CSI 29th Annual Computer Security Conference and Exhibiton

Washington / Chicago, 10.09.2002 - Identity Management, Provisioning, Enterprise Security Management the business case, functionality and implementation issues. With the complexity of IT environments comes the challenge of managing the relationship between the employees and the environment as cost-effectively but securely as possible.

Keith Girt will show how organizations gain productivity by improving the process through which the employee requests and receives their working environment. He will present solutions for the critical aspect which is in
correctly defining the environment for the employee. Particularly the
maintenance of security permissions which define the digital resources
within the employee's environment is an important factor for lowering risk.

Keith Girt will compare and contrast the similarities and differences of
identity management, enterprise security management and provisioning from
the perspectives of the business case, functionality and implementation
issues.

About the conference

The CSI 29th Annual Computer Security Conference and Exhibition is THE Security Event of the Year. This event boasts the largest and most comprehensive conference program in the industry, featuring over 130 sessions, case studies, panels and discussions. Over 3000 security pros from over 70 countries will attend the 29th Annual in Chicago this November. It's your best bet to get the knowledge and develop the contacts which will enrich your job, your career, and ensure that you return to your office a better practitioner. The Exhibition on November 10-12 features 120 of the leading security vendors on hand to personally answer your questions. Come preview the latest product solutions and visit exhibitors that include Computer Associates, BMC Software, Microsoft, IBM/Tivoli and many more. The 29th annual conference is designed for those new to security and seasoned professionals alike - for all security professionals who want to learn the latest strategies and technologies to protect their information systems.

Become a bobsguide member to access the following

1. Unrestricted access to bobsguide
2. Send a proposal request
3. Insights delivered daily to your inbox
4. Career development