Suitsandspooks 2016 Feb. 11, 2016 to Feb. 12, 2016, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Address Jeffrey Carr N/A
BAE Systems Panel: An Inside Look at a Prime Defense Contractor's Global Threat Landscape (NO PRESS) Douglas Bruns , Trevor Odell , James Witherspoon N/A
GPS Spoofing, Jamming, and Hacking - How Secure is our Global Positioning System? Mark Lockwood Psiaki N/A
AIAA Panel: How Does Cybersecurity in Space Differ from on the Ground? (NO PRESS) Dave Lavallee , Jandria Alexander , Howie Weiss Traditional hacking skills are only half of the equation for a threat actor trying to ...
Milware After Stuxnet Trey Herr The evolution of leading edge state authored malicious code since Stuxnet has tended towards highly ...
Stakes and Consequences: Protecting Oneself From Global Threats to Mobile Communications Adam Meyers , Elad Yoran Global mobile communications systems are under attack. Technology and financial barriers to attack mobile communications ...
Chasing Unicorns: What Are The Trends in VC Funding for 2016 and How Will That Impact The Security Space? Elad Yoran , James Hunt , Mark Hatfield N/A
The CISO Imperative – Taking Control of Cyberattacks on SAP Sage Wagner Business-critical applications running on SAP and Oracle are emerging as the next big target of ...
For the Love of Money: Electronic Currencies, Cyber Criminals and You Will Gragido Today, we use money in ways that our ancestors could never have dreamed. Evolution has ...
Insider Threat: Risk Scoring, Machine Learning, and other Strategies Casey Corcoran , Wallace Sann , Curtis Bragdon , Adrian Mahieu This panel will explore the challenges with "insider" risk detection, measurement and management in secure ...
Disrupt & Destroy: A look at current Ransomware trends and capabilities Roel Schouwenberg N/A
Reduce the Attack Surface Inside Your Data Center and Cloud John Westerman Enterprises need to safeguard high-value applications handling intellectual property, financial data, big-data apps, and other ...
Survey of Vulnerabilities in Critical Infrastructure Remy Baumgarten , Tom Kellerman , Sage Wagner , Scott Montgomery , Nathan Swaim N/A
Legal and Operational Analysis of the Ukraine Power Grid Attack Jeffrey Carr , Cameron Camp , Tom Kellerman , Michael Toecker , Gary Brown A panel of experts from the fields of industrial control systems, international law, and information ...
AIAA Panel: Commercial Aerospace Threat Space (NO PRESS) Paul Kurtz , Emilian Papadopoulos This session will review the design philosophy and the cyber security framework developed for aviation. ...
When a Backdoor Isn’t a Backdoor: Is This Time Different? Randy Sabett , James Denaro , Ken Mendelson Governments are seeking a process for access to encrypted data - particularly on mobile devices ...
How Can U.S. Multinational Companies Do Business Overseas And Still Protect Their Assets? Jeffrey Carr , Jody Westby , Paul Kurtz U.S. multinationals have no choice but to do business and build supply chains overseas. Unfortunately ...
Applying International Law To Norms in Cyber Warfare Catherine Lotrionte , Gary Brown N/A