CSO's CyberDay 2015
 
Wednesday, November 18
8:00 am - 9:00 amRegistration & Continental Breakfast
9:00 am - 9:10 amWelcome and Opening Remarks
Julia King, Contributing Editor, CSO
9:10 am - 9:55 amCyber Security: How'd It Get So Bad, and Can We Do Anything About It?
Joel Brenner, Former Head of US Counterintelligence Policy; Former Inspector General, National Security Agency

Personal privacy, business information, and government secrets have never been more vulnerable to cyber theft, and the threat is growing from both nation states and criminal organizations. Join us for this sobering explanation of how we got here and how organizations should think strategically about the threat and organize themselves to deal with it.

9:55 am - 10:25 amEyes Wide Shut: Revisiting Enterprise Exposure
Shahar Tal, Head of Vulnerability Research, Check Point Software; former CTO, Israeli Defense Forces

The enterprise vulnerability surface continues to widen, as attackers identify new holes in previously trusted software and hardware platforms. What are they? How do we know about them? Join this session for an insider’s view of recent vulnerability research, and learn how you can apply this knowledge to reassess your exposure and protect your organization from the latest threats.

10:25 am - 10:40 amNetworking Break
10:40 am - 11:10 amDealing with Evolving Threats in an Increasingly Digitized Economy
Tim Ogden, Senior Director, Global Fraud Prevention, ADP

Chasing the bad guys who are attempting to commit fraud on your organization not only leads to their prosecution, but reveals the methods they use to harvest and steal credentials, access and money. By proactively identifying these incidents of fraud, you can better prevent future attempts. Join us to understand how to take a proactive posture to prevent fraud in your organization.



11:10 am - 11:40 amBlack Hat vs. White Hat: How Cybercriminals Hack and Security Professionals Protect
Julia King, Contributing Editor, CSO
Shahar Tal, Head of Vulnerability Research, Check Point Software; former CTO, Israeli Defense Forces
Chris Tarbell, Former FBI Special Agent,
Tim Ogden, Senior Director, Global Fraud Prevention, ADP

Interactive discussion on new tools and techniques used by hackers, next generation of attacks, the art and science of the honey pot, including demonstration of vulnerabilities and hacking.

11:40 am - 12:00 pmWhy Staying One Step Ahead is Mission-Critical
Julia King, Contributing Editor, CSO
Amnon Bar-Lev, President, Check Point Software


12:00 pm - 1:15 pmNetworking Lunch with Table Topic Discussions

Topics to include:

Staying One Step Ahead of Malware Threats
Defining the Steps to Take in Advance of a Potential Breach
Defining a Security Strategy for the Mobile Attack Surface
Improving Visibility, Response and Remediation
Identifying Vulnerability Consistently and Systematically
Monitoring and Analyzing Persistent Attackers
Turning Threat Intelligence into Threat Prevention



1:15 pm - 2:00 pmWhat We Learn from Tracking Down the Bad Guys
Chris Tarbell, Former FBI Special Agent,

How can the nation's most significant cyber investigations help us understand the future? Join us for an insider’s look at the turbulent threat landscape, the hacker underworld, and what is learned from the bad guys who get caught.

2:00 pm - 2:30 pmMalware Intelligence: Tales from the Trenches
Dan Wiley, Head of Incident Response, Check Point Software

With cybercriminals picking up tricks and tactics from nation-state adversaries and vice-versa, the techniques and tools of the malware trade are evolving to become ever more evasive. Join us as we share real stories of real targeted attacks, and unmask previously unknown campaigns and attacker groups.

2:30 pm - 2:45 pmNetworking Break
2:45 pm - 3:15 pmA Business-First Approach to Security
Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group

 Modernizing the security strategy at The Blackstone Group has been a multi-year journey involving increased investment in intelligence-based visibility and a strategic reduction in the number of compromised systems. Complementing these efforts is the organization’s CEO-sponsored Human Security Sensor Program designed to enable every employee to embrace smart security practices for the greater organization. Join us to understand how these combined efforts are maximizing the impact and overall value the security team brings to the firm.

3:15 pm - 3:45 pmLeveraging Remediation and Forensics to Align with New Threats
Devon Bryan, Vice President, Global Technical Security Services, ADP
Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group
Dan Wiley, Head of Incident Response, Check Point Software
Julia King, Contributing Editor, CSO

How do you align your business with consistently emerging threats?  What skills does your organization need to create this consistent state of alignment?  How can you find the right people?  Join us for this panel discussion of experts for answers to these questions and more.

3:45 pm - 4:00 pmClosing Remarks
4:00 pm - 5:30 pmNetworking Reception