Sessions in this track will focus on topics related to the secure development, implementation and operation of package and custom developed applications, whether they are legacy, Web-based, or other (e.g., peer-to-peer). This track will also include sessions related to applied cryptography.
Business of Security
Non-implementation issues about the security industry, such as strategic trends, financing (e.g., VC investment in security start-ups) and broad service offerings such as auditing and systems integration will be discussed in this track.
Sessions in this track cover strategies, practices, and technologies to classify, track, and protect sensitive data. Learn about security of data in the cloud, developments in Data Leakage Prevention (DLP), new threats to sensitive data, and managing data strategically across the enterprise, with partners, with outsourcers and with users.
Governance, Risk and Compliance – new
This track includes talks on risk management frameworks and how to better quantify and manage risk. You will also find compliance-related sessions on standards such as PCI, Sarbanes Oxley and others. Sessions on governance cover how to effectively communicate and enforce policies and standards in the enterprise.
Hackers and Threats
Hackers and Threats sessions are technically advanced and include discussions about social engineering (spam, phishing, pharming, etc.), vulnerabilities and/or exploits that are in the wild. These two tracks also cover security research that is pushing the boundaries of IT Security. You will find sessions on the underground economy, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems.
Sessions focus on late breaking news, events, and/or revelations just prior to the Conference to ensure that information presented is as current as possible.
Network & Mobile Security
This track focuses on two important areas of security: the security of the network infrastructure and the mobile devices that form the edges of the enterprise. In this track you'll find sessions on network monitoring, intrusion prevention, firewalls, new threats to networks, information on DoS and DDoS attacks, and other emerging issues in network security. This track also covers mobile security including management of mobile devices, mobile malware, and how consumerisation impacts mobile security.
Policy and Government – new
Policies and requirements promulgated by government entities impact information security in both the public and private sector. Topics in this track include current and emerging regulations, legislation, national security, law enforcement, privacy and government procurement issues.
Learn about individuals' technical and business/management training and career development, as well as staff and personnel management in the Professional Development track.
Sponsor Case Studies
Learn innovative best practices from case studies based on successful strategies, delivered and discussed by leading edge companies.
Strategy and Architecture
This track will cover architectural and strategic planning considerations for the deployment of security-enabled technologies, as well as trends in emerging technologies, aligning security to other business units, and security metrics. You'll hear about research, implementation and deployment of solutions for identity management, enterprise rights management, forensics, and other enterprise security-related issues, as well as vulnerability assessments and penetration testing. Sessions will also cover cloud computing security and the security aspects of virtualization.