Agenda Details
Speaker Roster
Expo Details
Registration Details

Get the Most Out of InfoSec World by Adding These Featured Summits
CISO Executive Summit
Sunday, April 6

Cloud Security Summit
Thursday, April 10

IT Audit Management Summit
Wednesday-Friday, April 9-11
Choose from Bonus Workshops 
to Get Extra CPEs
Full Agenda-by-Track
Full Agenda-by-Day
Monday, April 7

8:30 AM – 9:30 AM 
Welcome Keynote: Securing the Trenches to Securing Your Organization
Rob DuBois, Retired Navy SEAL; Security & Policy Advisor, Speaker & Author, SEAL of Peace Consulting

9:30 AM - 9:45 AM
Fighting Next-Generation Adversaries with Shared Threat Intelligence​
Phil Dangio, VP Enterprise Security Products, HP

10:00 AM – 12:15 PM 
A1/A2 A Grand Facade: Can Compliant Security Awareness Programs Stand a Real Test? DEMO

10:00 AM – 11:00 AM
B1 Cloud Control: Assurance in a Massively Scalable World
C1 Cyber Criminal Minds
D1 Operationalizing Security Intelligence
E1 Five Steps to Managing Third-Party Risks
F1 Hunting Attackers with Network Audit Trails
G1 Assessing the Risk of BYOD with Penetration Testing DEMO

12:15 PM
Luncheon Keynote: Balancing Business Control with Business Velocity
Malcolm Harkins, Vice President, Chief Security and Privacy Officer (CSPO), Intel Corporation

11:15 AM – 12:15 PM 
B2 A Small Conversation About Big Data OPEN DISCUSSION
C2 The Evolving Role of the CISO and Its Impact on You and Your Organization
D2 Autopsy Report: Famous IT Security Breaches; What Were the Signs and How They Could Have Been Prevented
E2 Building Our Risk Assessment Program CASE STUDY
F2 Integrating Security Into the Application Development Process
G2 Maturing Your Mobile Security Posture

1:30 PM – 2:30 PM
A3 Breaking Today’s Tools to Protect Against Tomorrow’s Threats
B3 Rethinking Security and Privileged Identity Management to Defend Against Nation-State Cyber-Warfare Attacks
C3 Social Networking and Social Media Use In “Active” Information Security Awareness Programs
D3 Crypto Currencies and Computer Crime
E3 Identifying Factors That Affect Risk Perception RESEARCH STUDY
F3 Securing Your Networks: Perspective of a Former USSS Executive
G3 Transitioning into a Mobile Security Architecture

3:15 PM – 4:15 PM
A4 Enterprise Open Source Intelligence Gathering
B4 Security OF and IN the Cloud-A Shared Responsibility Perspective
C4 Fighting Cybercrime: A Federal Perspective
D4 From Hero to Patsy – The Impact of a Third-Party Breach
E4 Attack-driven Defense
F4 Modern DDoS Defense: Approaches, Tools, Architecture
G4 Enhancing Productivity Through Centralized Access Management

4:30 PM - 5:15 PM
New Technology Showcase

5:15 PM – 7:15 PM 
Reception in the Expo

Tuesday, April 8

8:30 AM – 9:45 AM
A5 Security Imperatives for iOS & Android Apps DEMO
B5 The Intelligence-driven Security Organization: An Introduction to Data-Driven Security Management
C5 Auditing the Security of Virtualized Environments CASE STUDY
D5 Lessons Learned from Managing Malware Attacks 
E5 Developing a Toolkit for Conducting a Privacy Risk Assessment
F5 Agile Development Security DEMO 
G5 Proximity Security for Enterprise Mobility and BYOD  DEMO

10:00 AM – 11:00 AM
A6 Owning the Message Oriented Middleware
B6 Data Flow Analysis Techniques to Identify Data Leakage Risks
C6 How to Reduce Legal Exposures Before and After A Breach
D6 Breach Response – Is Your Organization Ready? 
E6 The Application Blind-Spothe Application Blind-Spot
F6 The Many Faces of NAC 
G6 (Protecting) The Ins and Outs of Mobile Containers

11:15 AM – 12:15 PM 
Keynote: Adversary-focused Information Security: Who Wants Your Data and Why?
Stewart A. Baker, Partner, Steptoe & Johnson LLP, Former First Assistant Secretary for Policy, United States Department of Homeland Security

12:15 PM – 2:00 PM 
Luncheon in the Expo

2:00 PM – 3:00 PM
A7 Network Forensics Tools Grew Up: Have You?
B7 Five Ways to Upgrade Your Security Posture
C7 Mastering Variances in Data Governance
D7 Insider Risk: Why the Trusted Turned Rogue, and How They (Almost) Got Away with It 
E7 Why IT Risk Management Fails
F7 I See Dead Hard Drives: Effectively Implementing & Managing Electronic Data Disposal & Destruction
G7 BYOD: Bring Your Own Déjà vu, We’ve Solved This Problem Before

3:30 PM – 4:30 PM
A8 Cyber Kill Chain Dissected in Advanced Targeted Attacks
B8 Operationalizing and Optimizing Privacy Practices
C8 Lost in the Supply Chain: How to Gain Assurance and Protect Your Information
D8/E8 Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again
F8 Demise of the Enterprise Perimeter and How To Fix It
G8 BYOD: Your CIO Decided You’re Doing It, Now How Do You Secure It?

4:30 PM – 5:15 PM
Blogger Panel: Security Game Changers Worth Posting AboutStephen Fosket, Organizer in Chief, Tech Field Day and featuring a panel of security bloggers

5:15 PM – 6:15 PM 
Cocktail Hour in the Expo

Wednesday, April 9 

8:30 AM – 9:30 AM 
Keynote: Wearable Devices: Consumer Fad or Enterprise Security Risk?
Chris Hazelton, Research Director, Mobile & Wireless, 451 Research

9:45 AM – 10:45 AM
A9 Why Can’t Johnny Program Securely?
B9/C9 How the Surveillance State is Disrupting IT Security
D9 Threat Intelligence: How to Reduce the Business Risk By Understanding New Threats
E9 Our Risk Assessment is Complete. Now What?
F9 From APT to Admins: Why Privileged User Management Matters
G9 Mobile Device Security: Why MDM Isn’t the Final Answer

11:00 AM – 12:00 PM  
A10 Building Trustworthy Clouds DEMO
B10 Intelligent Security: Unmasking the Architecture Behind Secure Public Clouds 
C10 The Information Security Program Build, Refresh or Audit CASE STUDY
D10 How Losing Your Memory is Actually a Data Breach Problem
E10 Demystifying Risk Management in ERPs 
F10 Watching the Shop: OSINT from the Inside Out
G10 Mobile Device Forensics

Monday, April 7 & Tuesday, April 8
Building Your Own Low-Cost Security Operations Center
MIS Training Institute               Phone (508) 879-7999            Web: www.misti.com