Cyber Security Articles & News

Prepare for the Next Wave of Cyber Attacks

Red Sky Solutions is proud to announce the second annual Red Sky IT Security Conference on May 10, 2017, at the South Towne Expo Center.

Last year's conference went to 10. "This one goes to 11!" We are excited to present our very special keynote speaker, The World's Most Famous Hacker, Kevin Mitnick! Kevin will entertain and educate by performing his "live technology magic show" of the latest hacking techniques.

Attendees will also receive extensive knowledge around the latest security innovations, trends and evolving best practices from IT security through leaders and technologists. Tour our IT Security trade show to get more knowledge on the latest and greatest products to protect your company's assests.

All attendees are automatically registered to win great prizes, and will be provied breakfast and lunch.

Register today as you will not want to miss the premier security conference of 2017! Ask your Red Sky Sales Rep for special discounts.

Source: Eventbrite

Topics: security innovations, The World's Most Famous Hacker, cybersecurity expert, IT security, keynote speaker, security awareness training, IT trade show, South Towne Expo Center, Red Sky IT Security Conference, Red Sky Solutions, hacking techniques, Kevin Mitnick, live technology magic show

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybe..

Read more ›

Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted l..

Read more ›

The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain..

Read more ›