Wednesday, November 18 | |||
8:00 am - 9:00 am | Registration & Continental Breakfast | ||
9:00 am - 9:10 am | Welcome and Opening Remarks Julia King, Contributing Editor, CSO | ||
9:10 am - 9:55 am | Cyber Security: How'd It Get So Bad, and Can We Do Anything About It? Joel Brenner, Former Head of US Counterintelligence Policy; Former Inspector General, National Security Agency Personal privacy, business information, and government secrets have never been more vulnerable to cyber theft, and the threat is growing from both nation states and criminal organizations. Join us for this sobering explanation of how we got here and how organizations should think strategically about the threat and organize themselves to deal with it. | ||
9:55 am - 10:25 am | Eyes Wide Shut: Revisiting Enterprise Exposure Shahar Tal, Head of Vulnerability Research, Check Point Software; former CTO, Israeli Defense Forces The enterprise vulnerability surface continues to widen, as attackers identify new holes in previously trusted software and hardware platforms. What are they? How do we know about them? Join this session for an insider’s view of recent vulnerability research, and learn how you can apply this knowledge to reassess your exposure and protect your organization from the latest threats. | ||
10:25 am - 10:40 am | Networking Break | ||
10:40 am - 11:10 am | Dealing with Evolving Threats in an Increasingly Digitized Economy Tim Ogden, Senior Director, Global Fraud Prevention, ADP Chasing the bad guys who are attempting to commit fraud on your organization not only leads to their prosecution, but reveals the methods they use to harvest and steal credentials, access and money. By proactively identifying these incidents of fraud, you can better prevent future attempts. Join us to understand how to take a proactive posture to prevent fraud in your organization. | ||
11:10 am - 11:40 am | Black Hat vs. White Hat: How Cybercriminals Hack and Security Professionals Protect Julia King, Contributing Editor, CSO Shahar Tal, Head of Vulnerability Research, Check Point Software; former CTO, Israeli Defense Forces Chris Tarbell, Former FBI Special Agent, Tim Ogden, Senior Director, Global Fraud Prevention, ADP Interactive discussion on new tools and techniques used by hackers, next generation of attacks, the art and science of the honey pot, including demonstration of vulnerabilities and hacking. | ||
11:40 am - 12:00 pm | Why Staying One Step Ahead is Mission-Critical Julia King, Contributing Editor, CSO Amnon Bar-Lev, President, Check Point Software | ||
12:00 pm - 1:15 pm | Networking Lunch with Table Topic Discussions Topics to include: Staying One Step Ahead of Malware Threats Defining the Steps to Take in Advance of a Potential Breach Defining a Security Strategy for the Mobile Attack Surface Improving Visibility, Response and Remediation Identifying Vulnerability Consistently and Systematically Monitoring and Analyzing Persistent Attackers Turning Threat Intelligence into Threat Prevention | ||
1:15 pm - 2:00 pm | What We Learn from Tracking Down the Bad Guys Chris Tarbell, Former FBI Special Agent, How can the nation's most significant cyber investigations help us understand the future? Join us for an insider’s look at the turbulent threat landscape, the hacker underworld, and what is learned from the bad guys who get caught. | ||
2:00 pm - 2:30 pm | Malware Intelligence: Tales from the Trenches Dan Wiley, Head of Incident Response, Check Point Software With cybercriminals picking up tricks and tactics from nation-state adversaries and vice-versa, the techniques and tools of the malware trade are evolving to become ever more evasive. Join us as we share real stories of real targeted attacks, and unmask previously unknown campaigns and attacker groups. | ||
2:30 pm - 2:45 pm | Networking Break | ||
2:45 pm - 3:15 pm | A Business-First Approach to Security Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group Modernizing the security strategy at The Blackstone Group has been a multi-year journey involving increased investment in intelligence-based visibility and a strategic reduction in the number of compromised systems. Complementing these efforts is the organization’s CEO-sponsored Human Security Sensor Program designed to enable every employee to embrace smart security practices for the greater organization. Join us to understand how these combined efforts are maximizing the impact and overall value the security team brings to the firm. | ||
3:15 pm - 3:45 pm | Leveraging Remediation and Forensics to Align with New Threats Devon Bryan, Vice President, Global Technical Security Services, ADP Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group Dan Wiley, Head of Incident Response, Check Point Software Julia King, Contributing Editor, CSO How do you align your business with consistently emerging threats? What skills does your organization need to create this consistent state of alignment? How can you find the right people? Join us for this panel discussion of experts for answers to these questions and more. | ||
3:45 pm - 4:00 pm | Closing Remarks | ||
4:00 pm - 5:30 pm | Networking Reception |