PhiladelphiaInfoSecForum 2014 Nov. 4, 2014 to Nov. 5, 2014, Philadelphia,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Making Identity the New Perimeter Marcus J. Ranum In the age of distributed computing, existing corporate boundaries fall by the wayside as corporate ...
Application Security: Making It Work Diana Kelley Application security continues to receive short shrift by too many information security executives. How do ...
Encryption: The Best Tools, Techniques and Key Management Strategies Ed Moyle Encryption is an indispensable, cheap tool for protecting corporate data, but what encryption techniques work ...
DLP: Time to Stick a Fork in It? Mike Saurbaugh Data Loss Prevention has been around for years, but organizations still struggle with getting adequate ...
Data Security in the Cloud: Security Best Practices for IaaS, PaaS and SaaS Deployments Dave Shackleford What are the technical, operational and contractual strategies you should pursue to safeguard corporate data ...
Setting Priorities: Identifying Adversaries That Pose the Greatest Threat Mike Rothman Who poses the greatest threat to your organization? Nation-states? Competitors? Organized crime? Hacktivists? Disgruntled employees? ...
From Active Defense to Agile Security: What We Can Do Today Marcus J. Ranum Gallons of ink and rooms of hot air have been expended on the topic of ...
Bad Actors I: Finding Them on the Network Marcus J. Ranum What are the main indicators of compromise (IOC)? How can we share IOCs in an ...
Bad Actors II: Reducing Hacker Dwell Time Marcus J. Ranum How do you deploy Lockheed Martin’s Cyber Kill Chain Process within your organization?
Best Practices in Advanced Malware Mitigation Mike Rothman With traditional antivirus making a poor showing with regard to advanced malware mitigation, what approach ...
Getting a Handle on ‘Shadow IT’ Ed Moyle Forbes reports 40% of corporate IT spend is now outside of the CIO’s control. What ...
Virtualization Is Everywhere – Now What? Dave Shackleford Virtualization now underpins every data center, but it’s receiving too little attention from information security. ...
Securing Cloud Deployments Diana Kelley Data shows that most organizations utilize more than one cloud service provider, but many of ...
MDM: Controlling the Data Adam Ely In the heterogeneous world of mobile devices, what combination of policy and technology should control ...
BYOD: Controlling the Risks Adam Ely BYOD is here to stay. What is the best way to provide the benefits of ...
Data Overload: Getting a Handle on Configuration, Vulnerability and Enterprise Data Dave Shackleford How do you effectively tackle configuration management at an enterprise level? How do you get ...
Moving from Log Management to Network Intelligence Mike Rothman What is actually happening on your network? Existing networking monitoring tools don’t deliver a clear ...
Security Intelligence: Creating a Custom Threat Feed Dave Shackleford The information security market is flooded with generic, new third-party intel feeds. How do you ...
Compliance Does Not Equal Security: Doing Both on One Budget Diana Kelley How do you ensure investments in compliance also lead to an improved enterprise security posture? ...