HomeAgenda DetailsSpeaker RosterVenue & HotelExpo DetailsRegistration Details

Monday, March 23

10:00 AM - 11:00 AM
B1 Mission Critical Data: Is Yours Ready for the Cloud?
George Gerchow, Cloud Security & Compliance Evangelist, VMWare
The politics behind SaaS
Behind-the-scenes look at SaaS based architecture
Reduced footprint
Reverse proxy
Secure connection
SCAP (Security Content Automation Protocol) 
Encryption options
From minimum viable product to GA in 3 months

11:15 AM – 12:15 PM 
B2 Deploying and Using Data Loss Prevention Without Dedicating an Army
Jerry Tilson, Information Security Technology Leader, Mary Kay, Inc.
Setting expectations and deploying DLP
Rule writing 
Getting the false positive rate under control 
Gathering information you never considered before
Common DLP pitfalls and oversights

1:30 PM – 2:30 PM
B3 Cloud as an Opportunity for Enhanced Security
Dr. Nataraj Nagaratnam, Engineer & Chief Technology Officer, Security Solutions, IBM Security Systems
How cloud impacts security posture
A comprehensive approach to managing access
Learn to protect applications and data, and gain visibility in hybrid cloud environments

3:15 PM – 4:15 PM Research Study
B4 Research Study 4 Epidigitalogy: What InfoSec Can Learn from Surveying for Digital Diseases
Efrain Ortiz, Director, Market and Technology Innovation Group 
The similarities between biological and digital disease control 
An epidemiological analog that can be used to communicate day to day processes and success 
The (S.I.R) graph Susceptibility, Infection, Recovery as a means of tracking a large number of systems over long periods
Lessons learned from biology that can be applied to digital diseases

Tuesday, March 24

8:30 AM – 9:45 AM
B5 Defending Your Cloud Against Targeted Attacks
Dipto Chakravarty, EVP Engineering & Products, ThreatTrack Security, Inc.
Learn how private, hybrid and public clouds increase the complexity of security assurance 
Side-effects of data center walls’ disappearance and mobile device proliferation 
Artifacts of targeted threats when multi-tenancy is exploited, and APTs proliferate throughout the ecosystem. 
How to set up a cloud with layered security so that it can be defended against blended threats 
How to combine the techniques to combat the worst of “outside in” and “inside out” targeted attacks

10:00 AM – 11:00 AM
B6 Cloud Forensics: What to do When Your Data has Been Compromised
Bill Dean, Director of Computer Forensics, Sword & Shield Enterprise Security
If your “cloud” is compromised, what data will you have available for analysis?
Understand the sources of evidence available from various cloud models
Examples of how a compromised cloud provider equals compromised clients
How "far" you can really take the security testing of cloud providers

2:00 PM – 3:00 PM
B7 Selected Technical Security Considerations of the OData Protocol
John Willson, Technical Architect Consultant Project Team, aemera.org 
Get to know the philosophy behind an open data protocol
Test a business application solution stack as it relates to the OData protocol using a COBIT 5-like approach
Where the OData protocol fits with respect to HTTP(s) and HTML
How to defend against 3 specific attacks that could be using OData
Acquire resources, tools, and knowledge in advance of the widespread use of this coming global standard protocol

3:30 PM – 4:30 PM
B8 Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
David Etue, Vice President, Corporate Development Strategy, SafeNet, Inc.
Discuss data control, ownership, and identity management in the cloud
Are the latest technologies helping or hindering data security?
Regulatory concerns
Updates to global legal issues

Wednesday, March 25

9:45 AM – 10:45 AM
B9 What are your Top 25 Cloud Security Weaknesses?
Randall Brooks, CISSP, CSSLP, Engineering Fellow, Raytheon Cyber Solutions Inc. (RCSI) 
CSA and SAFECode's practices for secure development of cloud applications 
Common threats to cloud computing 
How to avoid design and implementation issues 
Benefits of secure development training 
Free online resources for application security training

11:00 AM – 12:00 PM
B10 Detecting Cloud Anomalies in a World Where Everything is Strange
Dr. Ram Keralapura, Director of Data Science, Netskope
Learn how unsupervised machine learning techniques can identify relationships not apparent to humans and lead to effective results
Why context matters in detecting anomalies in the cloud
Real-world examples of cloud anomalies from enterprise cloud usage data, and the forensic drill-downs behind them
An actionable roadmap for getting started with anomaly detection in the cloud
TOOLS & DEMOS
CLOUD & DATA PROTECTION
Top-notch training. Compelling speakers. Meaningful interactions.
Register for the 2015 Infosec Conference
Join the conversation using #InfoSecWorld
Contact Us


Registration/General Inquiries:
Customer Service
(508) 879-7999 ext. 501
[email protected]

Speaking Opportunities:
Katherine Teitler
Director of Content Development 
[email protected] or (508) 532-3624

Exhibit Sales:
Vendors A-L
CJ Oliveri
Director of Sales, Conference Division
[email protected] or (508) 532-3609

Vendors M-Z
Howard Weinman
Director of Sales, Conference Division
[email protected] or (508) 532-3652