New England Information Security Forum 2012 Oct. 3, 2012 to Oct. 4, 2012, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Information Protection: Who Youre Up Against Aaron Turner , David Etue For many years, information security professionals have been tasked with defending against nameless and faceless ...
Getting Mileage from Audit and Logging Alex Hutton , Marcus Ranum Your system and audit logs are about as exciting as watching paint dry... until you ...
Security Awareness: Deal or No Deal? Kevin Johnson , Dave Shackleford Security awareness programs are very common in most organizations, but do they work? Despite these ...
Data Security Exposure: Avoid Getting Thrown Under the Liability Bus Randy Sabett , Mike Saurbaugh This session will examine the liability, governance, risk, and compliance issues that organizations are facing. ...
Identity in the Cloud Diana Kelley , Ed Moyle This session attendees will discuss identity challenges in the cloud, how organizations can get started ...
Information Exfiltration: Where Does All the Data Go? Aaron Turner , David Etue This session is designed to help turn your infosec model inside out. We will discuss ...
What About Metrics? Alex Hutton , Marcus Ranum 99.4% of security metrics are useless because they arent tied to anything that makes sense ...
The Next Generation Security Operations Team Kevin Johnson , Dave Shackleford What does a security operations team look like todayand what will it look like tomorrow? ...
Tricks and Tips for Data Breach Response Randy Sabett , Mike Saurbaugh Teams involved with data breach response know the wearying process of performing triage on a ...
AppSec: Establishing Real-World Value Diana Kelley , Ed Moyle This session we will define the real-world value of building security into the AppDev lifecycle ...
The IANS Mobile App Lessons Learned & Best Practices for Moving Forward Aaron Turner The first version of the IANS mobile app left even a very security-focused organization vulnerable. ...
Whats Your Threat IQ? Marcus Ranum Where do you get threat intelligence? What are some of the sources of your data ...
Socially Engineering Your Way to Better Security Dave Shackleford Social engineering is one of the top avenues of exploitation attackers use to compromise your ...
Cloud Security Contract Primer Randy Sabett It goes without saying that security in the cloud keeps many security managers up at ...
All I Ever Needed to Know about Identity I Learned from Social Networking Diana Kelley , Ed Moyle Large-scale social networks have many of the same challenges enterprises do, including the need to ...
Information Everywhere: Mobile Technology & Its Impact on Infosec Aaron Turner , David Etue There isnt an infosec group that hasnt been dealing with the proliferation of mobile devices. ...
Malware Response Alex Hutton , Marcus Ranum If you havent had to do a malware response yet youre probably unaware of whats ...
Exploring Managed Security Services and Security-as-a-Service Kevin Johnson , Dave Shackleford For years, MSSPs and other security services have been viable options for organizations looking to ...
Big Data, Big Law, Big Worries? Randy Sabett , Mike Saurbaugh Big data is the latest security buzz phrase to raise hopes, questions, and fears all ...
Economics of Identity Diana Kelley , Ed Moyle This session will focus on sharing experiences, challenges, and strategies for how to realistically understand ...