://www.computer.org/portal/web/e-learning/home), and the TechLeader Training Partner Program (http://www.computer.org/portal/web/Corporate-Programs/T2P2) to help organizations increase their staff's technical knowledge and expertise, as well as the personalized information tool myComputer. To find out more about the community for technology leaders, visit http://www.computer.org.

Margo McCall

--- End ---

Click to Share

Contact Email:
Source:IEEE Computer Society
Location:Los Alamitos - California - United States
Tags:National Security Agency, rock stars, Rock Stars of Cybersecurity, unique training webinars, PR
Verified Account Email Address
Verified Account Phone Number

Disclaimer:   Issuers of the press releases are solely responsible for the content of their press releases. PRLog can't be held liable for the content posted by others.   Report Abuse

Latest Press Releases By “


Trending News...

Like PRLog?
Click to Share