Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Untitled

Untitled

Ratings: (0)|Views: 201 |Likes:
Published by Alan Weinkrantz

More info:

Published by: Alan Weinkrantz on Feb 17, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

07/13/2014

pdf

text

original

 
PRESS RELEASE
Agency Contact: Denim Group Contact:
Alan Weinkrantz John Dickson210.820.3070 210.572.4400alan@weinkrantz.com john@denimgroup.com 
John Dickson to Keynote ACM Conference
First ever ACM Conference on Data Application Security and Privacy 
San Antonio, TX
– February 17, 2011 - Denim Group, an IT consultancy that develops securesoftware and helps organizations assess and mitigate risks with their existing software,announced that John Dickson, CISSP will be delivering a keynote address to the first-ever Association for Computing Machinery, Special Interest Group on Security, Audit and Control(SIGSAC) conference on Data and Application Security and Privacy. The conference, organizedby the Institute for Cyber Security (ICS) at the University of Texas at San Antonio (UTSA), willinclude many leading worldwide scholars in the field of privacy and security.The keynote, titled “Software Security: Is OK good enough?” will address the existing state of application security and the struggles for business justification when securing softwareapplications.  “I want to convey to this gathering of top academic talent the genuine state of software security in enterprise clients,” said John Dickson, Principal, Denim Group and keynotespeaker.  “The reality is that most buyers do not demand their software to be secure, and manysuppliers are focused purely on features and functionality – we need to look at differentjustification models to enhance the perceived need of security in software.”The conference will include top researchers in security and privacy in academia today.  “We areexcited to host this group of world-wide leaders who are advancing the state of security for applications and privacy,” said Jeff Reich, CISSP, the Director of Operations at UTSA’s ICS.“San Antonio is the perfect backdrop for this ACM Conference given the heightened level of 
 
Denim Group ACM KeynotePage 2 
security activity in the region associated with the Air Force and San Antonio’s emergingrecognition as a cyber security center of excellence.
About Denim Group
Denim Group develops secure software, helps organizations assess and mitigate risk withexisting software, and provides training on best practices in software security. Denim Group hasworked with a range of Fortune 500 companies and public sector organizations, bringing afocused software development approach to the world of software security. Denim Group is astrong contributor to the larger application security community, and has been involved with theOpen Web Application Security Project (OWASP) since shortly after its inception. Additionally,Denim Group was ranked 1,925 in Inc. Magazine's 5000 Fastest-Growing Private Companies inAmerica in 2010. For more information about Denim Group, visit
.
About ACM
ACM is an educational and scientific society uniting the world's computing educators,researchers and professionals to inspire dialogue, share resources and address the field'schallenges. ACM strengthens the profession's collective voice through strong leadership,promotion of the highest standards, and recognition of technical excellence. ACM supports theprofessional growth of its members by providing opportunities for life-long learning, career development, and professional networking. ACM carries out its mission through conferences,publications, educational programs, public awareness activities, and special interest groups. Itsponsors over 150 conferences annually, including conferences on computer graphics(SIGGRAPH); data communications (SIGCOMM); mobile computing (SIGMOBILE);knowledge discovery and data mining (KDD);software engineering (SIGSOFT); highperformance computing (SC); human computer interaction (SIGCHI); object-orientedprogramming (OOPSLA); and freedom and privacy (CFP).  

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->