BostonInfoSecForum 2014 Oct. 7, 2014 to Oct. 8, 2014, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Making Identity the New Perimeter Ron Ritchey In the age of distributed computing, existing corporate boundaries fall by the wayside as corporate ...
Data Security in the Cloud: Security Best Practices for IaaS, PaaS and SaaS Deployments Ed Moyle What are the technical, operational and contractual strategies you should pursue to safeguard corporate data ...
Encryption: The Best Tools, Techniques and Key Management Strategies Adam Ely Encryption is an indispensable, cheap tool for protecting corporate data, but what encryption techniques work ...
Application Security: Making It Work Kevin Johnson Application security continues to receive short shrift by too many information security executives. How do ...
DLP: Time to Stick a Fork in It? Ed Moyle Data Loss Prevention has been around for years, but organizations still struggle with getting adequate ...
Fight Advanced MalwarE Track David Etue Best Practices in Advanced Malware Mitigation With traditional antivirus making a poor showing with regard ...
Setting Priorities: Identifying Adversaries That Pose the Greatest Threat Ron Ritchey Who poses the greatest threat to your organization? Nation-states? Competitors? Organized crime? Hacktivists? Disgruntled employees? ...
Bad Actors I: Finding Them on the Network Marcus J. Ranum What are the main indicators of compromise (IOC)? How can we share IOCs in an ...
Bad Actors II: Reducing Hacker Dwell Time Marcus J. Ranum How do you deploy Lockheed Martin’s Cyber Kill Chain Process within your organization?
From Active Defense to Agile Security: What We Can Do Today Marcus J. Ranum Gallons of ink and rooms of hot air have been expended on the topic of ...
Getting a Handle on ‘Shadow IT’ Kevin Johnson Forbes reports 40% of corporate IT spend is now outside of the CIO’s control. What ...
Virtualization Is Everywhere – Now What? David Etue Virtualization now underpins every data center, but it’s receiving too little attention from information security. ...
Securing Cloud Deployments David Etue Data shows that most organizations utilize more than one cloud service provider, but many of ...
MDM: Controlling the Data Adam Ely In the heterogeneous world of mobile devices, what combination of policy and technology should control ...
BYOD: Controlling the Risks Kevin Johnson BYOD is here to stay. What is the best way to provide the benefits of ...
Regain Control Track Mike Rothman Data Overload: Getting a Handle on Configuration, Vulnerability and Enterprise Data How do you effectively ...
Security Intelligence: Creating a Custom Threat Feed Marcus J. Ranum The information security market is flooded with generic, new third-party intel feeds. How do you ...
Moving from Log Management to Network Intelligence Mike Rothman What is actually happening on your network? Existing networking monitoring tools don’t deliver a clear ...
ImPROve visibility track Mike Rothman Compliance Does Not Equal Security: Doing Both on One Budget How do you ensure investments ...
Security Awareness: Measuring Success Adam Ely What are the biggest risks to your organization and how do you develop awareness campaigns ...
tHINK bUSINESS TrackCompliance Does Not Equal Security: Doing Both on One Budget George Gerchow How do you ensure investments in compliance also lead to an improved enterprise security posture? ...