1. Moscone West | 2009 Table C

The extent to which we are dependent on connected devices has put us at greater risk than ever before. This discussion will not only inspire you and your employees to safely and securely protect confidential information in the social media and mobile age, it will also help you understand how to build strategies to save your organization from the latest hacking techniques and threat vectors. Attendance is strictly limited to allow for a small group experience.

Participants: