Search
Make Good Use of Your Sidebar

Use this space for anything from simple blocks of text to powerful widgets, like our Twitter and Flickr widgets. Learn more.

To access Website Management, hit the 'esc' key or use this Login link.

Blog Index
The journal that this archive was targeting has been deleted. Please update your configuration.

ROCKY MOUNTAIN INFORMATION
SECURITY CONFERENCE
MAY 14-15, 2014
Colorado Convention Center

 

The Annual Rocky Mountain Information Security Conference (RMISC) is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels. RMISC provides the perfect blend of education, networking and opportunities that are critical to your success in today's economy and security climate!

RMISC is pleased to announce the availability of pre-conference specialty workshops! In addition to extending the conference to offer additional educational opportunities, we hope this will allow more of the industry professionals beyond the Metro Denver area to attend.

 

Are you ready for a little competition?

Get ready for The Hacker Academy’s Cyber Skills Competition,
included in your registration.
For more information click here!







Keynote Speakers

 
 
 


Workshops


PRE-CONFERENCE WORKSHOPS

Cutting Through the Headlines - A Training for IT Auditors (Presented by KPMG)

A New Model: Advancing Organizational Security Through Peacebuilding

Secure Development on iOS – Advice for Developers and Penetration Testers (Presented by iSec Partners)

Web App Skills/Hacker Academy

Security Leadership Roundtable


THURSDAY WORKSHOPS

100: Can AppSec Training Really Make a Smarter Developer?

101: Integrating Auditing with SharePoint

102: IR Strategy Blueprinting

103: Misuse Cases - Putting Security Requirements Into Context

104: Target Lessons Learned: Hacker Tools Provide Breach Insights

105: The Illusion of Security – Why What We’re Doing Isn’t Working

200: Go Hybrid! Mixed Skills for Modern Pentests – or Hacking Like an APT

201: How to Achieve Success with Cyber Risk Assessment and Analysis

202: Malware Preparedness and Incident Response - A Cryptolocker Case Study

203: Risk Intelligence: Harness and Exploit Risk for Competitive Advantage

204: Security at Scale: Agile Security & Rugged DevOps

205: Sniping the Airwaves

300: Architecting Effective Defense in Depth

301: Hacking Lessons Learned Panel Discussion

302: Putting Enterprises (Back) In Control Of Their Identities

303: Successful Mitigation Techniques for 4 Common Web App Vulnerabilities

304: The Dark Side of A Payment Card Breach

305: Your Metrics Suck So Why Should You Get More Funds?

400: 50 Shades of RED: Stories from the "Playroom"

401: Checking the Box

402: Malware Analysis 101 - N00b to Ninja in 60 Minutes

403: Oracle Database Security

404: Porcupines in Hyperspace: Nailing Machine Learning for Mobile

405: The Joys of an Empty Server Room

Sponsors

Complete list of Sponsors

Please contact Stacey Pina with iPlanIt, our meeting management company, regarding Conference Sponsorship:

Phone: 303.325.3531

eMail: stacey@iplanitmeetings.com

Media Partners

SC Magazine arms information security professionals with the in-depth, unbiased information they need to tackle countless security challenges and establish risk management and compliance postures that underpin overall business strategies.

We deliver up-to-date news, comprehensive analysis, cutting-edge features, contributions from thought leaders, and the best, most extensive collection of product reviews in the business. Whether through our magazine, comprehensive website, in-depth Spotlight editions, eBooks, newsletters, or digital and live events - such as our SC Awards program, SC Magazine Roundtables and SC Congress London- our readers gain all the relevant information they need to safeguard their organizations and, ultimately, contribute to their longevity and success.