For more than 20 years security professionals have made InfoSec World the “business of security” conference. To manage today’s threats, security practitioners must have the skills to be both a business partner and enabler, and have the technical expertise to prevent, detect and respond to security challenges. InfoSec World features a world-class program and expert speakers from the field to help you do just that. Here’s what you’ll gain from attending InfoSec World:
PERSONALIZE YOUR CONFERENCE AGENDA
We're excited that InfoSec World 2018 Conference & Expo is fast approaching. Get ready by reviewing sessions and saving them to your personal agenda. Make sure you update your attendee profile and share your social media links too! Simply search for "INFOSEC2018" in your app store to get started!
FEATURED NETWORKING ACTIVITY
Capture the Flag Tech Challenge
In teams of up to four people, InfoSec World attendees, sponsors and students are invited to participate in a prepared Capture the Flag challenge taking place among all the action in the Expo! Teams will have to combine their knowledge and skills sets to compete together and complete the challenge. Each team’s real-time progress will be projected on a big screen, so bring your A-game! Can't attend InfoSec World but want to participate? Register online here and details for your team to log in on March 20th will be sent to you beforehand.
MEET OUR NEWEST SPONSOR
Help us in welcoming our new Gold Sponsor - Forcepoint! Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviors and intent as they interact with critical data and IP wherever it resides. Their uncompromising systems enable companies to empower employees with unobstructed access to data while protecting intellectual property and simplifying compliance. See what other sponsors will be in the Expo this March!
Scalable Threat Intelligence Design HANDS-ON
TWO-DAY WORKSHOP | March 17-18, 2018 | 16 CPEs
Threat Intelligence continues to be considered a confusing and expensive topic, with a lot of moving parts and pieces. The question of "where does one begin" is still valid when standing up a threat intelligence program as a dynamic, defensive component within your overall information security program.
This workshop will demystify the processes of threat intelligence development and will walk attendees through a cradle-to-grave build-out for supporting incoming threat intelligence within your environment, including the people, the process, and the technology.