2015 Enterprise Security Summit
 
Workshop / Breakout descriptions and Speakers are located within the registration process.
*Agenda subject to change.

Wednesday, February 18
11:00 a.m. Check-in Opens | Partner Pavilion Opens
1:00 p.m. - 2:30 p.m. Workshop Session I
2:45 p.m. - 3:45 p.m. Workshop Session II
4:00 p.m. - 5:00 p.m. Workshop Session III
5:15 p.m. - 6:15 p.m. Workshop Session IV
6:15 p.m. - 9:00 p.m. Welcome Reception



Thursday, February 19
7:00 a.m. - 8:00 a.m. Breakfast
8:00 a.m. - 12:30 p.m. General Session
12:35 p.m. - 1:45 p.m. Lunch - special presentation by Lastline
1:50 p.m. - 2:50 p.m. Breakout Session I
3:10 p.m. - 4:10 p.m. Breakout Session II
4:30 p.m. - 5:30 p.m. Breakout Session III
6:00 p.m. - 9:00 p.m. Offsite Dinner Event 



Friday, February 20
7:30 a.m. - 8:30 a.m. Birds of a Feather Breakfast
8:30 a.m. - 9:30 a.m. Breakout Session IV
9:50 a.m. - 10:50 a.m. Breakout Session V
11:10 a.m. - 12:10 p.m. Breakout Session VI
12:10 p.m. Adjourn




>>Workshops

Workshop Session I   Back
  • Insights on Your Industry: Finance / Banking / Insurance
  • Insights on Your Industry: Manufacturing / Technology Providers
  • Insights on Your Industry: Retail
  • Insights on Your Industry: Energy / Utilities
  • Insights on Your Industry: Healthcare / Life Sciences
Workshop Session II   Back
  • Enhancing Your Controls Series: Critical Security Controls 1-10
  • Enhancing Your Controls Series: Application Security Best Practices
  • Maximizing Value from Dell SecureWorks Series: Managed Services and In-House SIEM: Making Them Work Together
  • Protecting Your Networks Series: Recommendations to Harden Security Against Advanced Persistent Threats (APT) - Networks, Servers, Hosts and End Users
  • Mobile Security: What You Need to Consider in Your Mobile Deployments
Workshop Session III   Back
  • Enhancing Your Controls Series: Red Team Testing to Simulate the Advanced Threat
  • Enhancing Your Controls Series: Security Design and Architecture
  • Maximizing Value from Dell SecureWorks Series: Performance Tuning Your MSS Services
  • Protecting Your Networks Series:Strategies and Tactics to Detect and Remove the Unknown Threat
Workshop Session IV   Back
  • Enhancing Your Controls Series: Critical Security Controls 11-20
  • Enhancing Your Controls Series: Identity and Access Management as a Foundation for Security and Business Agility
  • Maximizing Value from Dell SecureWorks Series:Becoming Familiar with the Next Generation Client Portal
  • Improving Your Response Series: Strengthening Your Response: Incident Response Tabletop Exercise
>>Breakouts

Breakout Session I   Back
  • Intelligence-Driven Series: Seeing Beyond Your Network Edge
  • Understanding the Threat Series: Adversary Reactions to Technical Events
  • Aspiring CISO Series: Using Risk as the Basis for Your Operations
  • Security Reimagined Series: Security Instrumentation Principles
  • Special Topics: When You Don't Know if You've Been Breached: Hunting for the Threat
Breakout Session II   Back
  • Intelligence-Driven Series: Applying Threat Intelligence
  • Understanding the Threat Series: Lateral Movement
  • Improving Your Response Series: Forensics Readiness for When the Worst Happens
  • Aspiring CISO Series: Rethinking Your Security Budget
  • Special Topics: Advancing Security Operations: How to Build and Mature Effective Security Practices
Breakout Session III   Back
  • Intelligence-Driven Series: The New Security Model: Intelligence-driven Security
  • Understanding the Threat Series: Rules of Fight Club: Targeted Intrusions Edition
  • Aspiring CISO Series: Mitigating Risk Posed by Third Parties
  • Improving Your Response Series: The 10 Most Interesting Incident Response Engagements or Findings in 2014
Breakout Session IV   Back
  • Overcoming the Challenge Series: A Client's Perspective I: Banking/Finance
  • Overcoming the Challenge Series: A Client's Perspective II: TBA
  • Improving Your Response Series: Accelerating Incident Response with Digital Forensics Strategy and Tips
  • Intelligence-Driven Series: The New Security Model: Intelligence-driven Security (2nd offering)
  • Understanding the Threat Series: The Insider Threat: How Do You Battle a Threat Operating Within Your Four Walls?
Breakout Session V   Back
  • Protecting Your Endpoints Series: The Vigilant Employee: Security Awareness Strategies to Change Employee Behavior
  • Protecting Your Endpoints Series: End Game: Understanding Endpoint Security Technologies
  • Improving Your Response Series: Designing a Resilient Computer Security Incident Response Plan (CSIRP)
  • Intelligence-Driven Series: Seeing Beyond Your Network Edge (2nd offering)
Breakout Session VI   Back
  • Security Reimagined Series: The Evolving Security Model
  • Improving Your Response Series: The 10 Most Interesting Incident Response Engagements or Findings in 2014 (2nd offering)
  • Mobile Security: Securing BYOD: Defending Today’s Mobile Endpoints
  • Special Topics: How to Stop Worrying and Love the Cloud