Implementing IT Security – From Strategy to Reality
St. Louis, MO – January 27, 2003 – Back by popular demand, IP3 Inc. has scheduled a 2003 U.S. tour for its 2-day Security Workshop: Implementing IT Security – From Strategy to Reality. This workshop will help companies stay on top of increasing new threats, despite tight budgets many are facing. Through partnerships with ISC2.org and TruSecure, attendees can receive continuing education credits toward their certifications. CompTIA and TICSA full and partial scholarships are also available. More information including a list of cities and dates can be found at www.ip3seminars.com.
The IT Security education workshop from IP3 provides broad-based, vendor-neutral, enterprise-level security education. It focuses on developing knowledge and expertise in the most up-to-date security areas, including the Homeland Security Act, the latest viruses and vulnerabilities, the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPPA). The workshop, held in cities across the United States, is designed for enterprise security professionals and offers a unique and intimate educational venue allowing participants to discuss and interact with other professionals to find answers and discover solutions.
The workshop includes real hack and crack demonstrations and live labs and demos. Participants will discover solutions to address the top rated security problems: multi-vendor integration, mobile and remote security, unsolicited content, wireless security and appropriate use and use management. By offering a blend of proactive and reactive strategies, participants will learn the strategic architecture deemed the most successful by the KPMG 2002 Global Information Survey. From the workshop, participants will also receive a CD of tools and free software, a comprehensive reference library and URL’s to stay up-to-date on the latest security threats and solutions.
“Security by association does not work,” said Ken Kousky, CEO of IP3 Inc. “Too many companies believe that if others are advancing security, they can ignore it. IP3 is working to understand the departure between ever increasing risks and decreasing budgets. Organizations need to adopt an enterprise-wide layered approach to IT security and assign necessary budgets to protect their IT infrastructure.”
In addition, Mr. Kousky stated, “this is a strategic workshop designed to provide an in-depth and comprehensive overview. It addresses a broad range of topics for improving your immediate reactive efforts for addressing current threats while simultaneously offering a framework for proactively deploying long-term comprehensive management process and system architecture.”
The workshop is sponsored by Panda Software, Lancope, Network Magazine, PoliVec, SPI Dynamics, Tripwire, PestPatrol, nCipher, Symmetricom, Vocent, CompTIA, New Horizons Computer Learning Centers, Tivoli software, VyTek Wireless (ISC)2, Check Point Software Technologies, OpenUmbrella, TruSecure and Vytek.
About IP3 Inc.
IP3 Seminars is a subsidiary of IP3 Inc., the leader in Intellectual Publishing, Sales and Distribution. IP3 Inc. provides a full range of services targeted at assisting emerging and expanding technology companies including: strategic product guidance on modifying the IP product, educational marketing, technical training, product support, and channel development and management. For more information about IP3 Inc., visit www.ip3inc.com and for more information on IP3 Seminars, visit www.ip3seminars.com.
About the Sponsors
At Panda Software, we are dedicated to the research and development of antivirus software. Our products protect all possible viruses entry points in networks, from Internet gateways to mail servers, from file servers to workstations. www.pandasoftware.com Lancope is the producer of the StealthWatch line of network monitoring appliances which will assist you in detecting and stopping network intrusions – without relying on a signature database. http://www.lancope.com
CMP’s Network Magazine, a monthly networking publication, supplies over 200,000 worldwide networking/IT buyers–consisting of network managers at corporate enterprises, carriers and service providers, and outsource partner organizations–with in-depth technical information for direct purchasing decisions of mission-critical networking products and services. www.networkmagazine.com
PoliVec is the trusted leader in security policy automation. PoliVec’s innovative software enables companies to define, detect, deploy and document a consistent security policy across the enterprise. http://www.polivec.com/
SPI Dynamics provides software that protects against the loss of confidential data through the organization’s most vulnerable yet least secure infrastructure component – the Web application layer. http://www.spidynamics.com/
Tripwire® data integrity assurance solutions establish a baseline of data in its desired state, detect and report any changes to the baseline, and enable rapid discovery and remediation when an undesired change occurs. In this way Tripwire provides the foundation for data security and ensures a safe, productive, stable IT environment. http://www.tripwire.com/
PestPatrol, Inc. is a Carlisle, PA based developer of anti-hacker tools founded in May 2000 by a team of security software professionals to counter the growing threat of malicious non-viral software. The company’s flagship product, PestPatrolÃ¢â€ž?, detects and removes hacker, remote administration and distributed denial-of-service attack tools, trojans, spyware and adware. www.PestPatrol.com.
At nCipher, we’re helping to redefine how, when and where cryptography can be used to protect an organization and its information assets. Our hardware security products and developer toolkits optimize the use of cryptography by making it faster, more secure and easier to manage. http://www.ncipher.com/
Founded in 1956, Symmetricom, Inc. (Nasdaq: SYMM) is a diversified supplier of network equipment for the global telecommunications industry. The Company’s products play a critical role in the operation, bandwidth utilization and quality of service of wireline, wireless and broadband networks. http://www.symmetricom.com
Only one biometric provides the security, ease of use and rapid deployment that the world demands…voice. Vocent’s vision is to provide voiceprint authentication solutions that answer the security needs of a changing world. http://www.vocent.com/
The Computing Technology Industry Association’s Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. http://www.comptia.org/
Since 1982, New Horizons Computer Learning Centers has grown to become the largest independent IT training company worldwide. We offer more courses, at more times and in more locations than any other company in the computer training industry. www.newhorizons.com
Tivoli software from IBM enables an IT organization to reduce the total cost of ownership and improve service levels of the IT infrastructure. Tivoli systems management software helps traditional enterprises and e-businesses worldwide manage security, storage, performance and availability, and configuration and operations. www.tivoli.com. Based in Framingham, Mass. with European headquarters in London, the International Information Systems Security Certification Consortium, known as (ISC)2 is the premier organization dedicated to providing information security professionals and practitioners worldwide with the standard for professional certification. www.isc2.org
Check Point Software Technologies is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. The company’s Secure Virtual Network (SVN) architecture provides the VPN and security infrastructure that uniquely enables secure and reliable Internet communications. http://www.checkpoint.com
OpenUmbrella (OU) is a non-profit organization created to promote the adoption and use of open source software and related technologies. The programs of OU target public education and technical support of open source software with special emphasis on use in the public schools, small enterprises and other non-profit organizations. http://www.openumbrella.org
Since 1989, TruSecure Corporation has set the standard for risk mitigation in increasingly complex and interconnected business environments. A global leader in managed security services, TruSecure helps organizations ensure the security of critical business information assets. www.trusecure.com As the market leader in urgent messaging, Vytek Messaging Services continues to mobilize organizations – by efficiently facilitating communication between mobile staff and the back office, ensuring that all critical events are handled. Used in over 2000 organizations worldwide, TelAlert’s urgent notification and response, web-based alert management, role-based administration and remote problem resolution equips your mobile staff with disaster recovery tools – ensuring business continuity for today’s real-time enterprise. www.vytek.com
IP3 Inc. Launches 2003 Security Workshop
Implementing IT Security – From Strategy to Reality