
Paraben’s PFIC Conference has been an annual event since 2008. Since that time it has rapidly evolved into a higher attended conference with a broader scope of topics reaching from deeply technical into the legal aspects of the forensics and eDiscovery industry. Those who attend PFIC are as diverse as our topics, from law enforcement and lawyers, to corporate entities, government agents, private investigators, and educational institutions. If you haven’t had the opportunity to attend, this is your chance to experience the fresh air and mountains of Utah as well as the fresh topics that will be the highlight of this year’s conference. If you’ve already attended, then you know what to expect and are as excited as we are about it!
The Future of Android Security
Presenters: Alex Geiger and John Gluth, Green Hills Inc.
The global enterprise Android mobility market is growing rapidly, yet Android security solutions are in their infancy. We’ll discuss emerging technologies to address secure boot, data-at-rest and in-transit encryption, user authentication, and dual persona (BYOD/EOD) in an Android environment that has proven fertile to hackers. We’ll also touch on the U.S. Government initiatives to build an ultra-secure smartphone using commercial off-the-shelf technology.”
Agenda:
3:00 Introduction of Speakers
3:05 Presentation
4:00 Question & Answer
4:15 Speakers Depart/ISC2 Chapter Business
4:30 Light Refreshments
5:00 Depart
ISSA’s Women in Security SIG webinar.
Speaker: Lori Harmon – VP of Sales, Contrast Security
Although the CEO of Microsoft may disagree, your professional destiny is not best left up to fate or “karma.” How can your boss or anyone else know what you want if you don’t ask? And according to a Frost & Sullivan report, the area in which today’s information security professionals need to improve most is communication. Whether it is for a promotion, raise, flexible hours or something else, making it known to those that can help you realize your objective is key. In this webinar, Lori will give real life examples of various “asks” that were successful in her career, as well as provide recommendations on how women in information security can ask for – and get – what they want.