Post by Vashti Horvat:
Download the free report from SAP.
Big data and personal information are converging to shape the Internet’s most powerful and surprising consumer products.
The world without boundaries affects the security posture of technology, media, and telecommunications (TMT) organizations.
Join host Craig Wigginton, Partner – Deloitte LLP in today’s webcast called “Blurring the Lines: Information Security in a World Without Boundaries“
Starts in 5 minutes.
For more information and to register click here.
A generator in the sense of someone who comes up with new ideas, new ways of doing things, a creator. An executor is someone who is good at ‘doing’ something that may have been created by someone else. So, which are you?
Network Security 2012 from SANS starts September 16, 2012 in Las Vegas, NV.
Per the SANS website, participants are able to choose from an extensive lineup of more than 45 hands-on immersion courses with in-depth training in security, forensics, management, or coding and development.
For more information: http://www.sans.org/network-security-2012/