On top of all the rest of our daily concerns, we have to worry about Social Engineering cyber attacks.
It goes on to talk about a machine that IBM built (the Cracken) that can crack any password up to 14 characters in 5 minutes or less.
Nearly every day we read about yet another data breach. They come from every market and size of company.
Recently, the topic of protecting the individual (user) at the point of entry (login), to a application or digital resource has risen to the top of security discussion.
Interspersed with all of these conversations, you’ll want to attend many of the informative and entertaining sessions prepared by our cast of talented speakers.