HomeAgenda DetailsSpeaker RosterVenue & HotelExpo DetailsRegistration Details

Monday, March 23

10:00 AM - 11:00 AM
C1 Security for the Resource Challenged
William Miaoulis Director of Information Security, Dekalb Medical
Cost effective security processes and tools for meeting compliance requirements. Free tools and resources will be identified for:
Risk analysis
Training the masses
Drafting policy and procedure templates
Intrusion detection and prevention
Vulnerability assessments and pen testing
BYOD process controls
Finding low-cost security assistance

11:15 AM – 12:15 PM
C2 Late Breaking Session

1:30 PM – 2:30 PM
C3 The New Information Security Leader
Paul Rohmeyer, PMP, M.B.A., Ph.D., Program Chair – MS Information Security and Assurance, Embry-Riddle
Evaluate the need for effective leadership throughout the security organization 
Multiple career paths to security leadership roles 
Recruitment strategies and succession planning 
The emerging relationship between security, IT, and organizational leaders 
Attributes of strong organizational leaders within the context of the information security mission 

3:15 PM – 4:15 PM
C4 Anatomy of a Cloud Data Breach
Krishna Narayanaswamy, Chief Scientist, Netskope
Learn how to detect a breach in the cloud using anomaly detection techniques
Learn how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach

Tuesday, March 24

8:30 AM – 9:45 AM
C5 Destroying Education and Awareness Programs DEMO
David Kennedy, Founder, Principal Security Consultant, TrustedSec LLC
It has never been easier for hackers to own a network; a look at why traditional approaches aren’t working
Examine the defensive measures we teach to detect attack
How to circumvent these education controls in order to get into anything
Advanced evasion techniques on getting around some of the most popular technologies

10:00 AM – 11:00 AM
C6 Internet of Things (IoT) and its Impact on Your Organization and Your Life
Thomas DeLaine, Jr., Director of Information Security, Comprehensive Health Services, Incorporated (CHSi)
Why major corporations are moving to gain position in the project IoT marketplace
How IoT is already being used by government and commercial organizations 
Why IoT could impact employer/employee relationships and your privacy at home 
How security can integrate into IoT products and services upfront

2:00 PM – 3:00 PM
C7 Not Go Quietly: Surprisingly Effective Strategies and Teammates to Overcome
Josh Corman, CTO, Sonatype 
David Etue, Vice President, Corporate Development Strategy, SafeNet, Inc.
A new, simple table top model to modernize program focus (and finally shatter that compliance-only mindset)
Identify at least 3 new surprising teammates, and case studies on how best to leverage them
A model for maximizing the yield of defensive investments of time and resources 
A pragmatic and actionable understanding of opportunities represented by the DevOps cultural revolution 

​3:30 PM – 4:30 PM
C8 Succeeding in Security by Measuring Your Failure
Rafal Los, Director, Office of the CISO, Accuvant
A breach is not a binary end-state; in failures, we can find success
How to measure the shades of the gradient
What to measure and how to measure effectively
Understand how to identify security challenges against business goals, and effectively communicate these measurements

Wednesday, March 25

9:45 AM – 10:45 AM
C9 Cybersecurity and Incident Response: Preparedness and Reaction 
Erez Liebermann, Vice President, Senior Counsel, Corporate Investigations at Prudential Financial
The current threat landscape 
The importance of involving the business in cybersecurity 
The framework of a holistic incident response program 
First steps after being notified that you have a breach 
Benefits of working with government on cybersecurity

11:00 AM – 12:00 PM
C10 Security Project Management
Dr. William Cross, Professor, St. Petersburg College
Learn to control a project and hit your delivery and cost targets
Why projects go wrong
How to recognize and prevent project problems
The secret of successful progress measurement
Problems inherent in large projects, and how to keep them from derailing your care
Top-notch training. Compelling speakers. Meaningful interactions.
Register for the 2015 Infosec Conference
Join the conversation using #InfoSecWorld
Contact Us

Registration/General Inquiries:
Customer Service
(508) 879-7999 ext. 501
[email protected]

Speaking Opportunities:
Katherine Teitler
Director of Content Development 
[email protected] or (508) 532-3624

Exhibit Sales:
Vendors A-L
CJ Oliveri
Director of Sales, Conference Division
[email protected] or (508) 532-3609

Vendors M-Z
Howard Weinman
Director of Sales, Conference Division
[email protected] or (508) 532-3652