Monday, March 23
10:00 AM - 11:00 AM
George Gerchow, Cloud Security & Compliance Evangelist, VMWare
•The politics behind SaaS
•Behind-the-scenes look at SaaS based architecture
•Reduced footprint
•Reverse proxy
•Secure connection
•SCAP (Security Content Automation Protocol)
•Encryption options
•From minimum viable product to GA in 3 months
11:15 AM – 12:15 PM
Jerry Tilson, Information Security Technology Leader, Mary Kay, Inc.
•Setting expectations and deploying DLP
•Rule writing
•Getting the false positive rate under control
•Gathering information you never considered before
•Common DLP pitfalls and oversights
1:30 PM – 2:30 PM
Dr. Nataraj Nagaratnam, Engineer & Chief Technology Officer, Security Solutions, IBM Security Systems
•How cloud impacts security posture
•A comprehensive approach to managing access
•Learn to protect applications and data, and gain visibility in hybrid cloud environments
3:15 PM – 4:15 PM Research Study
Efrain Ortiz, Director, Market and Technology Innovation Group
•The similarities between biological and digital disease control
•An epidemiological analog that can be used to communicate day to day processes and success
•The (S.I.R) graph Susceptibility, Infection, Recovery as a means of tracking a large number of systems over long periods
•Lessons learned from biology that can be applied to digital diseases
Tuesday, March 24
8:30 AM – 9:45 AM
Dipto Chakravarty, EVP Engineering & Products, ThreatTrack Security, Inc.
•Learn how private, hybrid and public clouds increase the complexity of security assurance
•Side-effects of data center walls’ disappearance and mobile device proliferation
•Artifacts of targeted threats when multi-tenancy is exploited, and APTs proliferate throughout the ecosystem.
•How to set up a cloud with layered security so that it can be defended against blended threats
•How to combine the techniques to combat the worst of “outside in” and “inside out” targeted attacks
10:00 AM – 11:00 AM
Bill Dean, Director of Computer Forensics, Sword & Shield Enterprise Security
•If your “cloud” is compromised, what data will you have available for analysis?
•Understand the sources of evidence available from various cloud models
•Examples of how a compromised cloud provider equals compromised clients
•How "far" you can really take the security testing of cloud providers
2:00 PM – 3:00 PM
John Willson, Technical Architect Consultant Project Team, aemera.org
•Get to know the philosophy behind an open data protocol
•Test a business application solution stack as it relates to the OData protocol using a COBIT 5-like approach
•Where the OData protocol fits with respect to HTTP(s) and HTML
•How to defend against 3 specific attacks that could be using OData
•Acquire resources, tools, and knowledge in advance of the widespread use of this coming global standard protocol
3:30 PM – 4:30 PM
David Etue, Vice President, Corporate Development Strategy, SafeNet, Inc.
•Discuss data control, ownership, and identity management in the cloud
•Are the latest technologies helping or hindering data security?
•Regulatory concerns
•Updates to global legal issues
Wednesday, March 25
9:45 AM – 10:45 AM
Randall Brooks, CISSP, CSSLP, Engineering Fellow, Raytheon Cyber Solutions Inc. (RCSI)
•CSA and SAFECode's practices for secure development of cloud applications
•Common threats to cloud computing
•How to avoid design and implementation issues
•Benefits of secure development training
•Free online resources for application security training
11:00 AM – 12:00 PM
Dr. Ram Keralapura, Director of Data Science, Netskope
•Learn how unsupervised machine learning techniques can identify relationships not apparent to humans and lead to effective results
•Why context matters in detecting anomalies in the cloud
•Real-world examples of cloud anomalies from enterprise cloud usage data, and the forensic drill-downs behind them
•An actionable roadmap for getting started with anomaly detection in the cloud
Top-notch training. Compelling speakers. Meaningful interactions.
Join the conversation using #InfoSecWorld
Contact Us
Registration/General Inquiries:
Customer Service
(508) 879-7999 ext. 501
Speaking Opportunities:
Katherine Teitler
Director of Content Development
Exhibit Sales:
Vendors A-L
CJ Oliveri
Director of Sales, Conference Division
Vendors M-Z
Howard Weinman
Director of Sales, Conference Division