You can't secure what you don't acknowledge.SM

Wednesday, June 4, 2008

Upcoming keynote presentation I'm giving for GSCPAs

Two weeks from this Friday - on June 20th, 2008 - I'll be giving the keynote presentation for the Georgia Society of CPA's Tech Conference...Here's the press release:

Principle Logic’s Kevin Beaver to Keynote GA Society of CPA's Tech Conference

Kevin Beaver, independent information security expert with Atlanta-based Principle Logic, LLC, will be keynoting the Georgia Society of CPA’s 2008 Technology Conference. Kevin will apply his practical and no-nonsense approach to security in his presentation titled The Business Case for Information Security. He will outline why information security is a business problem and what can and should be done about it.

“I’m honored and humbled to have been invited to speak to a group of people that play such a key role in information security.” says Beaver. “The fact that many accounting professionals want to hear about information security issues says it all. Security’s not a technical problem that IT should own but rather a business issue that business people need to be involved with.”

For more information, please visit the Georgia Society of CPAs Conference site at and Principle Logic’s Web site at

About Principle Logic, LLC and Kevin Beaver

As an independent consultant with Principle Logic, LLC, Kevin Beaver’s services include security-related keynote speaking engagements, expert witness consulting and testimony, security assessments of networks and Web applications, and information security pre-audits and gap analyses. Kevin has authored/co-authored seven books on information security including Hacking For Dummies, Hacking Wireless Networks For Dummies, Laptop Encryption For Dummies, Securing the Mobile Enterprise For Dummies, and The Practical Guide to HIPAA Privacy and Security Compliance. He is a regular contributor to,,, and Security Technology & Design magazine. Kevin is also the creator and producer of the Security On Wheels audio programs and blog providing security learning for IT professionals on the go (

No comments:

Post a Comment