11.11.2015 @ Loudermilk Center - Atlanta, GA
Designated the nation's tenth largest cyber city since 2006, Atlanta is a hotbed of innovation for information technology and security. The area is home to the nation's largest concentration of Fortune 1000 companies, and security professionals from these and a host of other corporations rely on the Metro Atlanta Chapter of ISSA to serve as a driving force behind collaboration and education.
The Metro Atlanta ISSA Chapter is proud to announce their annual security conference for 2015: "Foundations of Effective Security". We are bringing to you a full day of insights on cutting-edge tools, best practices and emerging trends. The 2015 conference provides a showcase for the latest developments within the field of information assurance. Leaders from the field of information assurance will discuss emergent threats, best practices, and current topics that focus on how security influences business, government, and organizations alike.
Attendees can also participate in learning sessions and discussions with industry thought-leaders.
40 Courtland Street Northeast
Atlanta, GA 30303
Certified Security Solutions
Dangerous Access - The critical role of digital identity-based authentication in the Internet of Things (IoT)
Mandarin Oriental Hotel Group
Are You Ready? Incident Response Preparedness and Post-Incident Considerations
Splunk has graciously offered to provide training for those who will be attending the 2015 Foundations of Effective Security conference. This training will be available to registrants on a first-come-first-serve basis in a classroom setting that holds 70 attendees. The sessions will be available twice during the conference, once in the morning and once in the afternoon, and can only be attended once per attendee. Each of the following sessions is 1 hour in duration. These sessions do not require the use of a laptop; but they do assume that the attendees have a Splunk-101 level of understanding
1. Splunk: Search Optimization
2. Splunk Search for Security: Baseline
3. Splunk Search for Security: Threat Intelligence and Transactions
To participate in these sessions you must check the corresponding box for the training time-frame you want during the conference registration process:
If you have already registered for the conference and are interested in participating in this training you can modify your registration through the registration portal and indicate that you will be participating in the training.