IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Developing a Security Strategy

Check your calendars for the SecurIT Summit in October.

Developing a sound, achievable security strategy involves keeping one eye on the reality of Internet-speed changes and the other on the reality of the corporate environment. Purchasing security technology is the easy part -- knowing what to protect, how to protect it and why, is the challenge.

This requires adequate security management -- which entails planning, policy development, procedural design -- in addition to investment, and technological expertise.

The SecurIT Summit Fall 2002, the fifth in a series of semi-annual events, is an exclusive gathering that brings together senior-level security executives with a select and diversified group of leading-edge Solution Providers.

Over the course of the summit, qualified invitation-only delegates will meet with sponsor representatives via pre-scheduled and tailored one-on-one business meetings for a personal and detailed look at the latest security services, solutions and technologies.

These informative meetings between decision makers serve to guide and improve the development of solutions for delegate companies.

The format of the SecurIT Summit includes one-on-one meetings, informal networking scheduled into the itinerary and a personalized itinerary.

Marcus Evans Summits