CSI2008: Security Reconsidered - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Information Management
Commentary
11/16/2008
08:48 PM
Mike Fratto
Mike Fratto
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

CSI2008: Security Reconsidered

This year's CSI 2008 event promises to be every bit as interesting as ever. CSI tracks are broad, the topics deep, and the speakers top-notch. Once again I find myself wanting to see all of it (9 tracks!) but only one of me.

This year's CSI 2008 event promises to be every bit as interesting as ever. CSI tracks are broad, the topics deep, and the speakers top-notch. Once again I find myself wanting to see all of it (9 tracks!) but only one of me.Centered around topics, each track takes a deep dive on such topics as virtualization security, security event and incident management (SEIM), Web 2.0 security, Trusted Computing, and secure design, along with a host of other topics. You can immerse yourself in a summit or spread your interests around. What I like about the show is that it's rather low-key and focused.

Monday, I'll hit a few preso's and then I am off to meet with vendors and hear about the latest and greatest. Tuesday, I will be at the Trusted Computing summit along with Steve Hanna, David O'Berry, Greg Zazmierczak, and the moderator, Lisa Lorenzin. The Trusted Computing summit will be focusing on the TPM and its uses, including the uses for NAC.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll