>>Breakouts
|
Breakout Session I Back |
- The Weakest Link: Changing Employee Behavior - Security Awareness Training Solutions
- Seeing Beyond Your Network Edge: Targeted Threat Intelligence
- The New Security Model
- Securing BYOD: Defending Today’s Mobile Endpoints
- Security Instrumentation Principles
- Security for Virtual and Cloud Environments
|
Breakout Session II Back
|
- Building a Security Operations Center
- Security Over Compliance
- Winning Over Your Security Priorities
- Hybrid Cyber Security Management: Creating an Agile and Leveraged IT Security Operation
- New Vulnerability Management and Compliance Services
|
Breakout Session III Back |
- End Game: Understanding Endpoint Security Technologies
- Seeing Beyond Your Network Edge: Targeted Threat Intelligence
- Securing BYOD: Defending Today’s Mobile Endpoints
- Security Instrumentation Principles
- Security for Virtual and Cloud Environments
|
Breakout Session IV Back |
- End Game: Understanding Endpoint Security Technologies
- When You Don’t Know If You’ve Been Breached – Hunting for the Threat
- Hybrid Cyber Security Management: Creating an Agile and Leveraged IT Security Operation
- New Vulnerability Management and Compliance Services
- Advanced Threat Services Portfolio Discussion
|
Breakout Session V Back |
- The Weakest Link: Changing Employee Behavior Through Security Awareness Training Solutions
- When You Don’t Know If You’ve Been Breached – Hunting for the Threat
- Security for Virtual and Cloud Environments
- Addressing Security Concerns in an M&A World
|
Workshop Session I Back |
- Measuring Success of Your Security Initiatives
- Retail Implosion – The Threat Facing Retailers and Any Organization Handling Cardholder Data
- Designing a Resilient Computer Security Incident Response Plan (CSIRP)
- Accelerated Understanding of Security
|
Workshop Session II Back |
- Critical Security Controls Review
- Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers, Hosts and End Users
- Establishing a Threat Intelligence Capability within the Enterprise: Critical Considerations When Building an Intelligence Function in Your Organization
|
Workshop Session III Back |
- Measuring Success of Your Security Initiatives
- Retail Implosion – The Threat Facing Retailers and Any Organization Handling Cardholder Data
- Designing a Resilient Computer Security Incident Response Plan (CSIRP)
|
Workshop Session IV Back |
- Mobile Security - What You Need to Consider in Your Mobile Deployments
- Red Team Testing to Simulate the Advanced Threat
- Application Security Best Practices
- Strengthening Your Response: Incident Response Tabletop Exercise
- Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers
|
Workshop Session V Back |
- Red Team Testing to Simulate the Advanced Threat
- Application Security Best Practices
- Critical Security Controls Review
- Establishing a Threat Intelligence Capability within the Enterprise: Critical Considerations When Building an Intelligence Function in Your Organization
- Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Hosts and End Users, Networks and Servers
|
Workshop Session VI Back |
- Mobile Security - What You Need to Consider in Your Mobile Deployments
- Application Security Best Practices
- Strengthening Your Response: Incident Response Tabletop Exercise
- Recommendations to Harden Security Against Advanced Persistent Threats (APT) – Networks and Servers, Hosts and End Users
|