CSO Perspectives Seminar on Cyber Security
 
03/22/2012
7:30am - 8:30amRegistration and Networking Breakfast
8:30am - 8:45amOpening Remarks
Derek Slater, Editor in Chief, CSO magazine and CSOonline.com
8:45 am - 9:45 amUnderstanding Today’s Cyber Attacker: The State of Cyber Crime and Espionage
Larry Castro, Managing Director, The Chertoff Group

Getting ahead of cyber attacks today is as much about knowing your enemy as it is aligning proper prevention and defenses. What’s motivating today’s actors? Who are they, and who’s backing them? Get an up-to-the-minute understanding in this session.

9:45 am - 10:15 amModern Approaches to Cyber Espionage and Advanced Security Threats
Rich Baich, Principal, Deloitte & Touche LLP
 
Advanced persistent threats are modern, automated versions of traditional espionage, and are the cause and the silent perpetrator behind today’s mounting cybersecurity risks.  Without proper strategic awareness, some businesses unfortunately operate like ostriches -- and the all-protective sand in which they hide is simply made of compliance requirements and safe practice regulations.  But as covert activities today increasingly attempt to embed themselves within organizations and government with stealth techniques and exploits, it’s time for organizations to create a more appropriate and proactive security posture with business-enabling capabilities.  Join us for this session to learn the latest strategies in prevention and mitigation.
 
 
10:15 am - 10:45 amNetworking Break
10:45 am - 11:25 amCyberSecurity 2012: What’s Ahead?
Larry Castro, Managing Director, The Chertoff Group
Jeffrey Garonzik, Chief/Cyber Security Architect, Central Intelligence Agency
Stacey Halota, Vice President, Information Security and Privacy, The Washington Post Company
Mark Leary, CISO , TASC
Derek Slater, Editor in Chief, CSO magazine and CSOonline.com

How are threats transforming and unfolding to change the landscape in the coming year? What indicators are we seeing that will adjust our countermeasures? What’s in your incident response toolkit? And are you ready for the big one? Join us for our panel discussion as our experts will give advice, and take your audience questions.

11:30 am - 12:00 pmAchieving Cyberconfidence through Situational Awareness
Dean Weber, Director and CTO, CyberSecurity, CSC

As more and more organizations are targeted by sophisticated, automated and coordinated attacks, the challenges continue to increase across the emerging threat landscape.  Traditional efforts to head off these threats — often with narrow approaches of various bolt-on point solutions across antivirus, firewall, intrusion prevention, and single sign-on — typically present information in different formats, stored it in different places and reported to different locations.  At the same time, enterprises are anxious to find strategies that allow them to take a step back, examine their situation, establish confidence in effective security controls, and focus appropriate resources on critical needs.  In this session, learn how CSC has developed an enterprise situational awareness capability, enabling an organization’s current security components to be integrated for a centralized view of their security-related practices, processes, events, and alerts — all presented in an actionable and consolidated dashboard.  Join us as we review:  how to achieve a real-time view into your threat and risk profile; develop an enterprise security architecture that integrates security controls, controls based monitoring, and threat intelligence; and build out a true Enterprise Security Situational Awareness framework.

12:00 pm - 1:00 pmNetworking Lunch with Discussion Tables
 
21st Century Incident Response
Join us as we discuss the fundamentals of incident response planning and explore how to craft and implement a program that relies on well-developed processes and documentation.
Hosted by Reclamere
 
1:00 pm - 1:45 pmAdapting Your Security Efforts to Today’s Business, Legal and Privacy Trends
Stacey Halota, Vice President, Information Security and Privacy, The Washington Post Company

As organizations continue their shift to clouds for operational efficiency, adapt to popular new devices attaching to the network, and deploy technologies that reduce time to market and increase productivity, security must keep up. In addition, today’s legal and privacy landscape has a variety of proposed changes that potentially affect security. What strategies can you use to stay ahead of the technology and legal trends? How can you educate the organization that measured approaches are important to securing the organization’s overall objectives? Get key insights in this session.

 

1:45 pm - 2:15 pmCyberSecurity: Finding Synergy Between Industry and Government
Jeffrey Garonzik, Chief/Cyber Security Architect, Central Intelligence Agency

When CSOs and CISOs in government compare notes with their counterparts in corporate settings like banks, consumer-facing companies, cloud companies among others, much can be learned and shared in countering cyber threats. How do we maintain awareness of emerging technologies? What processes do we use to evaluate the efficacy of the vendors claims? What products will become tomorrow’s standards and how long will they last? How do we determine when to adopt major new technology platforms or when to sit it out? What are the major cycles that drive security models and their adoption, i.e., budgetary, legal requirements, catastrophic events, etc. that produce sudden and often substantial investments? Join us as a top government security expert shares what he knows about leveraging the best practices from industry and government.

2:15 pm - 3:00 pmBAE Systems’ Journey to Successful Cybersecurity and Risk Management
Eric Noonan, Vice President, CISO and General Manager of ETS, BAE Systems

As CISO of an organization with 90,000 employees, Eric Noonan knows that the secret ingredient to successfully managing risk at the executive committee level is engaging with the business. Join us for this session as he describes how his security and risk organization takes a risk management, not risk avoidance, approach and how this has enabled a global security assessment that the business embraces and supports.

3:00 pmClosing Remarks and Conference Concludes