Sessions and Events

Tuesday, February 25, 2014

  • Response Plan Fitness: Exercise, Exercise, Exercise!

    • 1:20pm – 1:40pm | West | 2020 | STR-T07A

    An incident response plan is worthless if it's shelf art. We'll use a case study of actual and cyber event exercises to illustrate how to plan for, design and implement an effective and valuable cyber…

    Conference Track:
    David Matthews - CISSP, CISM, DRFS, CSFA Consulting & Professional Services, MK Hamilton and Associates
  • Security PR 101

    • 2:00pm – 2:20pm | West | 2020 | STR-T07B

    While large organizations have the capital and man-power to prepare a Public Relations (PR) plan to combat a cyber attack, smaller companies can find themselves in potentially damaging PR situations…

    Conference Track:
    James Rivas - Head of Global Corporate Communications, Check Point Software Technologies
  • Anatomy of a Data Breach: What You Say (or Don’t Say) Can Hurt You

    • 2:40pm – 3:40pm | West | 2020 | STR-T08

    Every breach response plan looks good on paper, but what about when it’s time for action? Breaches are an everyday part of business. What are the critical dos and don’ts for post-breach…

    Conference Track:
    Tom Field - Vice President Editorial, Information Security Media Group
    Alan Brill - Senior Managing Director, Kroll
    Michael Bruemmer - Vice President, Experian Data Breach Resolution
    Ronald Raether - Partner, Faruki Ireland & Cox P.L.L.
  • Inflection: Security's Next 10 Years

    • 4:00pm – 5:00pm | West | 2020 | STR-T09

    We are now deep in the early edge of a major inflection point in security. Not one based merely on evolving threats or new compliance regimes, but a fundamental transformation of the practice of…

    Conference Track:
    Rich Mogull - Analyst & CEO, Securosis

Wednesday, February 26, 2014

Thursday, February 27, 2014

Friday, February 28, 2014

  • Eight Conflicts Which Changed Cyberspace

    • 9:00am – 10:00am | West | 2020 | STR-F01

    The history of cyber conflict has been long ignored, leading us to make repeated mistakes. Not only does cyberspace have a recognizable 26-year history, it is rich with lessons applicable for…

    Conference Track:
    Jason Healey - Senior Research Scholar, Columbia University’s School for International and Public Affairs
  • A CISO's Perspective: Protecting with Enhanced Visibility and Response

    • 10:20am – 11:20am | West | 2020 | STR-F02

    Most organizations are heavily focused on building taller wider walls thinking they can keep the adversaries out, but this is clearly not proving to be a successful strategy. There is obviously a need…

    Conference Track:
    Jay Leek - Chief Information Security Officer, Blackstone
  • The Role of a Cyber Mercenary

    • 11:40am – 12:00pm | West | 2020 | STR-F03A

    Focusing on the evolution of information warfare specialists and their increasingly valuable role within mercenary organizations, we will examine requisite skills needed to conduct protective…

    Conference Track:
    Gunter Ollmann - Chief Technical Officer, NCC Group

This document was retrieved from on Mon, 30 Nov 2015 01:13:18 -0500.
© 2015 EMC Corporation. All rights reserved.