Meeting Topic: Application Security – How to Avert the Next Generation of Hacking
Topic Description: The responsibility of Information Security is to protect data, including where it is exposed in all interactions between components. The bad guys, on the other hand, need to find only one way to compromise your system. Just as one copy of an MP3 file is enough to fuel the entire criminal ecosystem, so is a single copy of your data enough for your adversaries. Furthermore, theft using any one approach cannot be undone. There is no undo switch in cyberspace.
The fluctuating nature of security threats force companies to reconsider technologies and employ innovative products that effectively shield their information assets from both the internal and external threats. Increased installation of complex network systems, stringent government regulations, and enhanced risks, require a comprehensive and cohesive approach which at times results in complex security solutions. Join us May 6th to learn more about Application Security in Enterprises and review the topics below while taking questions.
- Application Security – What is it
- Security Products Available in the Market
- Hacking in the Enterprise
- 3rd Party Assessments
- How to avoid common mistakes in Application Security
Microsoft’s Las Colinas Office
LC1 Building (Right Tower)
7000 State Highway 161, Irving, 75039 TX
Cost: Jel IT Services is paying for the pizza but please RSVP to help predict the amount of food needed.
6-6:30: Dinner and Networking
6:30-7:00: Announcements, and Business meeting
7 – 8:30: Presentation and wrap up