03/22/2012 | |||||||||||||
7:30am - 8:30am | Registration and Networking Breakfast | ||||||||||||
8:30am - 8:45am | Opening Remarks Derek Slater, Editor in Chief, CSO magazine and CSOonline.com | ||||||||||||
8:45 am - 9:45 am | Understanding Today’s Cyber Attacker: The State of Cyber Crime and Espionage Larry Castro, Managing Director, The Chertoff Group Getting ahead of cyber attacks today is as much about knowing your enemy as it is aligning proper prevention and defenses. What’s motivating today’s actors? Who are they, and who’s backing them? Get an up-to-the-minute understanding in this session. | ||||||||||||
9:45 am - 10:15 am | Modern Approaches to Cyber Espionage and Advanced Security Threats Rich Baich, Principal, Deloitte & Touche LLP Advanced persistent threats are modern, automated versions of traditional espionage, and are the cause and the silent perpetrator behind today’s mounting cybersecurity risks. Without proper strategic awareness, some businesses unfortunately operate like ostriches -- and the all-protective sand in which they hide is simply made of compliance requirements and safe practice regulations. But as covert activities today increasingly attempt to embed themselves within organizations and government with stealth techniques and exploits, it’s time for organizations to create a more appropriate and proactive security posture with business-enabling capabilities. Join us for this session to learn the latest strategies in prevention and mitigation.
| ||||||||||||
10:15 am - 10:45 am | Networking Break | ||||||||||||
10:45 am - 11:25 am | CyberSecurity 2012: What’s Ahead? Larry Castro, Managing Director, The Chertoff Group Jeffrey Garonzik, Chief/Cyber Security Architect, Central Intelligence Agency Stacey Halota, Vice President, Information Security and Privacy, The Washington Post Company Mark Leary, CISO , TASC Derek Slater, Editor in Chief, CSO magazine and CSOonline.com How are threats transforming and unfolding to change the landscape in the coming year? What indicators are we seeing that will adjust our countermeasures? What’s in your incident response toolkit? And are you ready for the big one? Join us for our panel discussion as our experts will give advice, and take your audience questions. | ||||||||||||
11:30 am - 12:00 pm | Achieving Cyberconfidence through Situational Awareness Dean Weber, Director and CTO, CyberSecurity, CSC As more and more organizations are targeted by sophisticated, automated and coordinated attacks, the challenges continue to increase across the emerging threat landscape. Traditional efforts to head off these threats — often with narrow approaches of various bolt-on point solutions across antivirus, firewall, intrusion prevention, and single sign-on — typically present information in different formats, stored it in different places and reported to different locations. At the same time, enterprises are anxious to find strategies that allow them to take a step back, examine their situation, establish confidence in effective security controls, and focus appropriate resources on critical needs. In this session, learn how CSC has developed an enterprise situational awareness capability, enabling an organization’s current security components to be integrated for a centralized view of their security-related practices, processes, events, and alerts — all presented in an actionable and consolidated dashboard. Join us as we review: how to achieve a real-time view into your threat and risk profile; develop an enterprise security architecture that integrates security controls, controls based monitoring, and threat intelligence; and build out a true Enterprise Security Situational Awareness framework. | ||||||||||||
12:00 pm - 1:00 pm | Networking Lunch with Discussion Tables 21st Century Incident Response Join us as we discuss the fundamentals of incident response planning and explore how to craft and implement a program that relies on well-developed processes and documentation. Hosted by Reclamere | ||||||||||||
1:00 pm - 1:45 pm | Adapting Your Security Efforts to Today’s Business, Legal and Privacy Trends Stacey Halota, Vice President, Information Security and Privacy, The Washington Post Company As organizations continue their shift to clouds for operational efficiency, adapt to popular new devices attaching to the network, and deploy technologies that reduce time to market and increase productivity, security must keep up. In addition, today’s legal and privacy landscape has a variety of proposed changes that potentially affect security. What strategies can you use to stay ahead of the technology and legal trends? How can you educate the organization that measured approaches are important to securing the organization’s overall objectives? Get key insights in this session.
| ||||||||||||
1:45 pm - 2:15 pm | CyberSecurity: Finding Synergy Between Industry and Government Jeffrey Garonzik, Chief/Cyber Security Architect, Central Intelligence Agency When CSOs and CISOs in government compare notes with their counterparts in corporate settings like banks, consumer-facing companies, cloud companies among others, much can be learned and shared in countering cyber threats. How do we maintain awareness of emerging technologies? What processes do we use to evaluate the efficacy of the vendors claims? What products will become tomorrow’s standards and how long will they last? How do we determine when to adopt major new technology platforms or when to sit it out? What are the major cycles that drive security models and their adoption, i.e., budgetary, legal requirements, catastrophic events, etc. that produce sudden and often substantial investments? Join us as a top government security expert shares what he knows about leveraging the best practices from industry and government. | ||||||||||||
2:15 pm - 3:00 pm | BAE Systems’ Journey to Successful Cybersecurity and Risk Management Eric Noonan, Vice President, CISO and General Manager of ETS, BAE Systems As CISO of an organization with 90,000 employees, Eric Noonan knows that the secret ingredient to successfully managing risk at the executive committee level is engaging with the business. Join us for this session as he describes how his security and risk organization takes a risk management, not risk avoidance, approach and how this has enabled a global security assessment that the business embraces and supports. | ||||||||||||
3:00 pm | Closing Remarks and Conference Concludes |