Security Basics mailing list archives
Re: Conferences...
From: Ian Gallagher <cdine.org () gmail com>
Date: Tue, 21 Sep 2004 22:58:27 -0700
ToorCon (www.toorcon.org) is another smaller conference, going on this weekend in San Diego. On Tue, 21 Sep 2004 08:45:06 -0600, Russell Morrison <rmorrison () axys net> wrote:
I fully agree that SANS is one of the **very best** sources of "courses" and security training. For "conferences", I would suggest either Black Hat Briefings in LV or maybe the CSI NetSec event each year. Keep in mind that both have a different focus with the "conferences" having maybe a few small training sessions and lots of poster board and conference papers/presentations (powerpoint, etc.). If you are looking for really focused security "training" and not "presentations", go to SANS. Russell -----Original Message----- From: William Barrett [mailto:William.Barrett () bvainc com] Sent: Sunday, September 19, 2004 8:07 PM To: Ryan Murphy; security-basics () securityfocus com Subject: RE: Conferences... I fully agree that SANS id one of the best. You may also want to consider the Blackhat briefings (http://www.blackhat.com/) in Las Vegas as well although these are not until next summer. Will Barrett -----Original Message----- From: DeGennaro, Gregory [mailto:Gregory_DeGennaro () csaa com] Sent: Friday, September 17, 2004 07:23 To: Ryan Murphy; security-basics () securityfocus com Subject: RE: Conferences... www.sans.org - most definitely one of the best, if not the best. Regards, Greg DeGennaro Jr., CISSP, CCNP Systems Engineer -----Original Message----- From: Ryan Murphy [mailto:RMurphy () irvinecompany com] Sent: Thursday, September 16, 2004 9:57 AM To: 'security-basics () securityfocus com' Subject: Conferences... Hello list, My boss and I have budgeted some money to attend several security conferences this year, and I wanted to get the list's input as to which ones are considered the premier information security conferences held in the US. Are there any websites that have an almost complete list of conferences, and have them explained and rated according to attendee feedback or something similar? Thanks in advance, Ryan ============================= Notice to recipient: This e-mail is meant for only the intended recipient of the transmission, and may be a confidential communication or a communication privileged by law. If you received this e-mail in error, any review, use, dissemination, distribution, or copying of this e-mail is strictly prohibited. Please notify us immediately of the error by return e-mail and please delete this message from your system. Thank you in advance for your cooperation. ------------------------------------------------------------------------ --- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ---- ------------------------------------------------------------------------ --- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ---------------------------------------------------------------------------- *********************************************************************** Confidentiality Notice: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. *********************************************************************** --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
-- -Ian, http://cdine.org --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Conferences... Ryan Murphy (Sep 16)
- Re: Conferences... Shawn Duffy (Sep 18)
- <Possible follow-ups>
- RE: Conferences... DeGennaro, Gregory (Sep 19)
- RE: Conferences... William Barrett (Sep 20)
- RE: Conferences... Russell Morrison (Sep 21)
- Re: Conferences... Ian Gallagher (Sep 22)
- RE: Conferences... Balwant Rathore (Sep 27)
- RE: Conferences... Russell Morrison (Sep 21)
- RE: Conferences... Prasanna M (Sep 22)
- RE: Conferences... Ravi Kumar (Sep 27)