
Kim Cary
Chief Information Security Officer,
Pepperdine University
Universities require new approaches to IT security. Learn the top 10 steps to manage security in this new world. The increasing value of university IP, plus the culture of openness and freedom that universities support, presents enticing opportunities for hackers and thieves. Adversaries are upping their game, and so must we. Join us for a discussion about the steps that can help you manage IT security in this new world.