“Just like a CFO needs a CPA to audit financials, there is great value in having an independent security expert audit the IT infrastructure.”
Carol Stream, Ill. (PRWEB) January 29, 2015
Is your organization aware of its vulnerabilities? Do you know how―and where―it could fall victim to a cyber attack? According to Seth Danberry, a cyber audit could make all the difference.
“The current state of information security is troubling and businesses of all sizes need to take a hard look at the systems they have,” says Danberry, president and cofounder, Grid32 Information Security.
Danberry, a cybersecurity expert, will present on the importance of the audit, review, and testing process for cyber infrastructures at the upcoming Connected World Conference, being held February 23-24 in Birmingham, Ala.
“It is difficult for internal IT staff to objectively look at the systems they build and maintain,” says Danberry. “Just like a CFO needs a CPA to audit financials, there is great value in having an independent security expert audit the IT infrastructure.”
Danberry has nearly 20 years of experience managing and securing information technology infrastructures and lending technology support to organizations such as the U.S. Navy, U.S. Air Force, AOL, and NASA.
“As we rapidly adopt interconnected technologies, it is critical that we focus not just on ease-of-use and functionality, but on security as well. It cannot be an afterthought,” adds Danberry.
The 2015 Connected World Conference aims to promote awareness for the importance of cybersecurity in today’s connected society. The event will focus on the data being aggregated from the IoT (Internet of Things), and the importance of securing the connections providing that data.
“How secure is your data? How about your connections? These essential questions must be asked and answered in order to prevent a cyber breach,” says Peggy Smedley, editorial director, Connected World magazine. “Seth’s expertise is sure to show where companies are exposed and help put them on the right track.”
Held in partnership with University of Alabama at Birmingham’s Center for Information Assurance and Joint Forensics Research (The Center), the Connected World Conference will gather professionals together, creating a call-to-action and developing a take-away security strategy to protect our connections to the nation’s most critical infrastructures. The event will be held February 23-24 at the Birmingham Marriott in Alabama.
The 2015 event is sponsored by Altair Semiconductor, Berkeley Varitronics Systems, Gemalto, and Synapse Wireless. To learn more about the 2015 Connected World Conference, please visit the event Website.
About Connected World Magazine
Connected World is the business and technology publication that provides the intelligence industry titans need and the guidance consumers crave. It’s all about M2M. connectedworld.com