Sessions & Workshops

Tuesday, February 26, 2013

Wednesday, February 27, 2013

Thursday, February 28, 2013

  • Hunting for Indicators of Compromise

    • 8:00am – 9:00am | Room 309 | END-R31

    Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers…

    Conference Track:
    Lucas Zaichkowsky - Enterprise Defense Architect, Resolution1 Security
  • Actionable Intelligence for the Enterprise

    • 9:20am – 10:20am | Room 309 | END-R32

    Building a cyber intelligence team for your organization? Then leverage that team to support tactical and strategic organizational decisions. Real world examples and use cases demonstrate ways to…

    Conference Track:
    Cary Moore - Senior Vice President, Emerging Threats Manager, Bank of America
  • Just In Time Security: Difficulty of Being Proactive in Cyber Environments

    • 10:40am – 11:40am | Room 309 | END-R33

    This panel will discuss how the explosion in the number of web and mobile apps has made proactively identifying threats infeasible. Because of this, organizations are finding it is more economical to…

    Conference Track:
    Gabriela Iruegas - Co-founder and Chief Visionary, Silver Tail Systems
    Jeremiah Grossman - Founder, WhiteHat Security
    Laz Lazarikos - Chief Information Security Officer, Sears Online
    Michael Fowkes - Senior Vice President, Fraud Prevention and Security Analytics, Zions Bancorporation
  • Special Operations Tactics Applied to BYOD Defense

    • 1:00pm – 1:20pm | Room 309 | END-R35A

    This session focuses on specific communications tactics culled from the speakers 14 years of experience in the SEAL Teams, which included eight years at SEAL Team 6. Bring Your Own Device issues are a…

    Conference Track:
    Mike Janke - Chief Executive Officer, Silent Circle
  • Advanced Malware Sinkholing

    • 1:40pm – 2:00pm | Room 309 | END-R35B

    With the rise of advanced botnets, Sink-holing is a tactic to disable sections of these networks and gain insight into the operations and objectives of the Threat Actor’s. The Dell SecureWorks Counter…

    Conference Track:
    Joe Stewart - Director of Malware Research, Dell SecureWorks
    Silas Cutler - Security Researcher, Dell SecureWorks

Friday, March 1, 2013

This document was retrieved from on Fri, 29 Apr 2016 02:04:12 -0400.
© 2016 EMC Corporation. All rights reserved.