May 6th UG Meeting – Application Security

Meeting Topic: Application Security – How to Advert the Next Generation of Hacking

Jel IT Services Logo

Topic Description: The responsibility of Information Security is to protect data, including where it is exposed in all interactions between components.  The bad guys, on the other hand, need to find only one way to compromise your system. Just as one copy of an MP3 file is enough to fuel the entire criminal ecosystem, so is a single copy of your data enough for your adversaries. Furthermore, theft using any one approach cannot be undone. There is no undo switch in cyberspace.


The fluctuating nature of security threats force companies to reconsider technologies and employ innovative products that effectively shield their information assets from both the internal and external threats. Increased installation of complex network systems, stringent government regulations, and enhanced risks, require a comprehensive and cohesive approach which at times results in complex security solutions. Join us May 6th to learn more about Application Security in Enterprises and review the topics below while taking questions.

  • Application  Security – What is it
  • Security Products Available in the Market
  • Hacking in the Enterprise
  • 3rd Party Assessments
  • How to avoid common mistakes in Application Security

Microsoft’s Las Colinas Office
LC1 Building (Right Tower)
7000 State Highway 161, Irving, 75039 TX

Cost: Jel IT Services is paying for the pizza but please RSVP to help predict the amount of food needed.

6-6:30: Dinner and Networking
6:30-7:00: Announcements, and Business meeting
7 – 8:30: Presentation and wrap up

Posted in User Group Events

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>