Monday, March 23
10:00 AM - 11:00 AM
George Tubin, Sr. Security Strategist, IBM/Trusteer
Etay Maor, Senior Fraud Prevention Strategist, IBM/Trusteer
•Learn the latest cybercrime techniques used to attack financial institutions
•Understand how cybercriminals circumvent the defenses used by most financial institutions
•Learn about emerging mobile fraud approaches being introduced around the world
•See how to most effectively bolster your institution's anti-fraud defenses
11:15 AM – 12:15 PM
Matt Robertson, Technical Marketing Engineer, Lancope
•Identify advanced targeted attacks
•Detect malicious insider threats
•Drive additional security value out of existing network infrastructure
•Accelerate threat identification and incident response process
1:30 PM – 2:30 PM
Amol Sarwate, Director of Vulnerability Labs, Qualys Inc.
•Review a yearlong study of the most recent SCADA vulnerabilities in industrial control systems and critical infrastructure
•In-depth explanation of SCADA systems components
•SCADA protocols
•Current state of SCADA vulnerabilities and analysis
•Possible solutions to mitigate issues
3:15 PM – 4:15 PM
Bill Dean, Director of Computer Forensics, Sword & Shield Enterprise Security
•Concerns about trust and disclosing too much privacy information tend to bog down initiatives
•Understand the value of threat intelligence
•Learn the rich sources to build your own program
•How to "safely" share threat intelligence with others
Tuesday, March 24
8:30 AM – 9:45 AM
Erez Liebermann, Vice President, Senior Counsel, Corporate Investigations at Prudential Financial
Andrew Pak, Assistant United States Attorney, United States Attorney’s Office for the District of New Jersey, Department of Justice
•An understanding of a Hacker’s motivation
•Steps to protect a business pre and post breach
•Identifying soft points in the network from the mind of a hacker
•An understanding of a prosecution’s timeline
•The hacker’s steps to profit from each breach
•The risks and benefits of cooperating with the Government
10:00 AM – 11:00 AM
Amol Sarwate, Director of Vulnerability Labs, Qualys Inc.
•In-depth explanation of point-of-sale system components
•The nuts and bolts of RAM scrapers and how they steal credit card data from POS systems
•Techniques used to compromise POS
•Demonstration of how easy it is to create POS malware
•Solutions and countermeasures to mitigate issues
2:00 PM – 3:00 PM
Philip Lieberman, President and CEO, Lieberman Software
•Implement automated solutions to reduce or eliminate workload in password changes, administrative access controls and attestation
•Quickly find and fix lost privileged identities and their usages permanently
•Change privileged service account passwords without causing outages
•Automate privilege management using escalation and proxied access
•Add multi-factor authentication to systems that don’t currently support it
•Secure on-premises infrastructure, line of business, and cloud based application access in minutes
3:30 PM – 4:30 PM
Chris Nickerson, CEO, LARES Consulting
•A history of breaches and why even companies with massive awareness programs are still getting compromised
•Why phishing exercises and user awareness programs are not enough to stop the attacks
•How to effectively phish for relevant metrics
•Learn to analyze the real attack surface of phishing and social engineering attacks
•How to stop pouring money on the fire and start empowering employees
Wednesday, March 25
9:45 AM – 10:45 AM
Brian Varner, CISSP, Senior Manager, Cyber Security Group, Symantec Corporation
•Explore various insider threat scenarios
•Hear about tactics, techniques, and procedures to identify and reduce risk vectors
•Behind-the-scenes views into the anatomy and psychology of insider threats
11:00 AM – 12:00 PM
Evan Uhl, Security Operations Center Manager, Neustar, Inc
•Common risks associated with DDoS attacks, and mitigation techniques
•Why standalone technologies require complementary tools to lower organizational risk
•Critical techniques to protect service availability
•Baseline requirements that must be met to defeat DDoS
•Case examples of how security models are protecting cloud services and blocking malicious behavior
Top-notch training. Compelling speakers. Meaningful interactions.
Join the conversation using #InfoSecWorld
Contact Us
Registration/General Inquiries:
Customer Service
(508) 879-7999 ext. 501
Speaking Opportunities:
Katherine Teitler
Director of Content Development
Exhibit Sales:
Vendors A-L
CJ Oliveri
Director of Sales, Conference Division
Vendors M-Z
Howard Weinman
Director of Sales, Conference Division