{"id":11350,"date":"2013-03-24T16:43:01","date_gmt":"2013-03-24T21:43:01","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=11350"},"modified":"2013-03-24T16:43:48","modified_gmt":"2013-03-24T21:43:48","slug":"security-seminar-suited-battle","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/security-seminar-suited-battle\/","title":{"rendered":"IT Security Seminar – Are You Suited for Battle?"},"content":{"rendered":"
Information security has evolved from a tactical IT concern to a boardroom-level dilemma. This transition has challenged many executives who are now obligated to protect their organization\u2019s critical assets. McAfee released\u00a0Security Battleground: an Executive Field Manual<\/strong><\/em>\u00a0to provide guidance to executives who find themselves shouldering oversight responsibility for information security.<\/p>\n Come join Bradon Rogers, McAfee’s Vice-President of Worldwide Sales Engineering, who helped write and design this book to provide practical advice for security-obligated executives with or without formal backgrounds in security processes or technologies.<\/p>\n","protected":false},"excerpt":{"rendered":" Information security has evolved from a tactical IT concern to a boardroom-level dilemma. This transition has challenged many executives who are now obligated to protect their organization\u2019s critical assets. McAfee […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[246,206,196],"class_list":["post-11350","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-bahamas","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-seminar","cat_bahamas","cat_cybercrimecybersecurity-3","cat_seminar"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/11350"}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=11350"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/11350\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=11350"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=11350"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=11350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}