October 24, 2012 - New York City
Within the next couple of years the world will experience more intentionally executed and demonstrated cyber attacks. And the development of offensive cyber weapons will become fiercer and publicly more acceptable.
Cyberspace, the fifth dimension of warfare, has already become an important arena of world politics. The lines between war and peace have blurred. And what is developed for one purpose can easily spill into the hands of others. Stuxnet becomes Gauss. What’s next and how will it affect what you are trying to protect?
Defense, resilience, and offense make up the components required for a company or country to protect itself. You need them all.
Join us for a first-hand opportunity to learn the inside truth about what is really happening on both the offensive and defensive side of the growing cyber arms race.
3:30pm - Registration
4:00pm - Welcome Remarks
Marci McCarthy
CEO and President
T.E.N.
Biography
4:10pm - Keynote Address: Cyber Wars – Coming to Your Organization Sooner than you Think
Gauss represents the next evolution of cyber warfare. According to multiple reports, the malware appears to be repurposed from a nation sponsored, industrial espionage tool into a new, highly encrypted analyzer of banking transactions. What happens when these types of sophisticated, bleeding edge tools become available for sale in the malware marketplace? Who should be held accountable when a government sponsored espionage tool is repurposed for criminal activity? And what can organizations do to protect their own networks?
4:55pm - Executive Roundtables Co-Moderated by Leading ISE Alumni and Sponsor Thought Leaders
Vas Rajan
Managing Director & Chief Information Security Officer
CLS Bank International
Biography
Distributed Denial of Service Attacks – Holding Your Own Against the Attackers
Distributed Denial of Service (DDoS) attacks are a critical threat for any organization that conducts business online. DDoS attacks are emerging as the weapon of choice for hackers, political activists and international cyber terrorists because they are inexpensive, easy to execute and difficult to stop. Organizations need to ensure operational continuity and resource availability with a vigilant DDoS mitigation approach. Where are you in preparing for DDoS attacks?
David Ritenour
Chief Information Security Officer
SunGard Financial Corporation
Biography
Real World IT Infrastructure Testing – The Art of Field Testing
The majority of intrusion prevention systems, unified threat management systems and next-generation firewall products fail when faced with the advanced evasion techniques increasingly used in sophisticated cyber attacks. Many security products pass simulated and recorded evasions when these are predefined and stable in a lab environment. However, when facing live and dynamic evasion-disguised exploits, these systems go blind and are incapable of protecting your data assets. To learn the true level of your protection against AETs, the anti-evasion capabilities of your security devices must be field-tested in a real environment by using your own policies and configurations. Do you trust your vendors and internal team to test consistently and honestly?
John Masserini
Chief Security Officer
MMiami Holdings, Inc.
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010
Biography
Next Generation Security and Beyond – Changing the Game of Network Security
IT and business infrastructure is increasingly dynamic, and information security must evolve to support it. The future of information security infrastructure is contextual and adaptive, capable of changing to support rapidly changing threat and business environments in near real time. Network security solutions are evolving to incorporate application awareness and identity awareness into their offerings. Information protection solutions are evolving to deliver content awareness. This application, identity and content awareness is all part of an underlying shift to incorporate more context at the point when a security policy enforcement decision is made. How are you applying next gen security practices?
John Shepard
Head of Security Architecture
CIGNA
Vulnerability Management – Validating Real Risk, Peace of Mind
The recent spate of successful cyber attacks against major organizations exposes fundamental challenges with current security approaches. Current and advanced threats included sophisticated exploits need to be better understood and put in context of each organization’s unique environment. With organizations having less and less time to properly patch vulnerabilities, a more advanced approach of risk assessment and validation that incorporates not just proactive patching but also mitigating strategies is essential.
6:20pm - Closing Remarks
Marci McCarthy
CEO and President
T.E.N.
Biography