NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
   
Agenda

Agenda-at-a-Glance

Saturday, April 13

8:00AM - 9:00AM

Registration & Continental Breakfast

9:00AM - 5:00PM

Optional Workshops

W1 Project Management for Security

12:00PM - 12:45PM

Workshop Luncheon

Saturday, April 13 and Sunday, April 14
8:00AM - 9:00AM

Registration & Continental Breakfast

9:00AM - 5:00PM

Optional Workshop

W2 (ISC)2 Seminar: Business Continuity and Disaster Recovery Planning

W3 Securing and Auditing Virtualized Environments DEMO

12:00PM - 12:45PM

Workshop Luncheon

Sunday, April 14
8:00AM - 9:00AM

Registration & Continental Breakfast

8:45AM - 6:00PM

CISO Executive Summit

9:00AM - 5:00PM

Optional Workshops

W4 Using Google to Find Vulnerabilities in Your IT Environment

W5 Mobile Computing Security

12:00PM - 12:45PM

Workshop Luncheon

Monday, April 15
7:30AM - 8:30AM

Registration & Continental Breakfast

8:30AM - 10:00AM

Keynote Address: Why "Good Enough" Isn't Anymore (And What You Can Do About It)

10:00AM - 10:30AM

Refreshment Break

10:30AM - 12:00PM Concurrent Sessions
A1 Selling Security to Your Board
B1 Applied Wireless Security: Attack and Defense Mechanisms DEMO
C1 Data Forensics: Top 10 Things Not To Do
D1 Cloud and Big Data Compliance
E1 Creating an End-to-End Identity Management Architecture CASE STUDY
F1 Favorite Free Windows Auditing Tools
G1 Social Engineering
Hands-On Track
12:00PM Luncheon
12:30PM - 1:20PM Keynote Address: Changing the Mindset: Creating a Risk-Conscious Culture
1:30PM - 3:00PM Concurrent Sessions
A2 Information Security Management 101
B2 Mobile Security (not MDM) – Understanding the Real Risk
C2 Analyzing Spyware on Smartphones (Android and iOS)
D2 Top Ten Oracle Security Threats
E2 Cybersecurity for Critical Infrastructure Control Systems DEMO
F2 Top 10 Windows Security Controls and How to Correctly Audit Them
G2 Website Impersonation Attacks: Who's REALLY Behind That Mask?
Hands-On Track
3:00PM - 3:45PM Refreshment Break
3:00PM - 7:00PM INFOSEC EXPO HALL OPEN
3:45PM - 5:00PM Concurrent Sessions
A3 Turning Governance, Risk & Compliance into a Value Proposition
B3 Expanding Work Boundaries Securely Through Virtualization & Mobile Devices

C3 Testing Your Business Continuity Plan: A Cyber Exercise

D3 Building the Government's First Secure Cloud Services Broker
E3 Building a Next-Gen Enterprise Security Management Platform
F3 How Secure Are We? Identity Management and Social Networking Threats
G3 Attacking Proximity Card Access Systems
Hands-On Track
5:00PM - 7:00PM

Evening Networking Reception in the Expo


Tuesday, April 16
7:30AM - 8:30AM

Registration & Continental Breakfast

7:30AM - 8:15AM

Wake-Up Session: IT Risk Management in a Hyper-Connected World

8:30AM - 9:30AM Concurrent Sessions
A4 Active GRC: How to Use Your Existing Tools to Monitor GRC

B4 Android vs. Apple iOS Security Showdown

C4 Forensics Boundaries Within the Cloud
D4 The Common Credentials Dilemma
E4 Federated Identity Management
F4 Getting the Most from Your Logs
G4 OK, I'm In... What Now? Advanced Post-Exploitation for Social Engineering DEMO
Hands-On Track
9:30AM - 9:45AM Refreshment Break
9:45AM - 10:45AM Concurrent Sessions
A5 Managing the Security of Your Cloud Providers
B5 Late-Breaking Technology Session
C5 Interviews and Interrogations in the Corporate World
D5 Auditing Web-Based Software
E5 A Threat and Risk-Based Approach to SIEM 2.0 Implementation
F5 Network Security in the Era of "Consumerization of IT"
G5 Trends in Cyber Threats: Who, What, How, Why
Hands-On Track
11:00AM - 12:00PM Keynote Address: Cybersecurity at the Crossroads: Where Are We Headed?
12:00 PM Luncheon in the Expo
1:45PM - 3:15PM Concurrent Sessions
A6 Effective Security Policies for a BYOD Environment
B6 Mobile Malware: Managing Risk
C6 Digital Forensics and Investigations: The Importance of Narrative
D6 How to Audit VMware
E6 Enterprise Security 2.0 – New Strategies for Providing End-to-End Security
F6 Network Forensics DEMO
G6 ... Password Management is No Game! DEMO
Hands-On Track
3:15PM - 4:00PM

Refreshment Break in the Expo

4:00PM - 5:00PM Concurrent Sessions
A7 Social Networks as the New Threat Vector: Policy and Legal Considerations
B7 Free Tools to Monitor and Secure Your Wi-Fi Network
C7 Developing and Implementing an Incident Response Program
D7 Do You Know Where Your Data Is? Making the Case for Private-Cloud File Sharing and Storage
E7 Demystifying the Hype Around IPv6 DEMO
F7 Intrusion Detection Systems
G7 Role-Based Access Control: A Method that Works

Hands-On Track

5:00PM - 6:00PM

Cocktail Reception in the Expo


Wednesday, April 17
7:30AM - 8:30AM

Continental Breakfast

8:30AM - 9:30AM Keynote Address: Opening Up a Second Front on Risk Management: Integrating Cybersecurity into Business Processes
9:30AM - 9:45AM Refreshment Break
9:45AM - 11:00AM Concurrent Sessions
A8 Implementing the NIST Risk Management Framework
B8 Selecting an MDM for Your BYOD Strategy
C8 Conducting a Big-Data Forensics Operation
D8 Convergence of Mobile Devices and Cloud Computing: New Strategies for Controlling Access to Enterprise Assets
E8 Privacy Exposed: Ramifications of Social Media and Mobile Technology
F8 Security Information and Event Management
G8 Free Vulnerability Tools to Audit Security
11:00AM - 11:15AM Refreshment Break
11:15AM - 12:15PM Concurrent Sessions
A9 Building a Top-Down Awareness Program for Mobile Users
B9 Encryption in the Mobile World
C9 Vulnerability Management in an Enterprise Environment
D9 Big Data, Big Security Questions: Securing Petabytes of Data
E9 Best Practices in Testing Anti-Malware
F/G9 Going on the Offensive: Proactive, Quick-Hit Security Measures DEMO
Wednesday, April 17
1:45 PM - 5:00 PM

IT Audit Management Summit

1:30 PM - 5:00 PM

Optional Workshops

W6 Developing Information Security Policies and Standards

W7 Securing SharePoint

W8 Industrial Espionage: Strategies for Protecting Your Intellectual Property

1:00PM - 1:30PM

Workshop & Summit Luncheon

Thursday, April 18
8:00AM - 9:00AM

Registration & Continental Breakfast

8:30AM - 6:00PM

IT Audit Management Summit

8:45AM - 6:00PM

Cloud Security Summit

9:00AM - 5:00PM

Optional Workshops

W9 Advanced Social-Engineering Attacks and Pentesting Tricks HANDS-ON

W10 Data Loss Prevention: A Practical Workshop

12:00PM - 12:45PM

Workshop & Summit Luncheon

Thursday, April 18 and Friday, April 19
8:00AM - 9:00AM

Continental Breakfast

9:00AM - 5:00PM

Optional Workshops

W11 Identifying Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTP) HANDS-ON

8:30 AM - 12:00 PM

Friday, April 19

8:30 AM - 12:00 PM

IT Audit Management Summit


 Follow Us on Twitter

Platinum Sponsors

Gold Sponsors

Global Education Sponsor

Association Sponsors

Media Sponsors