AtlantaInfoSecForum 2014 Nov. 10, 2014 to Nov. 11, 2014, Atlanta,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Making Identity the New Perimeter John Strand In the age of distributed computing, existing corporate boundaries fall by the wayside as corporate ...
DLP: Getting the Most Bang for Your Buck Marcus J. Ranum Data Loss Prevention has been around for years, but organizations still struggle with getting adequate ...
Encryption: The Best Tools, Techniques and Key Management Strategies Aaron Turner Encryption is an indispensable, cheap tool for protecting corporate data, but what encryption techniques work ...
Data Security in the Cloud: Security Best Practices for IaaS, PaaS and SaaS Deployments Dave Shackleford What are the technical, operational and contractual strategies you should pursue to safeguard corporate data ...
Application Security: Making It Work Kevin Johnson Application security continues to receive short shrift by too many information security executives. How do ...
Fight Advanced MalwarE Track David Etue Setting Priorities: Identifying Adversaries That Pose the Greatest Threat Who poses the greatest threat to ...
Best Practices in Advanced Malware Mitigation John Strand With traditional antivirus making a poor showing with regard to advanced malware mitigation, what approach ...
Bad Actors I: Finding Them on the Network Marcus J. Ranum What are the main indicators of compromise (IOC)? How can we share IOCs in an ... IncludeThinkstScapes
Bad Actors II: Reducing Hacker Dwell Time Marcus J. Ranum How do you deploy Lockheed Martin’s Cyber Kill Chain Process within your organization?
From Active Defense to Agile Security: What We Can Do Today Mike Rothman Gallons of ink and rooms of hot air have been expended on the topic of ...
Getting a Handle on ‘Shadow IT’ Kevin Johnson Forbes reports 40% of corporate IT spend is now outside of the CIO’s control. What ...
MDM: Controlling the Data Aaron Turner In the heterogeneous world of mobile devices, what combination of policy and technology should control ...
Securing Cloud Deployments David Etue Data shows that most organizations utilize more than one cloud service provider, but many of ...
BYOD: Controlling the Risks Aaron Turner BYOD is here to stay. What is the best way to provide the benefits of ...
Virtualization Is Everywhere – Now What? Dave Shackleford Virtualization now underpins every data center, but it’s receiving too little attention from information security. ...
Regain Control Track Dave Shackleford DataData Overload: Getting a Handle on Configuration, Vulnerability and Enterprise Data How do you effectively ...
Moving from Log Management to Network Intelligence Mike Rothman What is actually happening on your network? Existing networking monitoring tools don’t deliver a clear ...
Security Intelligence: Creating a Custom Threat Feed Dave Shackleford The information security market is flooded with generic, new third-party intel feeds. How do you ...
ImPROve visibility track Kevin Johnson Security Awareness: Measuring Success What are the biggest risks to your organization and how do ...