twitterface bookin

SC Congress New York 2013 Sessions

Search the SC Congress New York sessions below. Enter your search term in quotes if you require an exact match.

Search by Keyword  
Search by date-range  

October 24, 2013
8:30 AM - 9:30 AM
Registration and breakfast served
9:30 AM - 10:10 AM
Risky business
Speaker(s)
Mark Leary, VP & CISO, Xerox Corporation
Shukri Khader, CISO, Avon Products
David Sheidlower , CISO, Health Quest Systems, Inc.
10:15 AM - 10:55 AM
Is that a smartphone in your pocket?
Speaker(s)
Christopher Holley, Messaging and Mobility Systems Engineer, MIT Lincoln Laboratory
Jeffrey W Brown, Head, IT security, Risk and Compliance, AIG Investments
11:00 AM - 12:00 PM
Expo Hall Opens - Coffee Break
12:00 PM - 1:00 PM
KEYNOTE LUNCH: Expectations of online privacy during a national crisis
Speaker(s)
Lisa Sotto, Partner, Hunton & Williams
Orrie Dinstein, Chief Privacy Leader, GE Capital
1:00 PM - 1:30 PM
The Art of Cyber War: 2013
Sponsored by:
The Art of Cyber War: 2013
Track 1
Breakout Room 1
The Art of Cyber War: 2013

Is the world in the midst of a cyber-war? If so, what are the implications? Hear Radware explore some of the most notable recent cyber-attacks and how many of the findings correlate with the tenets of warfare as defined in The Art of War by Sun Tzu, the ancient military general, strategist and tactician. How should organizations be preparing for an information security landscape that is shaped by ideologically motivated cyber warfare rather than just opportunistic cyber-crime? Hear about the techniques being employed to safeguard IT operations in a theatre that is witnessing ever more sophisticated attacks.

Speaker(s)
Carl Herberger, Vice President of Security Solutions, Radware
1:00 PM - 1:30 PM
It's
Sponsored by:
It's
Track 2
Breakout Room 2
It's "When" not "If": Discovering when breaches occur through Advanced Security Analytics

This presentation will discuss the challenges of discovering what 'normal' behavior is across multiple dimensions of an enterprise (e.g., hosts, applications, users, networks, etc.). You'll then learn how security analytics can be used to overcome those challenges to detect abnormal activity indicative of a breach or advanced threat.

Speaker(s)
Luis Rico, Sr. Sales Engineer, LogRhythm Inc
1:00 PM - 1:30 PM
Securing Big Data is a Business Imperative
Sponsored by:
Securing Big Data is a Business Imperative
Track 3
Breakout Room 3
Securing Big Data is a Business Imperative

Big Data initiatives are heating up. From financial services to healthcare, retail and manufacturing, organizations across almost every vertical market are investing in Big Data technologies to improve the quality and speed of decision making as well as enable better planning, forecasting, marketing, and customer service. The big challenge, however, is to reap the enormous business benefits of Big Data in an era of intensifying threats without putting important data at risk of a breach or violating privacy or compliance requirements. Big Data security is a monumental challenge and is becoming a growing concern for enterprises of all sizes as they look to gather business intelligence through Big Data analytics while also doing what's necessary to protect what matters.

Speaker(s)
Sol Cates, CSO, Vormetric
1:00 PM - 1:30 PM
Sponsored Session TBD
Track 4
Keynote Room
Sponsored Session TBD
1:30 PM - 2:10 PM
Your company is more than likely already pwned
Speaker(s)
Jay Leek, CISO, The Blackstone Group
Michael Higgins, CISO, NBC Universal
2:10 PM - 3:00 PM
Expo Hall Break - Coffee Break
3:45 PM - 4:30 PM
Where's that Cloud, and how do you Secure what's in it?
Sponsored by:
Where's that Cloud, and how do you Secure what's in it?
Track 1
Breakout Room 1
Where's that Cloud, and how do you Secure what's in it?

Your corporate information is moving to the cloud, often through a carefully managed process run by IT and sometimes through other employees' creative efforts. This raises many questions about how to protect and manage your corporate content in the cloud. In this session we'll outline several important factors to consider before, during, and after the migration to the cloud. We'll also cover best practices on how to secure that content.

Speaker(s)
Glenn Cobb, Eastern Regional Director, CipherCloud
3:45 PM - 4:30 PM
Taking the Pulse of Privileged Access Management
Sponsored by:
Taking the Pulse of Privileged Access Management
Track 2
Breakout Room 2
Taking the Pulse of Privileged Access Management

Discussed will be the shifting state of the Privileged Access Management market including best practices and what features you should look for in a PAM solution.

Speaker(s)
Bruce Macdonald, senior IAM solutions architect, Hitachi ID Systems
3:45 PM - 4:30 PM
Sponsored Session TBD
Sponsored by:
Sponsored Session TBD
Track 3
Breakout Room 3
Sponsored Session TBD
3:45 PM - 4:30 PM
Sponsored Session TBD
Track 4
Keynote Room
Sponsored Session TBD
4:35 PM - 5:15 PM
CyberStorm - from reality, to book of fiction to movie
Speaker(s)
Matthew Mather, Author, CyberStorm
5:20 PM - 6:00 PM
KEYNOTE: Critical infrastructure protection
Speaker(s)
Larry Zelvin, Director Of National Cybersecurity Communication Integration Center, Department of Homeland Security
Mark Weatherford, Principal, The Chertoff Group
Philip Reitinger, Senior Vice President, CISO, Sony
6:00 PM - 7:00 PM
Closing Cocktail Reception
6:30 PM - 7:00 PM
Passport to Prizes