BostonInfoSecForum 2014 Oct. 7, 2014 to Oct. 8, 2014, boston,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Making Identity the New Perimeter | Ron Ritchey | In the age of distributed computing, existing corporate boundaries fall by the wayside as corporate ... | |
Data Security in the Cloud: Security Best Practices for IaaS, PaaS and SaaS Deployments | Ed Moyle | What are the technical, operational and contractual strategies you should pursue to safeguard corporate data ... | |
Encryption: The Best Tools, Techniques and Key Management Strategies | Adam Ely | Encryption is an indispensable, cheap tool for protecting corporate data, but what encryption techniques work ... | |
Application Security: Making It Work | Kevin Johnson | Application security continues to receive short shrift by too many information security executives. How do ... | |
DLP: Time to Stick a Fork in It? | Ed Moyle | Data Loss Prevention has been around for years, but organizations still struggle with getting adequate ... | |
Fight Advanced MalwarE Track | David Etue | Best Practices in Advanced Malware Mitigation With traditional antivirus making a poor showing with regard ... | |
Setting Priorities: Identifying Adversaries That Pose the Greatest Threat | Ron Ritchey | Who poses the greatest threat to your organization? Nation-states? Competitors? Organized crime? Hacktivists? Disgruntled employees? ... | |
Bad Actors I: Finding Them on the Network | Marcus J. Ranum | What are the main indicators of compromise (IOC)? How can we share IOCs in an ... | |
Bad Actors II: Reducing Hacker Dwell Time | Marcus J. Ranum | How do you deploy Lockheed Martin’s Cyber Kill Chain Process within your organization? | |
From Active Defense to Agile Security: What We Can Do Today | Marcus J. Ranum | Gallons of ink and rooms of hot air have been expended on the topic of ... | |
Getting a Handle on ‘Shadow IT’ | Kevin Johnson | Forbes reports 40% of corporate IT spend is now outside of the CIO’s control. What ... | |
Virtualization Is Everywhere – Now What? | David Etue | Virtualization now underpins every data center, but it’s receiving too little attention from information security. ... | |
Securing Cloud Deployments | David Etue | Data shows that most organizations utilize more than one cloud service provider, but many of ... | |
MDM: Controlling the Data | Adam Ely | In the heterogeneous world of mobile devices, what combination of policy and technology should control ... | |
BYOD: Controlling the Risks | Kevin Johnson | BYOD is here to stay. What is the best way to provide the benefits of ... | |
Regain Control Track | Mike Rothman | Data Overload: Getting a Handle on Configuration, Vulnerability and Enterprise Data How do you effectively ... | |
Security Intelligence: Creating a Custom Threat Feed | Marcus J. Ranum | The information security market is flooded with generic, new third-party intel feeds. How do you ... | |
Moving from Log Management to Network Intelligence | Mike Rothman | What is actually happening on your network? Existing networking monitoring tools don’t deliver a clear ... | |
ImPROve visibility track | Mike Rothman | Compliance Does Not Equal Security: Doing Both on One Budget How do you ensure investments ... | |
Security Awareness: Measuring Success | Adam Ely | What are the biggest risks to your organization and how do you develop awareness campaigns ... | |
tHINK bUSINESS TrackCompliance Does Not Equal Security: Doing Both on One Budget | George Gerchow | How do you ensure investments in compliance also lead to an improved enterprise security posture? ... |