Detroit SecureWorld

2016 Agenda

June 1-2, 2016

October 27, 2016

March 29-30, 2016

February 11, 2016

September 8, 2016

September 27-28, 2016

October 5-6, 2016

September 14-15, 2016

May 11, 2016

May 4, 2016

April 20-21, 2016

June 9, 2016

November 9-10, 2016

October 18-19, 2016

Open Sessions
Conference Pass
SecureWorld Plus
VIP / Executive
View All

Day 1

  • 7:00am - 3:00pm14 Registration Open

    Click here to view registration types and pricing.

    Room: Registration Desk
    0
  • 8:00am - 9:15am14 Executive Advisory Board Breakfast: (VIP / INVITE ONLY)

    Executive Advisory Board Breakfast: VIP / INVITE ONLY

    3
  • 8:30am - 9:15am14 10 Steps to Building an Effective Audit Program

    Every complete insider threat program contains these elements: policies, processes, technology controls, risk management and auditing/monitoring. If there’s a unifying message within all of the steps of an insider threat program, it’s that it is not about technology but rather about people and technology. 

    0
  • 8:30am - 9:15am14 Dude, Where's My Car?: The Increasing Hackability of the Vehicle

    As time passes, vehicles have become increasingly complex. This includes not only the mechanical apsects of the vehicles, but also the cyber/digital inter-relationships between the vehicular network, data flow, and endpoints. This presentation will explore the origins of this, present and projected future vulnerabilities, and issues with models.

    1
    Charles Parker, II
  • 8:30am - 9:15am14 Stolen Data Markets

    Data breaches have become commonplace, though research on the sale of data is in its infancy. This introductory, non-technical presentation will explore the economy and organizational composition of stolen data markets hosted on both the open web and Tor to aid CISOs, security directors and anyone interested in cybercrime markets.

    1
  • 9:00am - 3:00pm14 Exhibit Floor Open

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    Room: SecureWorld Exhibit Floor
    0
  • 10:15am - 11:15am14 Conference Break / Exhibitor Product Demonstration Please check back for presentation details. Room: SecureWorld Exhibit Floor
    0
  • 11:00am - 12:00pm14 Executive Roundtable: (INVITE ONLY)

    VIP / INVITE ONLY

    Room: Executive Boardroom
    3
  • 11:15am - 12:00pm14 2016 Security Report and Moving to a Prevent Based Security Posture

    This presentation will cover typical cyber threats seen in commercial and government businesses today as well as provide tips and examples on how moving to a prevent based security posture can save your organization time and money.

    0
  • 11:15am - 12:00pm14 Online Tech: Covering Your ASSets

    Has your neck been on the line for protecting your company data assets, but declined for additional budget on cybersecurity measures? We will visit the value of data and it’s protection in this session, along with tips on garnering buy-in from your executives and boards. Come witness a conversation between a CTO and CEO on security, the value of data and protecting your company assets.

    0
  • 11:15am - 12:00pm14 Protecting Payments with PCI

    Learn about new updates to the PCI Data Security Standard (PCI DSS),including SSL migration and how this impacts organizations’ security programs and planning. The presentation will also cover initiatives and resources from the PCI Council to protect emerging payment channels and growing risk areas, including e-commerce and mobile.

    1
    Troy Leach
  • 11:15am - 12:00pm14 Radware: Cyber War Chronicles Please check back for presentation details.
    0
    Ron Winward
  • 12:00pm - 1:00pm14 Executive Roundtable: (VIP / Invite Only)

    Executive Track- VIP / INVITE ONLY
    Lunch Served at Noon

    Room: Executive Boardroom
    3
  • 12:15pm - 1:00pm14 LUNCH KEYNOTE: Radware Please check back for presentation details.
    0
    Ben Desjardins
  • 1:15pm - 2:15pm14 Panel: Current Threatscape

    Cybersecurity threats change and evolve daily. In today’s world, knowing the latest tactics can make the difference in keeping your company safe. Join industry leaders as they discuss the latest threats, trends and ways to stay ahead of cyber-attacks.

    0
  • 1:15pm - 2:15pm14 Panel: Secure Your Data in Transit

    Data is the new gold, and it’s up to security professionals to protect our valuable information as it moves from data centers to employee devices and into third party networks. Join our experts to hear about the latest technology and policies that can help you manage these risks without affecting productivity. Bring your questions along for this educational panel discussion.

    Room: Keynote Theater
    0
  • 1:15pm - 2:00pm14 Your Bitcoins or Your Site

    The ongoing DDoS for Bitcoins (DD4BC) DDoS extortion campaign has targeted multiple organizations in North America, Europe, Australia and New Zealand. In this session, we will discuss the attack methodologies, evolution of the attack campaign, the nature of the attacker(s), and a discussion of DDoS mitigation techniques that have proven effective against these attacks.

    0
  • 2:15pm - 3:00pm14 Conference Dessert Break / Exhibitor Product Demonstrations Please check back for presentation details. Room: SecureWorld Exhibit Floor
    0
  • 3:00pm - 3:45pm14 Cybersecurity: A New Paradigm

    The last few years we have seen a failure of traditional security techniques in preventing massive data breaches. What have we learned from these breaches and what can be done to improve the effectiveness of cybersecurity? This session will explore alternatives to current perimeter based security measures in order to reduce the new threats.

    1
    David Barton
  • 3:00pm - 3:45pm14 Industry Discussion Panel: Locking Down the Endpoints

    In a bring-your-own-device (BYOD) world, our mobile workforce creates a whole new set of challenges when securing all access points. BYOD, while convenient, can make implementing and enforcing security policies next to impossible. Join our industry leaders as they discuss the latest technology, training and trends for securing all endpoints.

    0
  • 3:00pm - 3:45pm14 Proactive Incident Management

    This presentation will introduce a framework to build a proactive incident management program that is supported by the four pillars of planning, preparing, practicing, and measuring. This framework has also been designed to be compliant with multiple standards, including PCI, ISO, NIST, NERC, and HIPPA.

    1
  • 3:00pm - 3:45pm14 Security and Privacy

    Vehicle-to-Vehicle (V2V) communication requires both security and privacy which are often opposing goals. Learn about the current state and future directions of the proposed certificate management system for V2V communications.

    1
  • 3:00pm - 3:45pm14 You Don't Know Cyber Insurance

    It is a good time to be in cybersecurity and cyber liability. The insurance market is thriving with premiums expected to reach $7.5B over the next three years. The speaker will cover the evolving world of coverage and services being offered in today’s high risk business environment.

    1
    David Derigiotis

Day 2

  • 7:00am - 3:00pm15 Registration Open

    Click here to view registration types and pricing.

    Room: Registration Desk
    0
  • 8:00am - 9:15am15 InfraGard Breakfast Meeting - Members Only

    InfraGard Chapter Meeting for members only
    Continental Breakfast Served

    3
  • 8:30am - 9:15am15 Governance, Risk and Compliance Technology

    Organizations have been making investments into Governance, Risk and Compliance (GRC) technology platforms to gain better efficiencies and better reporting of risks and controls. This session will discuss some of the more common problems associated with GRC technology platforms and address where the future of GRC may be heading.

    1
  • 8:30am - 9:15am15 Risk Management – What Went Wrong?

    The session will cover some practical examples of risk management and how to leverage risk management to help with cybersecurity risk and exploit schemes.

    1
  • 9:00am - 3:00pm15 Exhibit Floor Open Please check back for presentation details. Room: SecureWorld Exhibit Floor
    0
  • 10:15am - 11:15am15 Conference Break / Exhibitor Product Demonstration Please check back for presentation details. Room: SecureWorld Exhibit Floor
    0
  • 11:00am - 12:00pm15 Executive Roundtable: (VIP / Invite Only)

    Executive Track - VIP/Invite Only

    Room: Executive Boardroom
    3
  • 11:15am - 12:00pm15 Privacy and Security Law: Current Events

    A discussion on current events and case law that impact how we view data breach insurance and the potential damages for unauthorized disclosures of data.

    1
  • 11:15am - 12:00pm15 Why Hackers Love Fragmented Data Traffic Security

    Poor security of networked applications was a common issue in the wave of recent data breaches. A hodgepodge of VPNs, IPsec, VLANs, and SSL makes fully securing networked applications immensely complicated, forcing dangerous trade-offs between security and performance. But emerging best practices simplify data traffic security to reduce breach risks.

    0
  • 12:00pm - 1:00pm15 Executive Roundtable: (VIP / INVITE ONLY)

    Executive Track-VIP/Invite ONLY
    Lunch Served at Noon

    Room: Executive Boardroom
    3
  • 1:15pm - 2:15pm15 Panel: After the Hack

    According to a Duke University survey, more than 80% of U.S. companies have been successfully hacked. It’s more important than ever for companies to have an incident response program in place to reduce damages, recovery time and costs, in case of a security breach. Join our experts as they discuss challenges security teams face, tools and proven initiatives, and guidance in creating a program that will work for your organization.

    0
  • 1:15pm - 2:15pm15 Panel: You've Got Humans on Your Network

    By far, the biggest security threat facing companies is employees. Everything from weak expiration policies to zombie accounts can put your organization at risk. Education and awareness have never been more important. Join this panel of experts as they discuss the use of technology and smart policies to effectively educate and inform the humans.

    0
  • 2:15pm - 3:00pm15 Conference Dessert Break / Exhibitor Product Demonstrations

    Located on the SecureWorld Exhibit floor.

    Room: SecureWorld Exhibit Floor
    0
  • 2:30pm - 2:45pm15 Dash for Prizes & CyberHunt

    Be sure to leave your business card* with any participating exhibitor. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win

    Room: SecureWorld Exhibit Floor
    0
  • 3:00pm - 3:45pm15 IOT – Challenges Within Automotive

    A new world of connected vehicles is on its way and its increasing reliance on interacting systems and connectivity is opening up new attack surfaces and a completely new area of consumer risk. The automotive industry faces increased challenges regarding safety, liability and privacy.

    1

Session Information

Description:
  • September 14-15, 2016