Amphion Forum 2012 June 26, 2012 to June 26, 2012, Washington DC, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Amphion Forum Welcome Address Adrian Turner We live in a world where connected devices outnumber PCs by at least five to ... Security
Keynote Address: National Security and Ubiquitous, Connected Computing 96 the Struggle to Secure our Critical Infrastructure & the Internet of Things Michael Chertoff N/A Security
Driving Them to the Brink Fuzz Testing Devices to Uncover Security Flaws Ira Winkler N/A Security
Panel: What are Thought Leaders Doing Differently to Address the Device/App Security Space? Phyllis Schneck , Robert Rodriguez , Cimmaron Buser , Rob Carey , Robe Pate N/A
Panel: Medical Device Hacking Update Dale Nordenberg , Jay Radcliffe , Arnab Ray N/A
Panel: Device Security and the Intelligence Community Robert Bigman , Bob Flores , David ( VideoMan ) Bryan , Dawn Meyerriecks , Lee Cocking N/A
Stealing Keys from Devices with Differential Power Analysis Ben Jun N/A Security
An Energy-Star ratings system for comparative device security Tushar Patel N/A Security
Leveraging Big Data for Mobile Security Hadi Nahari Smart and always-connected consumer electronic devices such as smartphones are still considered new when it ... Security
Vulnerability Disclosures In Medical Devices Mike Ahmadi , Nate Kube , Jay Radcliffe , Brian Fitzgerald The topic of cybersecurity vulnerability disclosure is arguably one of the most active and often ...
Securing the Mobile Enterprise: The App is the New Endpoint Mike Siegel N/A
Understanding Android Security Pragati ogal Rai Android is an open source operating system with advanced features that can be easily ported ...
Industrial Control System Cyber Security 96 Selected Case Histories Joe Weiss Industrial control systems (ICSs) monitor and control the industrial infrastructures of electric power, water, chemicals, ...
Securing the Smart Grid: the Effort So Far Dan Thanos N/A Security
Hacking the Smart Grid: The Myths, Nightmares, & Professionalism Nate Kube With the media reporting that foreign spies have already penetrated our electrical grid, building a ...
Testing Devices for Security with Runtime Code Instrumentation Ido Sarig Run-time fault injection is a very common technique in hacking/testing for security, but one which ...
Device Security via Counterintelligence Jeff Kuhn For more than 30 years, networked system security has been typically based on a foundation ...
Cyberwar-4G a/k/a The Coming Smart Phone Wars Eric Green What do governments, agencies, critical infrastructures and cyber-commands do when it has 2 billion more ...
Meeting NSAs Mobile Capability Requirements: Really Secure VoIP on COTS Smartphones Tushar Patel N/A
Device Testing Considerations for Govt & Defense Ari Takanen N/A
New Security Considerations for Mobile Commerce Pragati ogal Rai The influx of mobile devices are changing the face of commerce. With new use cases ...
The Road to Securing the Internet of Things: The Evolution of the Market Segment Vic Wheatman Tracing cycles of technology and changing business practices, this presentation by a former, long-time. Gartner ...
Securing the Grids Transmission and Distribution System 96 Risks and Gap Analysis Phil Mar This presentation focuses on an analysis of the security risks to the smart grid infrastructure. ... Security
End-to-End Security Strategies for New Devices Bill Seibel N/A