Monday, June 25, 2007

Put 9/11 lessons to work within your enterprise

The Security Standard 2007
Dear Networking,

No recent event illustrates the vulnerability of your security infrastructure more profoundly than the 9/11 terrorist attack on the United States. While pronounced inadequacies continue to percolate on a macro level, consider this: How are 9/11 lessons and implications affecting your business objectives? How are you preparing your organization to effectively address future security issues?

Get answers to these questions and more when you attend '9/11: Six Years Later' at The Security Standard, September 10-11 in Chicago.

Through this special town-meeting style session, you'll walk away with insights from top 9/11 security experts that you can directly apply to your enterprise.

Engage, Learn, Contribute
  • On all levels, what have we "fixed" since 9/11 and what remains broken?
  • How do you assess the value of a strong working relationship between government and the private sector?
  • What shortcomings today leave critical infrastructures vulnerable?
  • What improvements can be made to align, fortify, and expedite enterprise and government security interests?
  • What new issues and threats are evolving from the current political climate?
'9/11: Six Years Later' is just one topic to be covered at The Security Standard, an event created for the sole purpose of bringing security leaders together to collaborate on the critical business issues they face and to learn from the collective wisdom of their peers. Unlike other conferences that merely provide analysts' opinions, The Security Standard delivers awareness and understanding from those with first-hand experience.

Visit TheSecurityStandard.net to learn more and to apply for your complimentary registration* today.

Register NowView Conference Agenda

The Security Standard
September 10-11, 2007
The Fairmont Hotel | Chicago, IL


*Candidates must be working within one of the following qualified job functions: Executive-Level IT (CISO, CIO, CSO, CTO), Security/Compliance Management (Director level and above) or IS/MIS/IT Management (Director level and above). Candidates must be employed by a company with greater than 500 employees in size. Candidates must be directly involved or a key influencer in the security-related purchase decisions of their company. Professionals from technology companies who are not primarily involved in the security purchase decisions and/or strategies within their own company do not qualify. Interpretation and enforcement of this qualification policy as well as the right to limit and/or refuse registration for any reason are at the sole discretion of IDG Executive Forums. Invitation is non-transferable.
The Security Standard 2007 Sponsors
Featured Speakers
Catherine A. Allen
Catherine A. Allen
Chairman & CEO
The Santa Fe Group

Michael Assante
Michael Assante
Infrastructure Protection
Strategist/Business Manager
Idaho National Laboratory (INL),
National & Homeland Security

John G. Voeller
John G. Voeller
Consultant to the Office of
Science and Technology,
Department of Homeland
Security and Office of Science
and Technology Policy,
White House
Senior Vice President,
Black & Veatch


Co-Executive Producers
Robert Bragdon
Robert Bragdon
Publisher, CSO magazine

John Gallant
John Gallant
President & Editorial Director
Network World

Read Network World privacy policy
The following message is being sent to you as a valued customer of Network World. To stop receiving e-mail messages from Network World, do not reply to this e-mail. Instead, please go to our email preference management page at:
http://www.networkworld.com/nl/pclogin.jsp?email=networking.world@gmail.com&code=etss07nl0625
where you can specify your email preferences and help ensure that we send only the appropriate communications you may be interested in. You may also write to:
Network World Inc. Attn: PDG, 118 Turnpike Road, Southborough, MA 01772

No comments:

Post a Comment