CS040SecConFab 2013 April 2, 2013 to April 3, 2013, California,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Jerry Archer , Bob Bragdon N/A
Value Illumination with Risk Management Jamil Farshchi This presentation will provide a high-level overview of the Value Illumination Strategic Security Model. This ...
Designing, Developing and Implementing an IT Vendor Assurance Program Vincent Campitelli Management, McKesson Corporation In this session, learn how McKesson created a program to quickly identify ...
Metadata and Visualization: New Tools for Managing Complex Problems Kurt Neumann A proliferation of security tools, mass aggregates of data, and analytical requirements have made maintaining ...
Info Security’s Perfect Storm – Security Requirements for 2011 and Beyond Ray Wizbowski The year 2011 is quickly becoming the “year of the breach.” With financial institutions, online ...
Ethics in the Workplace Kevin Smith The root cause of internal theft or employee misconduct is a matter of ethics. This ...
Integration Challenges of Acquisitions Mary Ann Davidson Acquisition integration presents many integration challenges, among them enforcing consistent secure development and assurance standards ...
Don’t Forget the Guy in the Bright Pink Shirt Sean Cordero Information security tools continue to bolster the visibility into enterprises, but with this arsenal in ...
How IQT Can Help Fund Cyber Security Startups George Hoyem In this session, we’ll discuss how IQT can help these startups gain access to large ...
The Cyber Espionage Threat – You are a Player Robert Bigman Cyber espionage takes advantage of naïve, and often irresponsible, participants in a deadly serious game ...
Top Website Vulnerabilities: Trends, Business Effects and How to Fight Them Jeremiah Grossman Most websites were exposed to at least one, serious vulnerability every day of 2010. Only ...
Security Benchmarking Abe Kleinfeld The time has come for all organizations to measure the performance of our security ecosystem ...
Gray, the New Black: Gray-Box Web Vulnerability Testing Brian Chess Penetration testers who use only black-box tools are destined to lose to attackers who are ...
Testing Security Controls Before Hackers Do Tas Giakouminakis While investments in security can reduce the likelihood of breach, sophisticated attackers will always find ...
The State of the IAM SaaS Market Lyle Carlson Over the past decade in-house IAM investments have often fallen short of expectations. As the ...
Safeguarding User Access For Cloud Computing Darran Rolls Cloud computing presents as many challenges as it addresses, particularly around security and governance. From ...
Identity: How Do I Know Who You Really Are? Don Adams Many changes are underway across industry, government and e-commerce that will fundamentally change the how, ...
What I *Really* Think: We Are All Gonna Die Brad Arkin "As the guy responsible for some of the most widely distributed (and therefore, widely attacked) ...
DNSSEC: A Game Changing Example of Multi-stakeholder Cooperation Richard Lamb "The biggest improvement to the Internet's security infrastructure began last year with the deployment of ...
Why Does Only 30% of the Fortune 1000 Own DLP? Why Wasn’t DLP a Huge Success? Jason Clark Jason Clark has done extensive research on the DLP Business and searched to find out ...
Next-generation Threat Protection: Stopping Advanced Malware, Zero-day and Targeted APT Attacks Ashar Aziz Advanced malware, zero-day and targeted APT attacks aggressively evade signature-based defenses and compromise the majority ...
Fending Off APT and Other Attacks Wolfgang Kandek Current protection methods can’t effectively block attacks, so we’ll explore how to identify vulnerabilities on ...
Know Your Customers Elon Ginzburg In this age of advanced persistent threats, banks are finding that their business customers are ...
The Cat and Mouse of How to Hide and Track on the Internet Lance Cottrell In this session, we’ll explore the technologies people are using to hide their identities and ...
How Mobile App Development Upended Your SDL And What To Do About It Alex Stamos In this talk, we’ll discuss the new challenges of mobile applications for application security and ...
Mobile Security Can Be a Customer Delighter Dan Corcoran While it may go against the conventional wisdom, mobile security can be a customer delighter ...
Responding to Insider Threats and Employee Defections Steve Kim In this session, we’ll discuss the security issues raised by insider threats to sensitive company ...
The Cyber Security School Challenge Joyce Brocaglia The Cyber Security School Challenge is a collaborative outreach program founded by the EWF and ...
Proposal for an Initiative Against Malicious Cyber Activity Donald Purdy This session will focus discussion and enlist support for an initiative by government and private ...
Hummingbird: A Rotor Machine for the 21st Century Whitfield Diffe Radio Frequency identification may not be growing fast enough to please its investors but remote ... Security
GRC Optimization Over the Next 5 Years David Deckter "GRC solutions need to evolve in order to keep pace with the evolving threat landscape. ...
Software Assurance in the Real World Ariel Silverstone In this session, we’ll discuss how to put together -- and succeed in implementing -- ...
Payment Apps on Mobile and Tablet Devices are Cool – But Can They Be Trusted? Steven Elefant The proliferation of payment apps on mobile and tablet devices, e-wallets, and cloud services means ...
Identity Theft and Online Fraud Protection at the IRS Hun Kim This session will highlight increasing and evolving threats of online fraud and identity theft against ...
Private Insecurities and Public Transparency John Collins The hype around cloud computing rages out of control as vendors rush to capitalize on ...
Moving Target Defense to Enhance Cloud Security Arun Sood Intrusions are inevitable, and frequency of zero day attacks is increasing. Once in the system, ...
Big Data: Big Security Risks Tim Mather Cloud computing has ushered in the era of ‘big data’. As organizations acquire more and ...
Understanding and Adopting Cloud Computing Bob West Corporations have several significant motivators to understand and adopt cloud computing as part of their ...
The Do Not Track Debate John C Mitchell In this session, we’ll discuss online third-party tracking, the Do Not Track debate, and the ...
Succeeding in a Cyber World: The Natural Evolution of Cybersecurity Harry Raduege Not too long ago, information security was viewed as solitary service within an enterprise information ...
Mission of the Security Innovation Network Robert Rodriguez The mission of the Security Innovation Network™ (SINET) is to advance innovation and enable global ...
Projecting Security Waves John Muir By studying the formation of security companies in very specific categories, you can see waves ...
Counter-Insurgency in Cyberspace John Mills Although much of the cyber conflict focus has been on potential threat vectors from near ...
Why Not Voiceprints? Dan Miller The use of mobile phones for payments and peer-to-peer transfers is growing globally. Security is ...
Next Generation Security Environment for the Financial Sector Peter Fonash In this session, we’ll use the Department of Homeland Security’s recent paper on "Enabling Distributed ...
Stop Admiring the Problem and Fix the Bugs Joel Scambray We know from measuring our customers’ practices that industry isn’t improving software security through assessment. ...
A Pragmatic and Verifiable Security Approach Based on Attacker Behavior Daniel Guido "In this talk, we’ll introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities ...
The Expansion of Fraud Opportunities Beyond Banking David Hahn N/A