Join us at Black Hat 2013 in Las Vegas this July, for our two-day hands-on Network Threat Defense, Countermeasures, and Controls course. Courses will be offered on July 27-28 and July 29-30, and attendees will learn and perform two network security roles. First, as a Security Practitioner, you’ll learn to secure and harden network infrastructure devices, and second, as a Security Incident Response Investigator, you must correctly detect, classify, and mitigate threats attacking a network by configuring and deploying advanced network threat defenses and countermeasures. Learning these roles will help you prepare for and respond to real world threats such as the recent Financial Services, SpamHaus, and OpUSA Denial of Service Attacks. Read More »
On February 29th, Christopher Young, Senior Vice President of Cisco Security, delivered a rousing keynote address at the RSA 2012 conference in San Francisco.
The title and theme of his presentation, “Lock it Down or Free it Up?”, spoke to the dilemma organizations of all sizes face every day. Read More »
How connected are you with your social networks? Are you finding that at times, your social channels become stale or a one-way dialog? If you’re experiencing the “silent treatment”, here are some easy ways to generate two-way conversations.
Tweet or post questions and polls: Events, activities, and launches have a unique opportunity to educate as well as create excitement and energy. Develop creative ways to poll audiences about related topics. And don’t be afraid to mix in a few casual types of questions that pertain to the event, but might be lighter in nature.
Interactions: Social media has a lot to offer to marketers. One special feature of social media is the ability to crowdsource and strengthen loyalty. Monitor social media channel feeds closely, respond quickly, and keep feeding the streams. Simple questions such as “What did you think of the keynote?” or “What interests you the most about this program?” will help start conversations. You’ll be amazed at how much audiences want to share their opinions and information.
Contests: While audiences are primarily interested in the straight forward information and updates, they often like to get involved in other types of activities. Using social channels, offer different types of contests and incentive-based opportunities. These activities do not have to have monetary values, but do need to have perceived importance. For example, preferred seating at a keynote or a meet-and-greet opportunity.
These are just some quick examples of ways to start social interactions. The key to making these ideas work is to integrate social channels together and with the rest of the marketing communications plan. Having a central “hub” like an online community or a website, will help audience members navigate all of the information and discussions more easily.
What are some creative ways you are starting conversations using social media? Share your experiences and let’s keep the social media information sharing going. And follow my Twitter handle (@elhoust) for more social media for events best practices.
The past year has been an interesting one in IT in general, and security in particular. We have seen the continued growth of Internet traffic, the ongoing rise of the could, the consumerization of IT and the growth of social networks, all making the challenge of delivering secure, reliable, seamless connectivity to increasingly distributed users on a proliferating forest of increasingly diverse devices. With new challenges like government-backed cyberwar efforts such as Stuxnet, hacktivism and not so anonymous DDoS attacks, a big mobility push and an emphasis on telework, IT and security groups have their hands full.
Come join us at RSA 2011 in Moscone Center in San Francisco. The show is running February 14-18 and we are excited to be showing some of our latest and greatest security solutions and technologies at Booth 1717.