2014 Enterprise Security Summit
 
Speakers for the 2014 ESS will be announced soon. 
Breakout and Workshop descriptions are provided during the registration process. 
As classes become full, they will close.
*Agenda subject to change. Please check back for updates. 

Wednesday, April 23
10:00 a.m. Check-in Opens | Partner Pavilion Opens
11:45 a.m. - 1:00 p.m. Special Keynote Presentation with Michael Dell
1:00 p.m. - 1:50 p.m. Breakout Session I
2:00 p.m. - 2:50 p.m. Breakout Session II
3:00 p.m. - 3:50 p.m. Breakout Session III
4:00 p.m. - 4:50 p.m. Breakout Session IV
5:00 p.m. - 5:50 p.m. Breakout Session V
6:00 p.m. - 9:00 p.m. Welcome Reception



Thursday, April 24
7:00 a.m. - 8:00 a.m. Breakfast
   >>General Session
8:00 a.m. - 8:50 a.m. 2013 Incident Response Breach Report
8:50 a.m. - 9:40 a.m. Gearing for War Against Advanced Threats
9:40 a.m. - 9:55 a.m. Break
9:55 a.m. - 10:45 a.m. Forensics Readiness for When the Worst Happens
10:45 a.m. - 11:35 a.m. Lessons From a Battle-Hardened CISO Office
11:35 a.m. - 12:35 p.m.  Keynote Guest Speaker - John Pescatore

12:35 p.m. - 1:50 p.m. Lunch
1:50 p.m. - 2:50 p.m. Workshop Session I
3:00 p.m. - 4:00 p.m. Workshop Session II
4:10 p.m. - 5:10 p.m. Workshop Session III
6:00 p.m. - 10:00 p.m. Offsite Dinner Event 



Friday, April 25
7:30 a.m. - 8:30 a.m. Birds of a Feather Breakfast
8:30 a.m. - 9:30 a.m. Workshop Session IV
9:40 a.m. - 10:40 a.m. Workshop Session V
10:50 a.m. - 11:50 a.m. Workshop Session VI
12:00 p.m. Adjourn




>>Breakouts

Breakout Session I   Back
  • The Weakest Link: Changing Employee Behavior - Security Awareness Training Solutions
  • Seeing Beyond Your Network Edge: Targeted Threat Intelligence
  • The New Security Model
  • Securing BYOD: Defending Today’s Mobile Endpoints
  • Security Instrumentation Principles
  • Security for Virtual and Cloud Environments
Breakout Session II   Back
  • Building a Security Operations Center 
  • Security Over Compliance
  • Winning Over Your Security Priorities
  • Hybrid Cyber Security Management: Creating an Agile and Leveraged IT Security Operation
  • New Vulnerability Management and Compliance Services
Breakout Session III   Back
  • End Game: Understanding Endpoint Security Technologies
  • Seeing Beyond Your Network Edge: Targeted Threat Intelligence
  • Securing BYOD: Defending Today’s Mobile Endpoints
  • Security Instrumentation Principles
  • Security for Virtual and Cloud Environments
Breakout Session IV   Back
  • End Game: Understanding Endpoint Security Technologies
  • When You Don’t Know If You’ve Been Breached – Hunting for the Threat
  • Hybrid Cyber Security Management: Creating an Agile and Leveraged IT Security Operation
  • New Vulnerability Management and Compliance Services
  • Advanced Threat Services Portfolio Discussion
Breakout Session V   Back
  • The Weakest Link: Changing Employee Behavior Through Security Awareness Training Solutions
  • When You Don’t Know If You’ve Been Breached – Hunting for the Threat
  • Security for Virtual and Cloud Environments
  • Addressing Security Concerns in an M&A World
>>Workshops

Workshop Session I   Back
  • Measuring Success of Your Security Initiatives
  • Retail Implosion – The Threat Facing Retailers and Any Organization Handling Cardholder Data
  • Designing a Resilient Computer Security Incident Response Plan (CSIRP)
  • Accelerated Understanding of Security
Workshop Session II   Back
  • Critical Security Controls Review
  • Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers, Hosts and End Users
  • Establishing a Threat Intelligence Capability within the Enterprise: Critical Considerations When Building an Intelligence Function in Your Organization
Workshop Session III   Back
  • Measuring Success of Your Security Initiatives
  • Retail Implosion – The Threat Facing Retailers and Any Organization Handling Cardholder Data
  • Designing a Resilient Computer Security Incident Response Plan (CSIRP)
Workshop Session IV   Back
  • Mobile Security - What You Need to Consider in Your Mobile Deployments
  • Red Team Testing to Simulate the Advanced Threat
  • Application Security Best Practices
  • Strengthening Your Response: Incident Response Tabletop Exercise
  • Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers
Workshop Session V   Back
  • Red Team Testing to Simulate the Advanced Threat
  • Application Security Best Practices
  • Critical Security Controls Review
  • Establishing a Threat Intelligence Capability within the Enterprise: Critical Considerations When Building an Intelligence Function in Your Organization
  • Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Hosts and End Users, Networks and Servers
Workshop Session VI   Back
  • Mobile Security - What You Need to Consider in Your Mobile Deployments
  • Application Security Best Practices
  • Strengthening Your Response: Incident Response Tabletop Exercise
  • Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers, Hosts and End Users