RochesterSecuritySummit 2014 Oct. 7, 2014 to Oct. 8, 2014, rochester,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Adapting to the New Realities of Cybersecurity (Forsythe) Seth M. Arbital Cybersecurity is more than an IT challenge—it’s a business imperative. Cyber attackers continuously seek new ...
vCISO: Can’t Afford a Chief Information Security Officer (CISO)? You Can Rent One! (ePlus) Neil Buckley Information and risk management can be the most complicated undertakings of any business. These two ...
Defending Against Today’s Advanced Threats (iSecure) Paul Griswold Today’s cybercriminals are smart, well-organized, and patient. They will go to extreme lengths to penetrate ...
A Complete Lifecycle Approach to Advanced Threat Protection (BlueCoat) Paul Griswold Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, ...
Adaptive threat prevention and containment with McAfee Threat Intelligence Exchange (McAfee) Christopher Newman Christopher Newman will be presenting our latest solution from McAfee that allows you to deliver ...
True Endpoint Threat Prevention – Too Good to Be True? (Palo Alto) Greg Morris Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from identification to pure ...
Security Beyond Borders – The Shifting Threat Landscape Jason Woodson The rise of borderless capabilities overwhelms and breaks the implementation of traditional security controls. The ...
Using X-Force Research and the IBM Security Framework for Security Transformation Diana Kelley IBM X-Force monitors the latest threats including vulnerabilities, exploits and active attacks, viruses and other ...
From OpenSSL to Amazon: A survey of whom we trust, with what, and why David Frier A survey of trust that IT users and organizations give over to a wide variety ...
The Evolving Threat Landscape Mike Larmie Malware and other threats have created an entire economy for cybercriminals; in today’s world, the ...
Bring a Cannon to a Gunfight: The Incident Response Go-Bag Reg Harnish Money is missing, malware is exploding and the clock is ticking. In the new cyber ...
Building a Software Security Program Kuai Hinojosa The proliferation of applications of all types continues unabated. As organizations put more of their ...
Dissecting Zeus Nick Bilogorskiy Zeus, one of the stealthiest advanced malware, has ruled the world of botnets and still ...
Understanding and Mitigating Low Level Vulnerabilities Jared Demott A decade+ ago, attackers would exploit a vulnerable server in the DMZ and use that ...
The Explosion of Phishing – How to Avoid Being Caught! Mark Villinski As cybercrime rates continue to explode so too does the popularity of phishing attacks. In ...
Emerging Cloud and Mobile Computing Threats and How to Respond Larry Hessney , Randy Magiera With the ever growing and changing threat landscape around Cloud and Mobile Computing, companies need ...
Endpoint Security Leo Barella This presentation will focus on the new security threats generated by the ever growing adoption ...
Cloud Security Jozef Krakora While many organizations advertise that their cloud hosting environments are very secure and compliant with ...
Outside the Perimeter: Practical Approaches to Managing and Securing Corporate Resources Outside of Your Corporate Perimeter Michael Miller Warren Buffett’s famous aphorism could be applied to cyber resilience planning: ”When the tide goes ...
Armed to the Teeth Tom Bard All of the software and hardware purchased today have security features associated with them in ...
Fear and Loathing in your Digital Wallet Gary Braglia We are still relatively early in the game for the world of digital wallets. Whether ...
Securing the Breach: Protect What Matters Where it Matters Ron Stamboly In an age where data is distributed across and beyond the enterprise, organizations cannot rely ...
Privacy and Social Media in the Workplace Kate Martinez , John Roman The evolution of social media in the workplace has introduced many challenges to privacy. This ...
Practical User Awareness Training Kevin Wilkins In various surveys and interviews conducted in my role as an Information Security consultant, I ...
Breach Detection: Metric Matters Dain Perkins 2014 breach stats are out, they are not pretty. Regardless of the advances in perimeter, ...
Top Ten Web Defenses Jim Manico We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals ...
Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows Ralph Durkee Ralph will discuss and perform a live demonstration of a step by step technique for ...
Securing Native Big Data Deployment Steve Markey This session will provide thought leadership and use cases on securing Big Data technologies through ...
Docker and Linux Containers for Infosec Professionals Matt Kaar Linux containers are experiencing a revival as of late, due in large part to a ... IncludeThinkstScapes