| 7:30AM - 8:30AM |
Registration & Continental Breakfast |
| 7:30AM - 8:15AM |
Wake-Up Session: IT Risk Management in a Hyper-Connected World |
| 8:30AM - 9:30AM |
Concurrent Sessions |
| |
A4 Active GRC: How to Use Your Existing Tools to Monitor GRC |
| |
B4 Android vs. Apple iOS Security Showdown |
| |
C4 Forensics Boundaries Within the Cloud |
| |
D4 The Common Credentials Dilemma |
|
E4 Federated Identity Management |
|
F4 Getting the Most from Your Logs |
|
G4 OK, I'm In... What Now? Advanced Post-Exploitation for Social Engineering DEMO |
|
Hands-On Track |
| 9:30AM - 9:45AM |
Refreshment Break |
| 9:45AM - 10:45AM |
Concurrent Sessions |
|
A5 Managing the Security of Your Cloud Providers |
|
B5 Late-Breaking Technology Session |
|
C5 Interviews and Interrogations in the Corporate World |
|
D5 Auditing Web-Based Software |
|
E5 A Threat and Risk-Based Approach to SIEM 2.0 Implementation |
|
F5 Network Security in the Era of "Consumerization of IT" |
|
G5 Trends in Cyber Threats: Who, What, How, Why |
| |
Hands-On Track |
| 11:00AM - 12:00PM |
Keynote Address: Cybersecurity at the Crossroads: Where Are We Headed? |
| 12:00 PM |
Luncheon in the Expo |
| 1:45PM - 3:15PM |
Concurrent Sessions |
| |
A6 Effective Security Policies for a BYOD Environment |
| |
B6 Mobile Malware: Managing Risk |
| |
C6 Digital Forensics and Investigations: The Importance of Narrative |
| |
D6 How to Audit VMware |
|
E6 Enterprise Security 2.0 New Strategies for Providing End-to-End Security |
|
F6 Network Forensics DEMO |
|
G6 ... Password Management is No Game! DEMO |
|
Hands-On Track |
| 3:15PM - 4:00PM |
Refreshment Break in the Expo |
| 4:00PM - 5:00PM |
Concurrent Sessions |
| |
A7 Social Networks as the New Threat Vector: Policy and Legal Considerations |
| |
B7 Free Tools to Monitor and Secure Your Wi-Fi Network |
| |
C7 Developing and Implementing an Incident Response Program |
| |
D7 Do You Know Where Your Data Is? Making the Case for Private-Cloud File Sharing and Storage |
| |
E7 Demystifying the Hype Around IPv6 DEMO |
| |
F7 Intrusion Detection Systems |
| |
G7 Role-Based Access Control: A Method that Works |
|
Hands-On Track |
| 5:00PM - 6:00PM |
Cocktail Reception in the Expo |