What are the highly damaging internet legal liabilities and risks to you -- chat with Martin Kratz QC, head intellectual property practice group, Bennett Jones LLP, legendary IP and ICT legal authority and pioneer

My chat with Martin was a real eye opener – there is a tremendous amount of legal risk to you when using the Internet and ignorance does not protect you! Martin Kratz leads the intellectual property practice and co-leads the ecommerce practice for Bennett Jones. His practice is focused around intellectual property and technology law,…

0

Chat with Shafi Goldwasser ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT and Weismann Institute

Professors Shafi Goldwasser (r) and Silvio Micali (l) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Shafi Goldwasser is the RSA Professor of Electrical Engineering and Computer Science at MIT, and Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), as well as a professor of Computer Science and Applied…

0

Chat with Silvio Micali ACM Turing Award recipient in 2013 (Nobel Prize of Computing); World-renowned distinguished researcher and professor MIT

Professors Silvio Micali (l) and Shafi Goldwasser (r) Turing Award Recipients in 2013. Photo by Jason Dorfman, CSAIL/MIT Silvio Micali, the Ford Professor of Engineering at MIT and a Principal Investigator at the MIT Computer Science and Artificial Intelligence Lab (CSAIL), is a recipient of the Gödel Prize from ACM SIGACT and EATCS. A Fellow…

0

Dave Roath: Leader PwC U.S. IT Risk & Security Assurance Practice

Dave is a Risk Assurance Partner that leads the PwC U.S. IT Risk & Security Assurance practice. He resides in New York, NY. Dave has more than 20 years of experience in Business Process and IT risk, IT security, IT audit and compliance/regulatory readiness. Dave has a strong background in delivering IT Risk Management and…

0

April 12 Webinar: "Security: Computing in an Adversarial Environment"

Register NOW for ACM’s second-ever, free learning webinar, presented on Thursday, April 12, 2012 at 2 PM EST! Space is limited. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or…

0