BSides Knoxville is a security conference in the spirit of Security BSides; our goals are simple:
Provide a relaxed, comfortable environment.
Present useful, interesting information.
Help people connect with old friends and make new ones.
While our focus is information security, the information presented may be on varying topics of interest to the infosec / hacker (yes, this word has many meanings) community. This event being produced by the community, for the benefit of the community; all decisions made, all actions we take are made with that in mind.
Questions, Comments, Conerns, Rants....
Sponsorship available, contact firstname.lastname@example.org for more info!
Cisco Systems, Inc. (Cisco) designs and sells a range of products, provides services and delivers integrated solutions to develop and connect networks around the world. The Company operates through three geographic segments, Americas; Europe, the Middle East, and Africa (EMEA), and Asia Pacific, Japan and China (APJC). The Company groups its products and technologies into the various categories, such as Switching; Next-Generation Network (NGN) Routing; Collaboration; Data Center; Wireless; Service Provider Video; Security, and Other Products. In addition to its product offerings, the Company provides a range of service offerings, including technical support services and advanced services. The Company delivers its technology and services to its customers as solutions for their priorities, including cloud, video, mobility, security, collaboration and analytics. The Company helps its customers build networks and automate, orchestrate, integrate and digitize information technology (IT)-based products and services. It serves customers, including businesses of all sizes, public institutions, governments and service providers.
Optiv's vision is to become the most advanced, most comprehensive and most trusted partner for cyber security solutions. We provide a full suite of information security services and solutions that help define cyber security strategy, identify and remediate threats and risks, select and deploy the right technology, and achieve operational readiness to protect from malicious attack.