October 1, 2012 10:30am Room OD203
Dan Mathews, Dell/Secureworks
Threats and Vulnerabilities
Abstract: The speaker will cover the mobile threatscape updates from the Counter Threat Unit (CTU). The State of mobile malware, trends and attacks will also be discussed. He will also go over specific attack/compromised examples with the audience participation.
October 2, 2012 10:30am Room OD203
Bob Demmery, Sprint
Abstract: As an industry, carriers have noticed an increase of customer’s reporting devices have been infected with Malware. The purpose of the presentation is to raise awareness and provide actionable steps to protect your personal and business information on your mobile devices.
October 10, 2012 10:30am Room CM133
Jason Wright, Sourcefire
Agile Security in a Dynamic World
Abstract: Security is a moving target. The amount of change occuring daily on today’s networks from BYOD devices, new applications, and remote users demands that your security solutions to change with the network composition. And as if the dynamic network wasn’t enough to contend with, the threats are changing as well. Polymorphism and zero-day exploitation by new strains of malware will grow significantly in 2013; so how do we stop what we’ve never seen before?
October 15, 2012 10:30am Room OD203
Mike Scanlin, NetApp
Title: Assuring Confidentiality, Integrity and Availability with the NIST Risk Management Framework
Abstract: While cybersecurity awareness is deemed an essential element of U.S. national strategy aimed at reducing vulnerability to cyber‐attack, we lack a shared definition and understanding of the term cybersecurity. This presentation promotes the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) as a way all organizations can understand and achieve the core tenets of cybersecurity (i.e., confidentiality, integrity, and availability). By holistically integrating people, process, and technology, the NIST RMF enables organizations to achieve information assurance consistent with mission and risk management objectives.
October 17, 2012 09:30am Room OD203
William Chip Crane, IBM
Title: Understanding the security challenges to cloud computing
Abstract: Cloud computing is offering businesses new dynamic ways to implement their IT infrastructure that can provide more cost effective ways to serve their customers. It has revolutionized the way many companies operate as it can provide faster routes to market, faster implementation of new business concepts as well as improve reliability. However, one of the greatest challenges seen by the world's CIOs and CSOs is how to keep it secure. Once this mission critical infrastructure is in place and providing customer facing services, how can the CSO ensure that customer data is protected and both risk to the customer and the business are mitigated. Find out the challenges that face the CIO and CSO and what are the steps to solving them.
October 24, 2012 09:30am Room CM125
Patrick Gray, CISCO
Title: The Confluence of Data Security Challenges
Abstract: The Speaker will cover the cresting Waves that are engulfing users and security professionals, the BYOD phenomenon and current threats and vulnerabilities around the world.
What has changed in the Hacktivism community is that these individuals and groups are more in sync with their cohorts in the organized crime community in that they not only hack for the sake of hacking an entity that has run afoul of their beliefs but also for monetary gain and these groups, such as Anonymous and LulzSec seem to target anyone who ends up on their radar such as the Australian Government, numerous Chinese Government sites, Stratfor, the CIA, the FTC and many more.
Add to this three-pronged assault on our livelihood the fact that we are engaged in three separate and distinct confluences – mobility, collaboration and the virtualization of our environments. All three of these seem to be cascading at once quite often beleaguering our IT staffs as they try to cope with a train that is traveling at full speed. We’re dealing with BYOD, gravitating into the cloud and wondering about hypervisor attacks. How can I be confident that data center operations are sound?
So, we are in the midst of this confluence so where do we turn?
October 29, 2012 10:30am Room OD203
Rolando Panez, CheckPoint Software Technologies
Title: Dissecting Four Major Cyber Attacks of 2011
Abstract: Discussion of four major cyber-attacks that occurred in 2011. Specifically Operation Shady Rat which attacked over 70 victims in 14 countries, was considered state-driven industrial espionage and occurred over a 5 year span. RSA hack which was used in two others attacks at L3 and Lockheed Martin. HB Gary attack made by the online activist group Anonymous. Sony breach which is considered the 4th largest attack ever in terms of records lost.