Sessions and Events

Tuesday, February 25, 2014

Wednesday, February 26, 2014

Thursday, February 27, 2014

  • Using Automated Cyber Threat Exchange to Turn the Tide against DDOS

    • 8:00am – 9:00am | West | 3022 | ANF-R01

    The FS ISAC, the IT sector and the Federal Government have been working together to detect, prevent and mitigate the impact of DDOS attacks by leveraging the automated exchange of actionable cyber…

    Conference Track:
    Peter Fonash - Chief Technology Officer for the Department of Homeland Security’s Cybersecurity and Communications Office, DHS
    Joseph Demarest - Assistant Director, Federal Bureau of Investigation
    Mark Clancy - Managing Director, CISO Technology Risk Management, DTCC, CEO, Soltra
    Phyllis Schneck - Deputy Under Secretary for Cybersecurity and Communications, Department of Homeland Security, National Protection and Programs Directorate
    Richard Struse - Chief Advanced Technology Officer, Department of Homeland Security
  • Security by and for the People!

    • 9:20am – 10:20am | West | 3022 | ANF-R02

    Security by and for the people! Data protection and security awareness have amped up by enlisting our end users to protect enterprise data and IP. Hadoop-enabled Big Data system sends weekly…

    Conference Track:
    Joshua Davis - Sr Dir, IT, Qualcomm
    Leslie Lambert - Chief Security and Strategy Officer, GuruCul Solutions
  • Hunting for OS X Rootkits in Memory

    • 10:40am – 11:40am | West | 3022 | ANF-R03

    The OS X Kernel has been increasingly targeted by malicious players due to the shrinking attack surface. This presentation will include demonstrations and discuss attacks, such as function inlining, …

    Conference Track:
    Cem Gurkok - Threat Intelligence Research and Development Manager, Verizon Terremark
  • A Human Factor Interface for SIEM

    • 12:00pm – 12:20pm | West | 3022 | ANF-R04A

    By correlating security log data from security devices with other security-related information, SIEM provides means to discover blended threats. But the systems do not provide sensors to observe…

    Conference Track:
    Bettina Wesselmann - Information Security Communications Consultant, Freelancer
    Johannes Wiele - Senior Security Consultant, Trustwave Deutschland GmbH

Friday, February 28, 2014

This document was retrieved from on Sat, 28 Nov 2015 00:53:17 -0500.
© 2015 EMC Corporation. All rights reserved.