Register NOW to reserve your seat - space is limited. Dear Security, To what degree does organized cyber-crime put your organization at risk? As the FBI's Dan Larkin (one of the pioneers of partnerships for the FBI's Cyber Division) can tell you, it's more than you think. No longer the same cliché depicted in movies or an Emmy winning drama, organized crime has reached the 21st century in full force. In fact, "85 percent of malware today is created with profit in mind... and only 5 percent of cyber criminals are caught and prosecuted." These statistics, cited in a 2006 Business Week article, allude to the growing force of a multinational group of hackers backed by organized crime. Do you know what new threats these groups are launching? Now, more than ever, you need to know how at-risk your enterprise is from organized cyber-crime. The Security Standard's keynote presentation will give you the insight you need to identify and mitigate the risks associated with organized cyber-crime today and in the future. A Lengthening Shadow: The Growing Influence of Organized Crime on Cyber-Security In this year's keynote presentation, a top FBI investigator will evaluate the landscape of organized computer crime and explain what you need to do to protect your organization. Dan Larkin, one of the pioneers of partnerships for the FBI's Cyber Division, will outline the measures necessary for you to effectively respond to the growing exploitation of the Internet by organized criminals. Key topics will include: - What is the magnitude of the organized cyber-crime threat?
- What activities are most attractive to cyber criminals?
- Where are you most at-risk?
- How can partnerships among law enforcement, the FBI, and corporations mitigate these risks?
Visit TheSecurityStandard.net to learn more and to apply for your complimentary registration*. Two Great Benefits of Attending - Receive Two Special Reports Free of Charge
All Security Standard attendees will receive an advance copy of CSO magazine's 2007 eCrimeWatch Survey and the PricewaterhouseCoopers | CSO | CIO Global Information Survey as an added benefit of attending. - Earn CPE Credits from the (ISC)2
(ISC)2 recognizes The Security Standard conference content as eligible for Continuing Professional Education (CPE) credits for (ISC)2 credential maintenance. (ISC)2 members can earn one continuing education credit for every hour of meetings or tutorials they attend. The Security Standard September 10-11, 2007 The Fairmont Hotel | Chicago, IL * Candidates must be working within one of the following qualified job functions: Executive-Level IT (CISO, CIO, CSO, CTO), Security/Compliance Management (Director level and above), or IS/MIS/IT Management (Director-level and above). Professionals from technology companies who are not primarily involved in the security purchase decisions and/or strategies within their own company do not qualify. |  | |  Daniel J. Larkin Unit Chief, Cyber Initiative & Resource Fusion Unit, Cyber Division Federal Bureau of Investigation
|  Has the Internet been criminalized? Co-Host Scott Draughon (MyTechnologyLawyer) discusses how the Internet has been criminalized with The Security Standard Co-Chairs John Gallant (Network World) and Bob Bragdon (CSO magazine), as well as Jeff Platon (Cisco) LISTEN NOW
|   Robert Bragdon Publisher, CSO magazine  John Gallant President & Editorial Director Network World |
No comments:
Post a Comment