Protecting Databases from Unauthorized Access
London, UK (PRWeb UK) September 3, 2009
Tuesday, September 8, 2009 from 10:00 a.m. - 6:00 p.m. GMT (The webcasts will also be immediately recorded and viewable on-demand at BrightTALK.)
TOPICS AND PRESENTERS:
"The Evolution of the Threat Management Lifecycle" -- Becky Pinkard, Head of Attack and Data Monitoring, Barclays Bank
"IBM X-force Threat Trends Review 2009" -- James Rendell, Senior Technology Specialist, IBM
"The Economics of Security" -- John T. Parker, Product Line Executive, McAfee
"Protecting Databases from Unauthorized Access" -- John Moynihan, Managing Director, Minuteman Governance
"The Value of Cyber Intelligence Capabilities" -- Rich Baich, CISSP, CISM, Principal, Deloitte & Touche LLP
"Addressing Security in the Cloud Using SSL Technology" -- Jeff Barto, Senior Product Manager, VeriSign
"Threat Assessments, Attacks & Countermeasures" -- David Hobson, Managing Director, Global Secure Systems Ltd.
"Trust Issues in Cloud Computing" -- Bret Michael, Professor, Naval Postgraduate School
"Uses of Threat Modeling in Software Development" -- Nancy Mead, Sr. Member- Technical Staff, Software Engineering Institute
"Trusted Identity - The Muscle Behind Strong Authentication" -- Al Zollar, IBM; Gerry Gebel, Burton Group; Kent Blossom, Tivoli
WHERE: Summit program and registration is available on BrightTALK: BrightTALK Threat Management Summit
ADD WEB 2.0 CONTENT TO YOUR SITE: The summit can also be accessed (live and later on-demand) through the BrightTALK player, which can be embedded into any of your websites and blogs. For information on how to embed a player or to participate in future summits, contact Sophie Lam at (0207) 397-8637 or slam (at) brighttalk.com.
BrightTALK is devoted to making webcasting the ultimate business tool for transferring knowledge. BrightTALK creates a vibrant exchange of ideas between presenters and viewers featuring live, interactive access to the world's top thought leaders.