Art Coviello is responsible for RSA's strategy and overall operations as it delivers EMC's global vision of information-centric security. Mr. Coviello was Chief Executive Officer of RSA Security, Inc. prior to its acquisition by EMC in 2006. He joined the company in 1995 and has been a driving force in its rapid growth since that time. Mr. Coviello's expertise and influence have made him a recognized leader in the industry, where he plays a key role in several national cyber-security initiatives. Mr. Coviello has spoken at numerous conferences and forums around the world. Mr. Coviello has more than 30 years of strategic, operating and financial management experience in high-technology companies. In addition, he currently serves on the Board of Directors at EnerNOC, a leader in demand response systems for energy conservation, and AtHoc, a leading provider of enterprise-class network-based mass notification systems for the security, life safety and defense sectors. Mr. Coviello graduated magna cum laude from the University of Massachusetts.
KEY-100 - 10:00 hrs.
Intelligence-Driven Security: The New Model
Abstract: Does anyone believe that perimeter defenses are enough to protect businesses today? With massive amounts of digital information, Bring Your Own Device, Cloud, Big Data and more, our perimeter is more porous and harder to defend. It's imperative to rethink security in a more balanced way, devoting additional resources to detection and response. Art Coviello will discuss how an Intelligence-Driven Security model that evaluates risk, security spend allocation, and skills of the security team can enable businesses to get ahead of the latest threats.
Tom Heiser is President of RSA, The Security Division of EMC, a position he has held since February 2011. With 3,000 employees worldwide, more than 30,000 customers, and more than 25 years in the industry, RSA is the acknowledged leader in information security and a vital component of EMC's strategy to help customers store, manage, protect, and analyze their most valuable asset—information—in a more agile, trusted and cost-efficient way.
In his role as President, Heiser oversees all aspects of RSA's business operations, including worldwide sales and services, channel strategy, product development, marketing, strategic business and financial initiatives, IT, and technical support. He joined RSA in July 2008 as Senior Vice President of Global Customer Operations and was promoted to COO in April 2010.
Prior to that, Heiser helped form EMC's Cloud Infrastructure and Services Division and was Senior Vice President and General Manager of the company's Centera Business Unit, launching a new storage category and making Centera one of EMC's fastest-growing product lines. He also served as EMC's Senior Vice President, Corporate Development and New Ventures, leading the team responsible for mergers and acquisitions, including the acquisition of RSA in 2006. Earlier in his career he served as the product manager for EMC's first storage system, Orion, predecessor of the company's industry-leading Symmetrix systems.
Heiser joined EMC upon college graduation in 1984, in the company's first sales-training class. Later that year, he opened EMC's first sales office in New York. In 1996, despite EMC's predominately direct sales model, Heiser established the company's first significant channel sales effort. Over the five years he ran the channel organization, sales grew from $8 million to more than $2 billion globally and the EMC partner network expanded to include resellers, VARs, ISVs, OEMs, and system integrators worldwide.
As EMC's fourteenth employee, Heiser is passionate about perpetuating the company's history and culture with employees. He earned his bachelor's degree in accounting information systems from the University of Massachusetts.
KEY-101 - 10:15 hrs.
Intelligence-Driven Security: In Action
Abstract: As the cyber threat environment continues to intensify, organisations are looking for new ways to protect their critical business systems and information. Tom Heiser will talk about why an Intelligence-driven approach to security is needed to improve attack detection and remediation, giving examples of what he's hearing from companies combating these real threats.
As group president of Enterprise Products andServices at Symantec, Francis deSouza leads product management, engineering, industry relations and operations for Symantec's enterprise security,information management, storage and availability management and managed security services solutions. Mr. deSouza joined Symantec through the company's acquisition of IMlogic in February 2006. At IMlogic, he was the founder and CEO, building the company into a recognized leader in the rapidly growing market for instant messaging security. Prior to founding IMlogic, Mr. deSouza served as product unit manager at Microsoft, founder and CEO of Flash Communications, management consulting and computer science researcher at IBM's TJ Watson Research Labs. Mr. deSouza holds a number of patents in computer security.
KEY-102 - 10:40 hrs.
The Art of Cyber War: Know Thy Enemy, Know Thyself
Abstract: With new weapons, new business models and new actors, cybercriminals continue to intensify their attacks against organisations of all sizes. How do we win in a world where they only have to be right once, but we have to be right every time? The answer is intelligence — about our adversaries, as well as our own organisations. Francis deSouza will reveal exclusive Symantec intelligence on new attack methods to help you better understand the threats you face. He’ll also discuss how applying intelligence about your own organisation will help you prevent more - and react less.
Adrienne Hall is General Manager of Microsoft’s Trustworthy Computing Group, where she leads a team of 50 IT professionals driving security and privacy improvements inside Microsoft and across the IT ecosystem. She directs response communications, security intelligence research, and advises on geo-political trust issues for the company. Hall also counsels senior leaders and customers on how to manage the changing nature of cybercrime, and integrates with law-enforcement and government agencies worldwide. She is a recognized speaker on security and privacy topics, frequently presenting on cloud computing trends and research, in addition to being a key contributor to the company’s Trustworthy Computing blog. A Microsoft leader and customer champion for 22 years, Hall received the Bill Gates’ Office of the President Award for Excellence, and numerous other awards and recognition from global organizations, including several from international law enforcement agencies for her collaboration on cybercrime. Hall is a graduate of the University of British Columbia and the Michael G. Foster School of Business at the University of Washington. She is a proud Canadian-American and mother of two.
KEY-103 - 11:10 hrs.
Risks and Rewards in Cloud Adoption
Abstract: Computing has changed. Society and computing are fully intertwined, making cyber threats and security a societal concern. With determined and persistent adversaries active on a global basis, the security community must continue to be diligent in the defense of computing and society. At the same time, it is clear that Cloud computing will play a key role in the future. While security concerns are frequently cited as a barrier to adoption, recent research is finding that when companies embrace and invest in cloud services, the benefits far outweigh previous concerns.
Join Adrienne Hall, General Manager, Trustworthy Computing as she shares Microsoft's latest security intelligence, cloud research and discusses new ways companies are identifying risks and developing a vendor-neutral model that helps identify specific IT benefits of Cloud adoption.
Dr. Herbert (Hugh) Thompson is Programme Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been interviewed by top news organisations including the BBC, CNN, MSNBC, Financial Times, Washington Post and others. He has been an adjunct professor at Columbia University in New York for the past few years where he taught courses on computer security.
KEY-104 - 11:40 hrs.
Securing the Human: Our Industry's Greatest Challenge
Abstract: Sophisticated adversaries are shifting from exploiting technical vulnerabilities to exploiting bad choices made by trusting employees. Security now rests precariously on the ability of people to make good choices – it’s the Achilles heel in any organisation. Attackers will always eventually find ways to game new technical defences; we need to turn users into allies, giving them the tools and the knowledge to make better choices. With real examples, this session takes a look at the depth of the problem, some innovative solutions, and opens a window into one of our industry’s greatest challenges: securing the human.
Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As CEO of Qualys, Mr. Courtot has worked with thousands of companies to improve their IT security and compliance postures. He received the SC Magazine Editor's Award in 2004 for bringing on demand technology to the network security industry and for co-founding the CSO Interchange to provide a forum for sharing information in the security industry. He was also named the 2011 CEO of the Year by SC Magazine Awards Europe. Mr. Courtot is a member of the board of directors for StopBadware.org and TechAmerica, and in 2012, he launched the Trustworthy Internet Movement, a nonprofit, vendor-neutral organization committed to resolving the problems of Internet security, privacy and reliability.
KEY-202 - 10:00 hrs.
Big Data: Big Threat or Big Opportunity for Security?
Abstract: IT Infrastructures are becoming increasingly complex and virtualized. Workload mobility, cloud computing and “bring-your-own-computer” are becoming the norm. These shifts are forcing organizations to aggregate more data and threatening to breach the IT safeguards constructed to keep corporate data secure. Using real-world examples that protect IT environments and ensure compliance, this session will explore these fundamental changes - and expose the most effective ways to deal with them.
Misha Glenny is an investigative journalist, author and broadcaster. He is one of the world's leading experts on cybercrime and on global mafia networks, and has written about his investigations in the recently published Dark Market.
Other books include McMafia, which was widely acclaimed for its dissection of criminal networks worldwide, and led to a 2009 TED Talk on the subject. He contributes regularly to the Guardian, Observer, The New York Times and New York Review of Books.
He is informally consulted on a regular basis by the British Foreign Office, the US State Department and the British Army. He is also a regular keynote speaker at conferences on organized crime, globalization, south-eastern Europe and US-Europe relations, and in 2012 was a Visiting Professor at Columbia University’s Harriman Institute.
KEY-203 - 10:30 hrs.
The Struggle for Control of the Internet
Abstract: The genius of the Internet lies in its interconnectedness. But this is also its Achilles’ heel: everyone wants to take control of it at the expense of everyone else. Our dependency on network systems are growing, but our resilience is not keeping up. Law enforcers, spies, and the military now believe it is central to their security strategies. So do criminals, terrorists and hacktivists. Where does this leave the citizen?
Joshua Corman is the Director of Security Intelligence for Akamai Technologies and has more than a decade of experience with security and networking software. Most recently he served as Research Director for Enterprise Security at The 451 Group following his time as Principal Security Strategist for IBM Internet Security Systems. Mr. Corman’s cross-domain research highlights adversaries, game theory and motivational structures. His analysis cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting incentives.
Mr. Corman is a candid and highly-coveted technical and keynote speaker with engagements at leading industry events such as RSA, DEFCON, Interop, ISACA, and SANS. As a staunch advocate for CISOs, Mr. Corman also serves as a Fellow with the Ponemon Institute, on the Faculty for IANS, and co-founded Rugged Software – a value-based initiative to raise awareness and usher in an era of secure digital infrastructure. His passion for challenging the status quo won him the title of Top Influencer of IT by NetworkWorld magazine in 2009. Mr. Corman received his bachelor’s degree in philosophy, graduating Phi Beta Kappa and summa cum laude, from the University of New Hampshire. He resides with his wife and two daughters in New Hampshire.
Mr. Corman can be found on twitter @joshcorman and on his blog at http://blog.cognitivedissidents.com.
KEY-204 - 11:00 hrs.
"Are We Getting Better?" Why We Don't Know. What We Can Do About It.
Abstract: "Are we getting better?" So simple; yet our best can't answer. How would we know? For too long we've focused on activity over effect, symptoms over root causes, easy problems over important ones. We can wearily accept defeat or fight smarter. After a decade of digging deeper & exploring the edges of the map, I'll share what I've found to be of greatest consequence to maturing our industry.
Bruce Schneier is an internationally renowned security technologist, referred to by The Economist as a "security guru." Mr. Schneier is the author of nine books - including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography - as well as hundreds of articles and essays, and many more academic papers. His influential newsletter "Crypto-Gram," and his blog "Schneier on Security," are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. He is the Chief Security Technology Officer of BT.
KEY-205 - 11:30 hrs.
Trust, Security, and Society
Abstract: Human societies run on trust. Every day, we all trust millions of people, organizations, and systems -- and we do it so easily that we barely notice. But in any system of trust, there is an alternative, parasitic, strategy that involves abusing that trust. Ensuring defectors don't destroy the very cooperative systems they're abusing is an age-old problem. So society has developed a variety of pressures to induce cooperation: moral systems, reputational systems, institutional systems, and security systems. Understanding how these different societal pressures work -- and fail -- is essential to understanding the problems we face in today's increasingly technological and interconnected world.
Ranked by Forbes Magazine as a “Web Celeb”, Jimmy Donal Wales is a U.S. Internet entrepreneur, wiki pioneer, and technology visionary, who is best known as the Founder of Wikipedia, an international collaborative free content encyclopedia on the Internet, and the Wikimedia Foundation. He is co-founder of Wikia, a privately owned free web hosting service he set up in 2004.
Mr. Wales is a Fellow of the Berkman Center for Internet & Society at Harvard Law School. He serves on the Board of Directors of Socialtext, a provider of wiki technology to businesses and the non-profit organization Creative Commons. Mr. Wales has received an honorary doctorate from Knox College of Illinois and was presented with a Pioneer Award from the Electronic Frontier Foundation in 2006.
Mr. Wales received his bachelor's degree in finance from Auburn University and started with the Ph.D. finance program at the University of Alabama, where he left with a Master's. After that, he took courses offered in the Ph.D. finance program at Indiana University. He taught at both universities during his postgraduate studies, but did not write the doctoral dissertation required to earn a Ph.D.
From 1994 to 2000, Mr.Wales was the research director at Chicago Options Associates, a futures and options trading firm in Chicago.
KEY-310 - 3:40 hrs.
Democracy and the Internet
Abstract: Freedom of speech and the distribution of knowledge is the foundation of Wikipedia. Mr. Wales predicts that the Internet will democratise developing countries by making the world ‘flat,’ opening markets, promoting cultural understanding, and giving developing nations the resources they need to compete in the 21st century. With current total Internet usage of one billion people set to double in the next five to 10 years (with the majority of new users arising from developing nations), Mr. Wales asserts that the Internet will combat stereotypes, censorship, media control, and monopolies while simultaneously allowing citizens of developing nations to have a more prominent voice. As Mr. Wales states: "It does not take a lot of technology to foster open dialog and debate. Even the simplest technologies like mailing lists, wikis, blogs can help a lot. What is needed mostly, I think, is more content in local languages, and support from people around the world to help others join in the global conversation."