InfoSec 2012 Program

Page 32

INFOSEC 2012

SPEAKER BIOS SESSION ABSTRACTS

“Top Security Trends and Takeaways for 2012 and 2013” • Ray Wagner, Gartner With continuing trends in cloud, consumerization, mobility and the next big thing, the way IT is delivered is changing. Each brings new threats and breaks old security processes. Here we review the top 2012-2013 security hot topics to map the trends. Key Issues: • What social, business and technology trends lead to increased threat to businesses? • What security technologies and processes will provide the hightest return on investment over the next 5 years? • How can businesses balance protecting customer data with the need to increase revenue? The content for this session is instructional/tutorial in nature, with time for Q&A/Discussion at the end.

“Assessing Your Organization’s Cloud Presence – A Practical How-To” • Rafal Los, HP Today’s enterprise is entangled in the cloud in many different ways. Whether your employees bring their own cloud to work, or your developers push prototype applications into the cloud, or your corporate IT strategy calls for a hybrid public/private cloud approach – you’re invested in the cloud. Where are your biggest risks? Is your enterprise security and risk management strategy keeping up with what cloud brings in? The talk focuses on bringing your security and risk policies up-to-date to provide at least an audit-level assessment of your cloud risks, across your enterprise portfolio or users, services and systems.

“Advanced Persistent Response” • Tom Kellermann, Trend Micro Tom Kellermann, Vice President of Cybersecurity for Trend Micro and former member of the Commission on Cybersecurity for the 44th President will depict the evolution of the cyber threat landscape in 2012. His presentation will discuss the evolution of the underground economy in cyberspace, specifically illustrating the tactics which are being utilized to colonize our digital ecosystems and the correspondent risk management strategies which should be adopted in order to manage the scourge of advanced persistent threats.

“Breaking the Lifecycle of the Modern Threat” • Wade Williamson, ProSys/ Palo Alto Network attacks are becoming both more sophisticated and more common, with all types of enterprises and all types of information being targeted by attackers. In this presentation we will shine light on the lifecycle of a modern network attack, investigate real-world examples and discuss best practices required to find and stop threats both known and unknown in the enterprise.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.