Unedited news and product information from vendors.
Hack Attack - Philly Summit Helps Businesses Protect Themselves From Becoming Latest Online Victim
Jun 29, 2011 (03:06 PM EDT)
ITX Data Security Summit speakers include experts from INetU, Microsoft, Elman Technology Law, Integrated Computer Solutions and Trustwave
ALLENTOWN, Pa., June 29, 2011 /PRNewswire/ -- With a string of Fortune 500 companies making the news because of hacker attacks, leading managed hosting and cloud provider INetU is helping Philadelphia IT executives and business leaders protect their organizations from crippling data breaches at the 2011 ITX Data Security Summit, held on Wednesday, July 13 at the Penn State Great Valley Campus Auditorium in Malvern, Pa. The ITX Data Security Summit is open to business and IT professionals at no charge.
"The internet is no longer the friendly neighborhood it used to be," said Scott Walters, director of client services at INetU. "Highly skilled professional criminals are actively looking to undermine companies and this summit is a great opportunity to learn what types of threats are out there and what businesses can do to better protect themselves."
Online data breaches can be an incredibly costly issue for any organization. Hacked private data can cost companies up to $60 million in fines and charges – not including the waves of negative publicity and impact on customer confidence. The ITX Data Security Summit presents topics that help companies protect themselves from damaging data breaches and features experts from INetU, Microsoft, Elman Technology Law, Integrated Computer Solutions, Inc, and Trustwave. To register for the ITX Data Security Summit, visit www.itexpertseries.com.
Topic discussions at the 2011 ITX Data Security Summit include:
CIAvailability: Tips from the Trenches (9:00 – 10:00 a.m.)
With the recent explosion of compliance and security concerns around IT systems, it's easy to forget about the availability piece of confidentiality, integrity and availability (CIA). When you mix in virtualization and the cloud, the focus can get increasingly fuzzy. In this discussion, participants will learn lessons from real world circumstances that affect the availability of web sites. Presented by Scott Walters, Director of Client Services, INetU.
Security on the Cloud (10:30 – 11:30 a.m.)
Everyone, as they say, is "taking it to the cloud." But how can you keep private data in the cloud secure while benefiting from virtualization? This presentation discusses how to obtain a compliant cloud infrastructure as technology relies on virtualization more than ever. Presented by Hameed Mohammed, Industry Solutions Manager, Microsoft.
Trustwave Global Security Report 2011 (1:00 – 2:00 p.m.)
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. Presented by Charles Henderson, Director of Application Security Services, SpiderLabs Trustwave.
Are You Legally Prepared for the Coming Cyberwar? (2:30 – 3:30 p.m.)
Will a virus like Stuxnet be your firm's downfall or will hackers called Anonymous penetrate your defenses first? It's just a matter of time before a trusted employee reports his or her smartphone is missing and customer data has been compromised. And after that, the news crew will be showing up in your lobby demanding details on the latest data breach. The question is no longer if, but when will your legal playbook be ready when the cyberwar games begin? Presented by Gerry Elman, M.S., J.D., Elman Technology Law, P.C.
Attack & Penetration through USB Weaponization (4:00 – 5:00 p.m.)
Are your current work security practices vulnerable? Attack & Penetration through USB Weaponization will cover the methods of circumventing physical and technical security controls via social engineering. The demonstration will discuss the vulnerabilities with current security and operational policies, social engineering opportunities and a technical demonstration of a USB-based attack tool. In this discussion, learn how to circumvent multiple physical, computer and network security controls to see if your security practices are solid. Presented by Steve Goldsby, President/CEO, Integrated Computer Solutions, Inc.
The ITX Data Security Summit is an event in the INetU IT Expert Series. This series of events and webinars exists to provide IT and business professionals with up to date information on technology, security and compliance in the hosting industry. For more information on the INetU IT Expert Series, visit www.itexpertseries.com.
About INetU Managed Hosting
INetU is a leading managed hosting provider serving customers worldwide. Dedicated to building long-term relationships with its clients, INetU supports many popular Web applications and provides highly reliable hosting for enterprise websites in the Online Retail, Healthcare, Financial Services, SaaS, Web Development, Education, Government, Consulting, and Non-Profit sectors. INetU recently scored a 96.5% customer satisfaction rating and is PCI, SSAE 16 Type II, ISAE 3402 and Safe Harbor compliant. To learn more, visit www.inetu.net.