twitterface bookin

SC Congress Chicago 2013 Sessions

Search the SC Congress Chicago sessions below. Enter your search term in quotes if you require an exact match.

Search by Keyword  
Search by date-range  
Search by Speaker  

Click on the sessions to see full details.


November 20, 2013
8:30 AM - 9:30 AM
Registration and Breakfast served
9:30 AM - 10:10 AM
Inside, outside, upsidedown: Staying ahead of the threat, wherever it is
Speaker(s)
Brad Boroff, CISO, Illinois Department of Revenue
Chris Sutherland, US CISO, BMO Financial Group
Howard Haile, CISO, SCL Health System
10:15 AM - 10:55 AM
Securing the SMB
Speaker(s)
Daniel Polly, VP, Enterprise Information Security Officer, First Financial Bank
11:00 AM - 12:00 PM
Expo Hall Opens - Coffee Break
12:00 PM - 1:00 PM
KEYNOTE LUNCH: How The Surveillance State Is Changing IT Security Forever
Speaker(s)
Richard Stiennon, Chief Research Analyst, IT-Harvest
1:00 PM - 1:30 PM
Where's That Cloud, and How Do You Secure What's In It?
Sponsored by:
Where's That Cloud, and How Do You Secure What's In It?
Track 1
Breakout Room 1
Where's That Cloud, and How Do You Secure What's In It?

This session will outline several important factors to consider before, during, and after the migration to the cloud. It also covers best practices on how to secure that content.

Speaker(s)
Jim Brzezinski, Vice President, Central US, CipherCloud
1:00 PM - 1:30 PM
Securing Content in the Changing Landscape of the Mobile Enterprise
Sponsored by:
Securing Content in the Changing Landscape of the Mobile Enterprise
Track 2
Breakout Room 2
Securing Content in the Changing Landscape of the Mobile Enterprise

This presentation will focus on the importance of Enterprise Mobility Management (EMM), including secure collaboration and mobile access to content on ECM systems. The benefits and risks of private vs public cloud deployment solutions will also be discussed.

Speaker(s)
Rama Kolappan, Director, Product Marketing, Accellion
1:35 PM - 2:15 PM
Going Mobile
Speaker(s)
A. Spencer Wilcox, Special Assistant to the Chief Security Officer and Managing Security Strategist, Exelon
Carl Cammarata, CISO, Northwestern University, Feinberg School of Medicine
Jeffrey Ingalsbe, Director, Center for Cyber Security and Intelligence Studies & Chair, Computer Information Systems, University of Detroit Mercy
2:15 PM - 3:05 PM
Expo Hall Break - Coffee Break
3:05 PM - 3:45 PM
KEYNOTE: Funding Your Programs Through Smart Risk and Security Management
Speaker(s)
Arlan McMillan, CISO & HIPAA Security Officer, City of Chicago
3:50 PM - 4:20 PM
The Art of Cyber War
Sponsored by:
The Art of Cyber War
Track 1
Breakout Room 1
The Art of Cyber War

Is the world in the midst of a cyber-war? If so what are the implications? Hear Radware explor some of the most notable recent cyber-attacks and how many of the findings correlate with the tenets of warfare as defined in The Art of War by Sun Tzu, the ancient military general, strategist and tactician. How should organizations be preparing for an information security landscape that is shaped by ideologically motivated cyber warfare rather than just opportunistic cyber-crime? Hear about the techniques being employed to safeguard IT operations in a theatre that is witnessing ever more sophisticated attacks.

Speaker(s)
David Hobbs, Director, Security Solutions, Radware
3:50 PM - 4:20 PM
A Blueprint for the Perfect Attack: Addressing the Open Doors in your APT Strategy
Sponsored by:
A Blueprint for the Perfect Attack: Addressing the Open Doors in your APT Strategy
Track 2
Breakout Room 2
A Blueprint for the Perfect Attack: Addressing the Open Doors in your APT Strategy

Targeted cyber-attacks are steadily increasing, and business executives face challenges with trust exploits. While organizations adopt cloud computing and allow employee-owned devices onto the network, the challenge of securing company data everywhere increases exponentially.

When it comes to advanced persistent threats (APTs), bad actors will take advantage of any and every exploit that they can use to steal your data, and look for the weakest link in your security systems. Common, well-known trust exploits like digitally signed malware, poor key and certificate security, fraudulent certificates and SSH keys and weak outdated cryptographic methods are all still in place in many organizations.

Cybercriminals and nation-backed operators have successfully used unsecured keys and certificates to breach trust on enterprise and government agency systems on repeated occasion. Most global organizations have no ability to detect anomalies or to respond to attacks on trust that leverage compromised, stolen or fabricated keys and certificates.

Because of these deficiencies, enterprises are “sitting ducks” according to a recent Forrester Consulting report. Organizations need to gain control over trust and plug the gap related to key and certificate-based exploits.

Speaker(s)
Gregory Webb, Vice President, Marketing, Venafi
4:25 PM - 5:05 PM
Security, privacy and whistleblowing
Speaker(s)
Justine Young Gottshall, Esq., Partner, InfoLawGroup LLP
Kevin Novak, Senior Vice President and CISO, Northern Trust
5:10 PM - 6:00 PM
KEYNOTE: Hacking the Human; the Science of Social Engineering and Pen-testing, Perfected
Speaker(s)
Chris Hadnagy, Chief Human Hacker
Paul Kelly, The Paul Ekman Group, LLC
6:00 PM - 7:00 PM
Closing Cocktail Reception
6:30 PM - 7:00 PM
Passport to Prizes