SOURCE Conference brings security experts and business professionals together in an intimate and personal environment to discuss the security industry’s most important issues, technologies, and business trends. SOURCE takes the technical excellence and expertise found at top hacker conference and places in an executive environment where business professionals can gain insight into the security industry’s most important issues, technologies, and business trends.
The purpose of SOURCE Conference is to bridge the gap between technical excellence and business acumen within the security industry. SOURCE fosters a community of learning where business and security professionals come together to gain knowledge and skills, network with peers, and advance their careers and professional development. SOURCE enables individuals, teams, and organizations to leverage information to improve decision-making, optimize performance, and achieve business objectives.
Who Attends SOURCE?
SOURCE is designed for top security professionals, advanced IT professionals, senior and top-level executives, company chief officers (e.g., CTOs, CSOs), faculty and students from colleges and universities, members of management and business communities who are looking to connect with security and technology experts.
The SOURCE Experience
SOURCE Boston attendees experience two and a half days of intense 50 minute sessions taught by top security experts. Sessions hold 50-60 professionals, providing an intimate environment where attendees can ask questions, participate in discussions, and interact with other delegates and speakers.
Attendees will have the choice of three exciting tracks:
- Security and Technology – security software, cloud security, secure coding practices, reverse engineering, new software releases and technology demonstrations
- Business of Security – critical decision-making, entrepreneurship, issues of compliance, vulnerability management, SaaS, privacy laws, disclosure, and economics
- Application Security (Boston only) – threats, attacks, vulnerabilities, counter measures, testing, mobile application security, security testing, penetration testing, and static code analysis
More details of SOURCE Boston 2014 will be posted when available.