presenters

Sponsored Sessions

Combining Firewalls and Tar Traps to Create a Hacker's Worst Nightmare

As the market moves towards more flexible, intelligent and programmatic networks, Juniper is delivering network security solutions for service providers and enterprises cloud builders who need uncompromising performance and availability and low tolerance for intrusions. In this session, you'll learn about Juniper's dynamic, intelligent firewall solution, including the use of deception techniques to thwart miscreants in the reconnaissance phase of an attack.

sponsored by

presented by

Michael Covington

How the European Community Can Help Your Cyber Security Business

EIT ICT Labs is an initiative of the European Union and its mission is to drive European leadership in ICT innovation for economic growth and quality of life. The EIT ICT Labs Privacy, Security & Trust Action Line provides funding and practical business support to enterprises and startups in the cyber security and privacy arena. Communication Valley Reply presents it services Active Fraud Prevention and IDENTITYOU, marketed in EU thanks to EIT ICT Labs support. The services provide effective mitigation to the whole malware / web fraud lifecycle from detection to recovery. The services exploit malware and breach detection techniques to provide something useful to the world.

sponsored by

presented by

Daniele Vitali &  Jovan Golic

Inth3Wild: Insights from the Front Lines of Threat Intelligence

Attackers are constantly adapting their tools, techniques, and procedures as they seek to exploit new technologies and new vulnerabilities. This session takes an up-to-date look at the underbelly of cybercrime and current threat actors based on recent insight from RSA's Research and Threat Intelligence teams: who are the latest targets, how are they perpetrating their attacks and how can you calibrate your defense strategies to incorporate up-to-date intelligence for more proactive defense.

sponsored by

presented by

Jason Rader

Protecting Data Assets: From Data Center to the Cloud

Adoption of cloud computing is one of the most transformational shifts in technology today. Yet, protecting applications and data in the cloud is very much a challenge. A new data-centric approach is protect against today's sophisticated attacks is needed in the Data Center and the Cloud. This session covers how Data Center Security protects businesses' most valuable assets, describes different cloud deployments and their security risks, and it addresses the required evolution of security posture of these assets for better protection (and compliance).

sponsored by

presented by

Chris Grove

The Harsh Reality of Cyber Protection

Attackers are getting more targeted evasive and advanced, deploying unknown exploits and unique malware that current day endpoint security is simply not equipped to prevent or even detect. Join Palo Alto Networks as we walk you through the shortcomings of existing endpointsecurity, and why it's leaving your enterprise vulnerable tosophisticated andzero-day attacks,waiting for detection and remediation to step in, which is too little too late.

sponsored by

presented by

Eric Van Sommeren