RochesterSecuritySummit 2015 Oct. 6, 2015 to Oct. 7, 2015, rochester,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
T1 “OWASP Application Security – Building and Breaking Applications” Ralph Durkee Application Security continues to be the most challenging and demanding area for securing our information. ...
T2 “Preventing the Next Prison Break” Stephen Johnson Stephen Johnson is Manager of Channels – East, Mid-Atlantic and South US at Check Point ...
T3 “Is Your Data Secure?” Sebastian Meine Your company probably stores a lot of data about your customers. You might store simple ...
T4 “BASC Presentation on Security and Application Architecture” Walt Williams This presentation looks at the relationship between security architecture and application architecture, specifically on the ...
T5 “Debunking the Myths of Mobile Security” Stephen Johnson Cyber threats against mobile devices are on the rise! When it comes to securing mobile ...
T6 “Dissecting Cryptowall” Nick Bilogorskiy Cryptowall has gone beyond a nuisance for home users to become a significant risk for ...
T7 “802.1X and Beyond!” Brad Antoniewicz IEEE 802.1X has long been leveraged for authentication purposes. Up until this point, little has ...
T8 “Pretending To Be A Terrorist – The Jihadist Adventures of Tyler & Steve” Steve Stasiukonis Having been hired by a major distributor of electrical power across our country’s power grid, ...
B1 “The Top 5 Strategies for Managing CyberSecurity Risks” Larry Hessney With the ever growing and changing CyberSecurity threat landscape, companies need to have a comprehensive ...
B2 “Next-Generation Firewall Architecture – Can a NGFW Really Help?” Patrick Zanella With the advent of IT organizations growing smaller and smaller, yet expected to be 100% ...
B3 “Effective System Implementation Through the Application of System Implementation Quality Assurance” David Hansen System Implementation Quality Assurance (SIQA) can be the essential component to help guide the implementation ...
B4 “Hell is Empty and All the Devils are Here” Reg Harnish The right to privacy has become a corollary to assurances of security. This perception is ...
B5 “The Evolving Technology of Small Unmanned Aerial Vehicles” Brian Pitre This presentation describes the technology associated with small unmanned aerial vehicles, more commonly known as ...
B6 “BYOD – It’s Not so Hard!” Kevin Wilkins Bring Your Own Device (BYOD) is one of the biggest challenges in IT today. As ...
B7 “Legal and Ethical Issues in Technologically Intensive Environments with a Focus on Privacy” Bruce Oliver This presentation confronts attendees with privacy issues in a wide variety of legal and ethical ...
B8 “Moving from Breach Prevention to Breach Acceptance” Alex Hanway The very foundation of data security is evolving. It’s no longer about “keeping the bad ...
TL1 “How Threat Intelligence Affects Business Risk” Tom Bowers A new approach to operational security models is needed. Too much sensitive data is being ...
TL2 “Threats: Malice, Mistakes, and Mountain Lions” Steve Gold The recent spate of highly publicized breaches has drawn attention to one of the issues ...
TL3 “The Onslaught of Cyber Security Threats and What that Means to You” Jonathan Borgensen With the ever-changing threat landscape, the number of successful attacks is growing exponentially every day. ...
TL4 “Crack the Code and Defeat the Advanced Adversary” Erik Yunghans Cybersecurity can sometimes feel like a puzzle, a code to crack. This isn’t how it ...
TL5 “Closing the Threat Gap: A 21st Century Approach to Minimizing Risk” Ron Arden Hackers, malicious insiders and privileged users are stealing your sensitive data and your 20th century ...
TL6 “A Practical Approach to Designing Secure Networks in a World with an Impractical Challenge.” Anthony Luz The threats to today’s businesses are rapidly changing and the solutions seem to be numerous. ...
TL7 “DDOS an Operational Overview” Andrew Cassera This presentation is an introduction of Distributed Denial of Service. It provides an overview of ...
TL8 “Mobile Data Leakage: What Are You Leaking and Who’s Watching…” Rick Mislan This talk will explore current research of mobile devices and the data they leak through ...
SG1 “Passwords – History and Future” David Frier This presentation will address: How Passwords came to be as the dominant form of authentication ...
SG2 “Threat Intelligence and its Role in Your Overall Security Strategy” John Collins A rapidly evolving threat landscape is being driven by a growing sophistication among attackers. As ...
SG3 “Mitigating Legal Risk Created By Evolving Technology” Kate Martinez , John Roman As technology continues to evolve, it can be challenging to adapt our policies and procedures ...
SG4 “NodeJS Security” Jason Ross ★ Please note this will be a technical presentation ★ Node JS is an extremely ...
SG5 “Beyond the Hype – Modern Cybersecurity Threats and How to Combat Them” Mike Ruiz Protecting the privacy of everyone connected to your network, and of everyone who has data ...
SG6 “Balancing Privacy and Security In the Age of Cyber Security Information Sharing” Lamar Spells The need for improved information sharing amongst businesses, governments and other institutions charged with protecting ...
SG7 “Minimizing Risk Through Vulnerability Management” Mark Lucas The duties of Corporate Risk Managers have become more complex and critical to a company’s ...
SG8 “Digital Self Defense: Overview of Security Awareness at RIT” Ben Woelk People are the biggest challenge in information security. They can overcome any technical controls, whether ...
SD1 “Intel Security” Joseph Fiorella Many organizations struggle to find the right balance of endpoint technologies that are agile enough ...
SD2 “Distributed Denial of Service and Operational Overview” Andrew Cassera The presentation is from the frame of reference of what is Distributed Denial of Service ...
SD3 “ePlus Security Consulting Services” Tom Bowers Would you like another set of CISO level eyes to assist you with maturing your ...
SD4 “Next-Generation Firewall Architecture – Can a NGFW Really Help?” Patrick Zanella With the advent of IT organizations growing smaller and smaller, yet expected to be 100% ...
SD5 “ePlus Security Consulting Services” Tom Bowers Would you like another set of CISO level eyes to assist you with maturing your ...
SD6 “Changing the Game in Network Security” Fabio Mazzulli Changing the Game in Network Security How Stealth Networking, based on Avaya Fabric Connect and ...
SD7 “Dealing With the Devil Inside: Cyber Security and the Insider Threat” Russell Harnish Security breaches are inevitable. Organizations understand that it is no longer a question of “if” ...