Conference Tracks

  • Application Security

    Given the increasing use of web and cloud computing applications, Application Security focuses on topics such as secure design, development, implementation and operation of packaged and custom-developed applications. This track will cover current threats and preventive measures.

  • Breaking Research

    This half-track is dedicated to the hottest research and most pressing threats from the top researchers in the field.

  • Data Security & Privacy

    Data Security covers strategies and technologies to classify, track and protect data. Sessions include database security, data classification, encryption/tokenization, DLP and new threats to sensitive data. Privacy issues, big data trends, regulations and strategies are key to this track.

  • Discussion Group

    Interested in up-to-the minute information from your colleagues? Discussion Group sessions enable groups of no more than 22 people that share a common interest to come together and productively explore a specific security topic.

  • Governance, Risk & Compliance

    This track includes sessions on risk management frameworks and how to better quantify and manage risk. You will also find session on the latest compliance-related standards such as PCI, Sarbanes Oxley and others. Sessions on governance will cover how to effectively communicate and enforce policies and standards in the enterprise.

  • Hackers & Threats

    Hackers and Threats sessions include discussions about the underground economy, advanced threats, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these problems. The second track is technically advanced and will include live demos and code dissection.

  • Hackers & Threats Advanced

    Hackers & Threats Advanced

  • Identity & Access Management

    This half track will cover the processes, technologies and policies for managing digital identities, their authentication, authorization, roles and privileges/permissions within or across system and enterprise boundaries and controlling how identities can be used to access resources.

  • Keynotes

    Keynote presentations by industry leaders.

  • Mobile Security

    Mobile Security will focus on policies, processes and technologies for managing employee-owned devices/BYOD programs, smartphone/tablet security and consumerization trends. This track has sessions on mobile malware, application threats, device management and emerging threats to mobile platforms.

  • Policy & Government

    Cyber security is a national and economic security issue. Governments are developing strategies that affect public/private sector security professionals. This track includes legislation, military/law enforcement initiatives, APTs, active defense, critical infrastructure and the role of government.

  • Professional Development

    Professional Development covers individuals’ technical and business/management training, credentialing and career development, as well as staff and personnel management. This track is scheduled on Monday.

  • Sponsor Case Study

    Sponsor Case Study

  • Strategy & Architecture

    Strategy & Architecture

This document was retrieved from on Tue, 25 Jun 2019 07:43:14 -0400.