Conference Topics




  • • IT Security

  • • Network Security

  • • Big Data Security

  • • Enterprise IT Security

  • • Mobile Security

  • • Mobile Data Security

  • • Mobile Application Security

  • • Cloud Security

  • • Cloud Data Security

  • • Internet of Things Security

  • • Application Security

  • • Web Application Security

  • • Web Security

  • • Secure Web Gateway

  • • Browser Security

  • • Open Source Security

  • • End User Security

  • • Antivirus Solutions

  • • Malware Protection

  • • Identity and Access Management

  • • Access Control to IT Systems

  • • Intrusion Detection

  • • Protection From DDoS Attacks

  • • Unified Threat Management




  • • Server Security

  • • Data Center Security

  • • Database Security

  • • Secure Remote Access

  • • Virtualization Security

  • • Email Security

  • • Log Management

  • • Firewall Security

  • • SIEM (Security Information and Event Management)

  • • Strong Authentication

  • • Vulnerability Management

  • • Data Loss Prevention

  • • Disaster Recovery

  • • Business Continuity

  • • Managed Security Service

  • • Fraud Prevention Systems

  • • IT Risk Management

  • • IT Compliance

  • • IT Governance

  • • IT Asset Management

  • • Information Security Audit

  • • IT Audit

  • • Penetration Testing