Rock Stars of Cybersecurity



Attack the Hackers!  The Industry’s Must Attend Premier Event on Innovative Security Solutions

 

From Heartbleed to Black-shades, cybersecurity attacks pose a serious threat to every company. It takes big guns to combat them. Fight back with Rock Stars of Cybersecurity. A single action-packed day of hearing from the leaders on what’s coming and what to do about it. Hands-on solutions, case histories, networking, food, exhibits, and more!

 

Never has so much security talent been gathered in one place at one time —all focused on solving your problems:

 

• Securing your business operations against the threats

• Balancing effective cybersecurity with privacy

• Implementing a secure enterprise architecture

• Big data and security analytics

• The impact of the skills shortage on security

• Much more

 

This Event Will Sell Out. Register Today.

Speaker and Presenter Information

Security Frameworks, Strategies, & Mitigation Efforts: Will They Lower Your Risk?

Peter Allor

Peter Allor
Cyber Security Strategist - Federal
IBM

Governments worldwide are looking to secure not only their environments, and include critical infrastructures and the private sector supply chains that keep government domains operating. Needed is a focused approach on how to secure these entities via risk-management processes for business operations and moving Information Technology away from traditional best-of-breed point product approaches used to offset new attacks and vulnerabilities. This non-regulatory approach differs from traditional compliance checklists and helps focus on the strategy of the business, transforming security from a 'Doctor No' blocking to a security posture enabling business operations. I will discuss how security professionals can lead the business to a more secure process.

 

Security and Government

Peter Fonash

Peter Fonash
Chief Technology Officer
US Department of Homeland Security

 

Security in the Aerospace Industry

Peder Jungck

Peder Jungck
Vice President and Chief Technology Officer
BAE

 

Scaling a Software Security Initiative: Lessons from the BSIMM

Gary McGraw

Gary McGraw
Chief Technology Officer
Cigital

Learn important lessons in scaling software security touchpoints, and making them work efficiently and effectively in a global software security initiative. The talk will focus on the top three touchpoints—code review with a static analysis tool, architectural risk analysis, and penetration testing—discussing the tools, technology, people, and processes for each. The issues will be addressed head on, using examples from the 70+ Building Security in Maturity Model (BSIMM) firms and many years of real-world experience. (Firms in the BSIMM include, Adobe, Aon, Bank of America, Box, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, F-Secure, Fannie Mae, Fidelity, Google, Intel, Intuit, JPMorgan Chase & Co., Mashery, McKesson, Microsoft, Nokia, Nokia Siemens Networks, QUALCOMM, Rackspace, Salesforce, Sallie Mae, SAP, Scripps Networks, Sony Mobile, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, Visa, VMware, Wells Fargo, and Zynga.)

 

Building Security into Payment Systems and Applications

Sarath Geethakumar

 

Sarath Geethakumar
Senior Director – Global Information Security

VISA

 
Rapid technology changes are forcing payment systems and solutions to constantly evolve. With global mobile adoption now at 91 percent, interconnected consumer devices and applications must perform faster and handle more complex and more critical functionalities. This evolution not only paves way for new and improved solutions but also makes them lucrative and easy targets for attackers. Security as a development afterthought is not a scalable or secure approach for supporting this rapidly evolving ecosystem. Security is no stronger than its weakest link. Hence, building security into development methodologies ensures that even the weakest links can be secured in a timely and cost-effective manner. This presentation explores how to build security into applications to ensure better, reliable, and scalable solutions. Secure software development, when tailored to integrate into new and evolving agile methodologies, ensures a better and more secure software assurance model as opposed to traditional post-development assurance approaches.

 

Security 2020: Predictable, Sensible, and Preemptive

Brett Wahlin

 

Brett Wahlin
Chief Information Security Officer

HP

 
Hardly a day goes by without yet another report of a security breach or cyberattack: they are increasing constantly in frequency, ferocity, and stealth. And they can result in significant loss of revenues and reputation for organizations and even destabilize governments. Brett Wahlin will deconstruct the current security paradigm vis-a-vis today's business risk-centric environments, articulate the precept of a predictive behavior-based capability, and, round it off with in-use discussion on HP's security solutions. He will end with a Q&A session aimed at answering your security concerns and apprehensions.

Expected Number of Attendees

400

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, Dept of Homeland Security, Dept of State, Dept of Transportation, Dept of Treasury, USPS, NASA, State Government, County Government, City Government, Municipal Government, CIA, Coast Guard

View Exhibitor/Sponsorship Details


When
Wed, Sep 24, 2014, 8:00am - 5:00pm


Cost

Non-Member:  $399.00
Member:  $329.00


Where
Brazos Hall
204 E 4th St
Austin, TX 78701
Get directions


Website
Click here to visit event website


Organizer
IEEE Computer Society


Contact Event Organizer



Return to search results