Want to know what's on now and next? Try now.lanyrd.com!

Showing 12 sessions about Security

Your current filters are…

  1. Securing Your Data in a Target-Rich Environment to

    Solo on Saturday 10th March

    Each year, thousands of technophiles descend upon Austin, bringing Internet-connected laptops, phones and tablets with them, and most of them think very little about keeping their personal communications secure. Open ...

    At Driskill Hotel, Citadel (map)

  2. Securing the Cloud: What's Your Cloud Entry Point? to

    Solo on Saturday 10th March

    The move to cloud computing is still froth with questions about the confidentiality, integrity and availability of data moved to the cloud. These questions, and their answers, differ depending on ...

    At Hilton Austin Downtown, Salon FG (map)

  3. The Dark Side of Social Networks: Malware & Fraud to

    Solo on Saturday 10th March

    The popularity of Twitter and Facebook make them attractive targets for attackers. The viral features and open APIs make it an efficient medium for attackers. In this talk, we discuss ...

    At Hilton Austin Downtown, Salon FG (map)

  4. Big Data Smackdown on Cybersecurity to

    Core Conversation on Sunday 11th March

    What do modern day cybersecurity attacks look like? This panel will evaluate of the current state and evolution of cybersecurity, and discuss how big data plays a role in understanding ...

    At Hilton Austin Downtown, Room 616AB (map)

  5. No Rainy Days: Identity Protection in the Cloud to

    Panel on Sunday 11th March

    Cloud computing has made the move from new concept to technology that your mother uses. We now are entrusting so many different types of data to the cloud from financial ...

    At Hilton Garden Inn Austin Downtown, Sabine, 2nd floor (map)

  6. Memoirs of a Data Security Street Fighter to

    Solo on Sunday 11th March

    From Brain.A to Stuxnet: we've been fighting PC viruses for 25 years now. What was once an annoyance has become a sophisticated tool for crime and espionage. Computer security expert ...

    At Hilton Austin Downtown, Salon J, 6th floor (map)

  7. Security and Privacy in Social Networks to

    Core Conversation on Sunday 11th March

    This panel will explore the interplay between user privacy, social networking sites, law enforcement, and the teams of people that are tasked with both enforcing and protecting the users of ...

    At Omni Downtown, Lone Star (map)

  8. Data Breaches: Taking the Bull by the Horns to

    Panel on Monday 12th March

    Over the past year, 90% of businesses have been hit by at least one IT security breach. What does this mean? Businesses should consider breaches a statistical certainty and be ...

    At InterContinental Stephen F. Austin, Capital Ballroom B (map)

  9. My Voice Is My Passport. Verify Me to

    Dual on Monday 12th March

    Start warming up your vocal chords. With an expected growth rate of 13 percent for 2012, voice authentication is going to be the biometric protocol of choice as businesses, government ...

    At Hilton Austin Downtown, Salon J, 6th floor (map)

  10. Surviving Lulz: Behind the Scenes of LulzSec to

    Solo on Tuesday 13th March

    On Thursday, June 2, 2011, LulzSecurity.com registered for CloudFlare — a service designed to make any website faster and more secure. One hour after they registered, they published 3.5 million ...

    At Sheraton Austin Hotel at the Capitol, Capitol E-H, 3rd floor (map)

  11. Defense Against the Dark Arts: ESAPI to

    Workshop on Tuesday 13th March

    The internet is a virtual playground for all kinds of bullies, those in it just for the "lulz" to those in it for the cold hard cash. This workshop will ...

    At Radisson Hotel & Suites Austin-Town Lake, Town Lake Ballroom (map)

  12. Help! I Have an Internet Stalker or Blackmailer! to

    Panel on Tuesday 13th March

    The benevolent Internet promotes expression, collaboration and experimentation. But the current legal scheme can make the Internet a place where digital tracks persist long after their intended use. In a ...

    At InterContinental Stephen F. Austin, Capital Ballroom A (map)