>>Workshops
|
Workshop Session I Back |
- Insights on Your Industry: Finance / Banking / Insurance
- Insights on Your Industry: Manufacturing / Technology Providers
- Insights on Your Industry: Retail
- Insights on Your Industry: Energy / Utilities
- Insights on Your Industry: Healthcare / Life Sciences
|
Workshop Session II Back
|
- Enhancing Your Controls Series: Critical Security Controls 1-10
- Enhancing Your Controls Series: Application Security Best Practices
- Maximizing Value from Dell SecureWorks Series: Managed Services and In-House SIEM: Making Them Work Together
- Protecting Your Networks Series: Recommendations to Harden Security Against Advanced Persistent Threats (APT) - Networks, Servers, Hosts and End Users
- Mobile Security: What You Need to Consider in Your Mobile Deployments
|
Workshop Session III Back |
- Enhancing Your Controls Series: Red Team Testing to Simulate the Advanced Threat
- Enhancing Your Controls Series: Security Design and Architecture
- Maximizing Value from Dell SecureWorks Series: Performance Tuning Your MSS Services
- Protecting Your Networks Series:Strategies and Tactics to Detect and Remove the Unknown Threat
|
Workshop Session IV Back |
- Enhancing Your Controls Series: Critical Security Controls 11-20
- Enhancing Your Controls Series: Identity and Access Management as a Foundation for Security and Business Agility
- Maximizing Value from Dell SecureWorks Series:Becoming Familiar with the Next Generation Client Portal
- Improving Your Response Series: Strengthening Your Response: Incident Response Tabletop Exercise
|
Breakout Session I Back |
- Intelligence-Driven Series: Seeing Beyond Your Network Edge
- Understanding the Threat Series: Adversary Reactions to Technical Events
- Aspiring CISO Series: Using Risk as the Basis for Your Operations
- Security Reimagined Series: Security Instrumentation Principles
- Special Topics: When You Don't Know if You've Been Breached: Hunting for the Threat
|
Breakout Session II Back |
- Intelligence-Driven Series: Applying Threat Intelligence
- Understanding the Threat Series: Lateral Movement
- Improving Your Response Series: Forensics Readiness for When the Worst Happens
- Aspiring CISO Series: Rethinking Your Security Budget
- Special Topics: Advancing Security Operations: How to Build and Mature Effective Security Practices
|
Breakout Session III Back |
- Intelligence-Driven Series: The New Security Model: Intelligence-driven Security
- Understanding the Threat Series: Rules of Fight Club: Targeted Intrusions Edition
- Aspiring CISO Series: Mitigating Risk Posed by Third Parties
- Improving Your Response Series: The 10 Most Interesting Incident Response Engagements or Findings in 2014
|
Breakout Session IV Back |
- Overcoming the Challenge Series: A Client's Perspective I: Banking/Finance
- Overcoming the Challenge Series: A Client's Perspective II: TBA
- Improving Your Response Series: Accelerating Incident Response with Digital Forensics Strategy and Tips
- Intelligence-Driven Series: The New Security Model: Intelligence-driven Security (2nd offering)
- Understanding the Threat Series: The Insider Threat: How Do You Battle a Threat Operating Within Your Four Walls?
|
Breakout Session V Back |
- Protecting Your Endpoints Series: The Vigilant Employee: Security Awareness Strategies to Change Employee Behavior
- Protecting Your Endpoints Series: End Game: Understanding Endpoint Security Technologies
- Improving Your Response Series: Designing a Resilient Computer Security Incident Response Plan (CSIRP)
- Intelligence-Driven Series: Seeing Beyond Your Network Edge (2nd offering)
|
Breakout Session VI Back |
- Security Reimagined Series: The Evolving Security Model
- Improving Your Response Series: The 10 Most Interesting Incident Response Engagements or Findings in 2014 (2nd offering)
- Mobile Security: Securing BYOD: Defending Today’s Mobile
Endpoints
- Special Topics: How to Stop Worrying and Love the Cloud
|