Stonesoft Cyber Security Summit



October 24, 2012 - New York City

Within the next couple of years the world will experience more intentionally executed and demonstrated cyber attacks.  And the development of offensive cyber weapons will become fiercer and publicly more acceptable.

Cyberspace, the fifth dimension of warfare, has already become an important arena of world politics. The lines between war and peace have blurred.  And what is developed for one purpose can easily spill into the hands of others.  Stuxnet becomes Gauss.  What’s next and how will it affect what you are trying to protect?

Defense, resilience, and offense make up the components required for a company or country to protect itself. You need them all.

Join us for a first-hand opportunity to learn the inside truth about what is really happening on both the offensive and defensive side of the growing cyber arms race.

3:30pm - Registration

4:00pm - Welcome Remarks

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography


Richard Benigno Richard Benigno
Senior Vice President Sales, North America
Stonesoft
Biography

4:10pm - Keynote Address: Cyber Wars – Coming to Your Organization Sooner than you Think

Dr. Jarno Limnell Dr. Jarno Limnell
Director of Cyber Security
Stonesoft
Biography

Gauss represents the next evolution of cyber warfare. According to multiple reports, the malware appears to be repurposed from a nation sponsored, industrial espionage tool into a new, highly encrypted analyzer of banking transactions. What happens when these types of sophisticated, bleeding edge tools become available for sale in the malware marketplace? Who should be held accountable when a government sponsored espionage tool is repurposed for criminal activity? And what can organizations do to protect their own networks?

4:55pm - Executive Roundtables Co-Moderated by Leading ISE Alumni and Sponsor Thought Leaders

Vas Rajan

Vas Rajan
Managing Director & Chief Information Security Officer
CLS Bank International
Biography

Dan Holden Dan Holden
Director of ASERT
Arbor Networks
Biography

Distributed Denial of Service Attacks – Holding Your Own Against the Attackers
Distributed Denial of Service (DDoS) attacks are a critical threat for any organization that conducts business online. DDoS attacks are emerging as the weapon of choice for hackers, political activists and international cyber terrorists because they are inexpensive, easy to execute and difficult to stop. Organizations need to ensure operational continuity and resource availability with a vigilant DDoS mitigation approach. Where are you in preparing for DDoS attacks?



David Ritenour

David Ritenour
Chief Information Security Officer
SunGard Financial Corporation
Biography

Mike Hamilton Mike Hamilton
Director of Systems Engineering
Ixia
Biography

Real World IT Infrastructure Testing – The Art of Field Testing
The majority of intrusion prevention systems, unified threat management systems and next-generation firewall products fail when faced with the advanced evasion techniques increasingly used in sophisticated cyber attacks. Many security products pass simulated and recorded evasions when these are predefined and stable in a lab environment. However, when facing live and dynamic evasion-disguised exploits, these systems go blind and are incapable of protecting your data assets. To learn the true level of your protection against AETs, the anti-evasion capabilities of your security devices must be field-tested in a real environment by using your own policies and configurations. Do you trust your vendors and internal team to test consistently and honestly?


John Masserini

John Masserini
Chief Security Officer
MMiami Holdings, Inc.
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010

Biography

Phil Lerner Phil Lerner
Vice President of Technology
Stonesoft
Biography

Next Generation Security and Beyond – Changing the Game of Network Security
IT and business infrastructure is increasingly dynamic, and information security must evolve to support it. The future of information security infrastructure is contextual and adaptive, capable of changing to support rapidly changing threat and business environments in near real time. Network security solutions are evolving to incorporate application awareness and identity awareness into their offerings. Information protection solutions are evolving to deliver content awareness. This application, identity and content awareness is all part of an underlying shift to incorporate more context at the point when a security policy enforcement decision is made. How are you applying next gen security practices?



John Shepard

John Shepard
Head of Security Architecture
CIGNA

Tas Giakouminakis Tas Giakouminakis
Co-Founder & CTO
Rapid 7
Biography

Vulnerability Management – Validating Real Risk, Peace of Mind
The recent spate of successful cyber attacks against major organizations exposes fundamental challenges with current security approaches. Current and advanced threats included sophisticated exploits need to be better understood and put in context of each organization’s unique environment. With organizations having less and less time to properly patch vulnerabilities, a more advanced approach of risk assessment and validation that incorporates not just proactive patching but also mitigating strategies is essential.

6:20pm - Closing Remarks

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography


6:30pm - Partner Pavilion Reception

8:00pm - Conclusion