Dear Networking, No recent event illustrates the vulnerability of your security infrastructure more profoundly than the 9/11 terrorist attack on the United States. While pronounced inadequacies continue to percolate on a macro level, consider this: How are 9/11 lessons and implications affecting your business objectives? How are you preparing your organization to effectively address future security issues? Get answers to these questions and more when you attend '9/11: Six Years Later' at The Security Standard, September 10-11 in Chicago. Through this special town-meeting style session, you'll walk away with insights from top 9/11 security experts that you can directly apply to your enterprise. Engage, Learn, Contribute - On all levels, what have we "fixed" since 9/11 and what remains broken?
- How do you assess the value of a strong working relationship between government and the private sector?
- What shortcomings today leave critical infrastructures vulnerable?
- What improvements can be made to align, fortify, and expedite enterprise and government security interests?
- What new issues and threats are evolving from the current political climate?
'9/11: Six Years Later' is just one topic to be covered at The Security Standard, an event created for the sole purpose of bringing security leaders together to collaborate on the critical business issues they face and to learn from the collective wisdom of their peers. Unlike other conferences that merely provide analysts' opinions, The Security Standard delivers awareness and understanding from those with first-hand experience. Visit TheSecurityStandard.net to learn more and to apply for your complimentary registration* today. The Security Standard September 10-11, 2007 The Fairmont Hotel | Chicago, IL *Candidates must be working within one of the following qualified job functions: Executive-Level IT (CISO, CIO, CSO, CTO), Security/Compliance Management (Director level and above) or IS/MIS/IT Management (Director level and above). Candidates must be employed by a company with greater than 500 employees in size. Candidates must be directly involved or a key influencer in the security-related purchase decisions of their company. Professionals from technology companies who are not primarily involved in the security purchase decisions and/or strategies within their own company do not qualify. Interpretation and enforcement of this qualification policy as well as the right to limit and/or refuse registration for any reason are at the sole discretion of IDG Executive Forums. Invitation is non-transferable. | | | Catherine A. Allen Chairman & CEO The Santa Fe Group Michael Assante Infrastructure Protection Strategist/Business Manager Idaho National Laboratory (INL), National & Homeland Security John G. Voeller Consultant to the Office of Science and Technology, Department of Homeland Security and Office of Science and Technology Policy, White House Senior Vice President, Black & Veatch Robert Bragdon Publisher, CSO magazine John Gallant President & Editorial Director Network World |
No comments:
Post a Comment