presenters

Sponsored Sessions

An Analysis of Recent Cyber Attacks

Over the past year, cyber attacks have gone from being a worst-case scenario for security teams to a real-world certainty. Yet for all the recent investment and focus on cyber security, attackers continue to succeed at stealing or destroying our most valued assets. In this discussion, we will deconstruct recent cyber attacks to see what is working in security and where the industry still has gaps. Then we will go beyond the search for simplistic silver bullets, and propose new models of defense-in-depth that can apply generically to detecting today's most sophisticated attacks.

This session will cover:

  • An analysis of recent cyber attacks and what they have in common
  • Understanding the inherent advantages attackers enjoy today, and how we can turn the tables
  • Proposing a repeatable methodology for automating the detection of breaches and APTs

sponsored by

presented by

Jason Tesarz

Better Security, Better Business

IT departments worldwide face an array of security threats, whether they manage traditional or NextGen/cloud based environments. Organizations, both large and small are realizing the importance of network security systems and have increased their investment in network security. In addition, there is now a growing realization that network security systems increases workforce productivity, reduces costs, and offer significant competitive advantages to an organization. Security challenges will be at the forefront of these changes exciting times are ahead. Those entrusted with security responsibilities are going to be challenged like never before. And security innovation will be rewarded enormously for those with courage and foresight, through the opportunities that are emerging. Lets take a look at how security is bought and managed so that change can be delivered with confidence.

sponsored by

presented by


Breached and Just Don't Know It? It's When, Not If.

Cyber-attacks now occur on an industrial scale. Information theft and the intentional disruption of digital and online processes are among the leading business risks that organizations face today. As many breaches go for months before they are detected, business leaders need to move their mindset from pure prevention to fast detection and response.

This session will cover the largest big data breaches of 2014, where millions of customer records were compromised, explaining just what went wrong and the ultimate cost to the company (not just financial but human too), and how the most powerful security intelligence solutions can help organizations detect and respond to high-impact threats early enough in the cyber kill chain to avoid material damage.

sponsored by

presented by

Trent Heisler

Dissecting the Malvertising Underworld

Consumers are constantly bombarded by advertising, especially on the World Wide Web. Total annual Internet advertising revenue from 2013 was over US $117bn, and will approach US $200bn by the year 2018. So many ad impressions are bought and sold daily, that it's nearly impossible to keep track of who is buying and selling what. This large number of online advertising industry "middlemen" creates opportunities for bad actors to hide. The result is malware delivered through online advertising, A.K.A. "malvertising". In this presentation we explore the seedy world of marketing affiliates, traffic generation, and the networks employed by attackers.

sponsored by

presented by

Jaeson Schultz

Learn How to Expose Advance Threats Faster Through Deep Endpoint Visibility

End points play the most crucial part in attack infiltration. Let RSA security team show you how to expose advanced threats faster, quickly triage, analyze suspicious activities, and have the necessary information to take action to stop the threat and limit any negative impact on your business. Attend the briefing and stand a chance to be selected for the RSA Enterprise Compromise Assessment Tool (ECAT) trial.

sponsored by

presented by

Prashant Mishra

Protecting Against Bleeding Edge Cyber Threats

When defending against bleeding edge cyber threats, it is critically important to identify the threat at the earliest stage possible. In this presentation we will review the People, Process, and Technology that the EMC CIRC utilizes to respond to host-based cyber threats from time of detection until host analysis.

sponsored by

presented by

Chris Thomas