RSA Conference 2013 – Are You Going?

Home > Blogs > Security > RSA Conference 2013 – Are You Going?

RSA Conference 2013 – Are You Going?

Like This Blog 0 Mike Danseglio
Added by February 19, 2013

I’ll be at the RSA Conference 2013 in San Francisco from February 25 to March 1. I’ll most certainly be at the opening and closing keynotes, as those are simply amazing insights into the world of security as it exists and what it will become. I don’t usually attend keynotes, but seeing the innovators and industry leaders is well worth the time.

If you’ll be there please give me a shout! I’m always up for going to sessions or grabbing a coffee with my fellow security professionals.

See you in San Francisco!

Mike Danseglio -CISSP / CEH
Interface Technical Training – Technical Director and Instructor

Videos You May Like

Agile Methodology in Project Management

0 162 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 686 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 645 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.