IT-ology Trends 2015
Technology is driving business at an unprecedented speed. But, on an almost daily business, cyber security breaches or hacks are taking place throughout the world. So, how do you protect your business, your family, your self? Join us for Trends 2015 as we explore the important topic of cyber security. Presentations will range from trending topics in cyber security to new technologies. This is a must attend event for C Suite, citizens and technologists!
| Wed,October 28th | IT-oLogy | 1301 Gervais St., Columbia
Morning Keynotes Include:
Creating a Culture of Cyber Security, Michael Kaiser, National Cyber Security Alliance
Did you know it’s National Cyber Security Awareness Month (NCSAM)? Securing the internet is a responsibility we all share, and NCSAM is intended to provide all digital citizens with the resources they need to protect themselves and others online. Learn about how we start to create a culture of cyber security as we have with other issues such as recycling.
South Carolina's Cyber Landscape and Opportunities, General Les Eisner, University of South Carolina
Lessons Learned from Ashley Madison, Jim Salter, Openoid
38 million accounts and 9.7 million credit card transactions from the notorious adultery site leaked this year. How does this affect you? Probably more than you think, whether you were in AM's databases or not. Learn how to manage your data - and its inevitable exposure - in the harsh reality of the internet era.
But It Disappeared!
What REALLY happens when you use apps (such as SnapChat)? Demonstration by top forensic specialists.
How to Make Your Home and Family Cyber Safe, Michael Kaiser
Passwords in the Internet Age, Jim Salter, Openoid
So You've Been Hacked,Juliana Harris,SC Department of Consumer Affairs
Learn how to put together a cybersecurity plan for your business, how to manage potential issues and more.
Jarrett Coco, Nelson Mullins Riley & Scarborough
Low Cost Tools for Security Challenges, Timothy De Block, ColaSec
Application Security, Bruce Jenkins, HP
Simple Hacking Techniques Anyone Can Use, Mark Baggett,SANS Institute