NOAA IT Security Conference
Event submitted on Tuesday, June 23rd 2020, approved by Charles Villanueva ✓
This event has been tagged as follows:
(edit this info)
This is a very interesting event being organzied by NOAA, (the National Oceanic and Atmospheric Administration Office of Marine and Aviation Operations). For those that don’t know, this organization operates a wide variety of specialized aircraft and ships to complete NOAA’s environmental and scientific missions. They have a bunch of fascinating overviews on risks and threats. Highly recommended event and thank you NOAA team for submitting this event.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Tuesday, June 23rd 2020, or created by us.
A recent World Economic Forum report warned that the three top global risks to society, by likelihood, are:
- Extreme Weather Events
- Natural Disasters
- Cyber Attacks
No US cybersecurity division deals with this tricky trifecta daily, except for the exceptional team at NOAA. Covering from sea to space, NOAA provides minute-to-minute data about the conditions of our oceans, our major waterways, and our atmosphere. And to do it without any interruptions, they rely heavily on a secure and resilient global network infrastructure.
So that NOAA’s Cybersecurity Division is prepared for every worst-case digital scenario, its Chief Information Security Officer (CISO) hosts an annual NOAA IT Security Conference. This year’s event includes briefings from various NOAA components and industry leaders. There will be an impressive speaker lineup and a vendor meet and greet.
Last year’s popular event boasted 300 attendees, the vast majority of whom met with vendors during the multiple conference breaks (including the dedicated time for industry meet and greet). Exhibit space and sponsorship opportunities are available on a first-come, first-serve basis. Sign up early, as this event filled up in record time last year!
Beat the crowd: Register now to help NOAA build on its existing cyber methodologies.