Government and Private Industry Experts to Speak on Innovation and Technology Transfer at IEEE Security & Privacy Magazine Panel at RSA 2012

Share Article

“Innovation and Technology Transfer in Security: From the Lab to General Use” (SECT-201) will take place from 8-9:10 a.m. on Wednesday, February 29 in Room 310 of the Moscone Convention Center in San Francisco. The panel will be moderated by Cigital Inc. CTO Gary McGraw.

Cigital Inc. CTO Gary McGraw

The IEEE Security & Privacy panel at RSA 2012 will be moderated by Cigital Inc. CTO Gary McGraw, producer of the Silver Bullet Security Podcast series.

Tech transfer is an important part of the high-technology engine for economic growth on the planet. As computer security evolves beyond operations to building security in, we look to entrepreneurs to carry ideas from the lab to the marketplace.

How can you fast-track your emerging technology into the marketplace? A distinguished panel of innovators and entrepreneurs from government and private industry will discuss how they make technology transfer work at IEEE Security & Privacy magazine’s panel at RSA Conference 2012.

“Innovation and Technology Transfer in Security: From the Lab to General Use” (SECT-201) will take place from 8-9:10 a.m. on Wednesday, February 29 in Room 310 of the Moscone Convention Center in San Francisco. The panel will be moderated by Cigital Inc. CTO Gary McGraw, producer of the Silver Bullet Security Podcast series and author of Exploiting Online Games, Software Security: Building Security In, and seven other books.

The panelists are:

  •     Brian Chess, founder and chief scientist of Fortify Software, an HP company
  •     Paul Kocher, president of Cryptography Research Inc.
  •     Carl Landwehr, director of the Trustworthy Computing Program at the US National Science Foundation
  •     Peter Denning, Distinguished Professor of Computer Science at the US Naval Postgraduate School, and

"Tech transfer is an important part of the high-technology engine for economic growth on the planet,” said McGraw. “As computer security evolves beyond operations to building security in, we look to entrepreneurs to carry ideas from the lab to the marketplace.”

Panel attendees will learn where good ideas in security technology come from and how they make their way from an inventor’s head into the global security marketplace. Since computer security relies heavily on technology, innovation and new ideas that provide solutions are critical.

Based on years of hands-on experience in innovation and technology transfer, this panel of experts will share:

  •     How government research grants work
  •     When internal technology development makes sense
  •     Where security ideas come from, and
  •     Essential practices for successful innovation.

Visit the Computing Now site to hear a brief promo [http://www.computer.org/portal/web/computingnow/archive/february2012 for the Security & Privacy magazine panel.
IEEE Security & Privacy, one of the IEEE Computer Society’s 27 peer-reviewed publications, provides articles by top thinkers in the field, along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry. To subscribe, visit http://www.computer.org/portal/web/publications/mags-subscribe#tab2.
RSA Conference 2012 will be held from February 27 to March 2. The conference will help instruct attendees on how to triumph over security attacks, data breaches, and mobile threats during five days of intensive learning, 350+ cutting-edge exhibits, social activities, networking and more.

About the IEEE Computer Society

The IEEE Computer Society is the world’s leading organization of computing professionals. Founded in 1946, and the largest of the 38 societies of the Institute of Electrical and Electronics Engineers (IEEE), the Computer Society is dedicated to advancing the theory and application of computer and information-processing technology, and is known globally for its computing standards activities. For more information, go to http://www.computer.org.

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Margo McCall
Visit website