Cyber Threat Detection and Information Sharing Training Conference is about education on cyber threat detection and information sharing solutions and product training and not about why this subject is important and not about what federal cyber security projects are about to be funded.
If you are a private enterprise security manager or government intelligence community member looking for real-time cyber threat detection and information sharing solutions or a telecom operator addressing new government mandates on cyber defense, this training conference is for you.
Preliminary Conference Agenda:
Cyber Threat Detection and Information Sharing Training
Tuesday, October 7, 2014
9:00-9:30 a.m. Fighting Next-Generation Adversaries with Shared Threat Intelligence
Jacob West, Chief Technology Officer, Enterprise Products, Hewlett-Packard9:30-10:00 a.m. Trend Micro Cyber Threat Detection Solutions
Tom Kellermann, Chief Cybersecurity Officer, Trend Micro11:30-12:30 p.m. Session A Threat Detection from OSINT: put the web to work for you.
Dr. Christopher Ahlberg, Co-Founder and Chief Executive Officer, Recorded Future11:30-12:30 p.m. Session B Best Practices for Addressing Insider Threat’s
Chris Inglis, former Deputy Director, NSA and Advisory Board Member, Securonix1:30-2:30 p.m. Beyond Buzzwords: Defining Threat Intelligence, and Why It Matters
Eric Olson, Vice President of Product Strategy, Cyveillance3:00-4:00 p.m. Active Decomposition: Game Changing Threat Detection and Analysis
Mario Vuksan, CEO, ReversingLabsWednesday, October 8, 2014
9:00-9:30 a.m. Session A Unlocking the Value from the Overwhelming Volume of Threat Intelligence with Automation and Collaboration
Sean Brady, VP Product Management, Vorstack8:30-9:30 a.m. Session B Security Assurance and Continuous Monitoring for NFV/SDN
Tony Rutkowski, Executive VP, Yaana Technologies10:30-11:30 a.m. Session A Presentation on eSentire Asset Management Protection
Mark Sangster, Vice President, Marketing, eSentire10:30-11:30 a.m. Session B Defeating the APT Threat with Effective Vulnerability Management
Jonathan Trull, CISO, QualysMonday, October 6, 2014
Special STIX / TAXII Workshop
1:00-2:00 p.m. STIX/TAXII Introduction for Business Development and Cyber Security Professionals
Aharon Chernin, Manager, Security Automation, Depository Trust and Clearing Corporation (DTCC)2:15-3:15 p.m. Operationalizing STIX & TAXII, a message from the field
Aharon Chernin, Manager, Security Automation, Depository Trust and Clearing Corporation (DTCC)
Registration
To Register with Your Special Promotion Code or our "two for the price of one" special offer, click on http://www.issworldtraining.com/ISS_WASH/CyberThreatDetection2014register.htm.
Location
Bethesda North Marriott Hotel & Conference Center
5701 Marinelli Road Bethesda, Maryland 20852 USA
Toll-free: 1-800-266-9432
Colocation with ISS World Americas
Registration for Cyber Threat Detection and Information Sharing Training includes access to ISS World Americas 2014 six other conference tracks plus pre-conference seminars.
To Review ISS World Americas full conference agenda, click on http://www.issworldtraining.com/ISS_WASH/index.htm.