saltlakecity 2015 Feb. 5, 2015 to Feb. 5, 2015, salt lake city,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
File Power Todd Laycock You can’t dodge the data explosion, but you can bring the chaos under control. Nowadays ...
Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Phil Austin User-driven computing models are generating a need for identity services that sit at the intersection ...
Privileged Identity – The Core of the Kill Chain Todd Vorhauer In the past 12 months, 110 million Americans have been impacted and 432 million accounts ...
Mobile Security Revolutionized Randy Dotson Mobile security continues to be a challenge for organizations providing business access on mobile platforms, ...
Learn how hackers evade enterprise security in 10 mins (or less… ). Alon Nafta Learn about common evasion techniques used by advanced threats, attacks that leverage those techniques, and ...
Network Applications - How Visibility and Telemetry can solve the problems arising in the Data Center Josh Frank The presentation will focus on the need within the data center to provide real-time visibility ...
The “Inception” Targeted Attack: Peeling Back the Layers of a Sophisticated Attack Infrastructure Waylon Grange During the summer of 2014, we discovered a highly automated and extremely sophisticated framework for ...
Rethinking Security to Defend Against Cyber-Attacks John Richardson There are two types of organizations: those that have been attacked and owned and those ...
Silos to Seamless: Creating a Comprehensive Security Program Jeremy Wittkop In the wake of recent data breaches, organizations are reviewing security tools designed to prevent ...