November 2014 – 0-Days and Days After
By Isaac Salles on November 1, 2014
Date |
Venue |
Presentations |
|
– |
Check back after this event. |
Details: |
Date |
November 13,2014 |
Event Start Time – End Time |
2 PM – 5 PM |
Overall Event Title |
0-days and the Days After |
Venue |
The Warwick Hotel
65 W 54th St, New York, NY
|
Dress Code |
Business casual |
Event kickoff opening remarks |
2:00 – 2:10 |
Speaker |
NY ISSA Board Member |
Session description |
Welcome attendees |
|
|
Session Title |
Heart-Bleed-Out |
Start Time – End Time |
2:10 – 2:55 |
Session Description |
An overview of Heartbleed and what is was so impactful. Challenges and lessons learned of managing it, and how to prepare for similar issues in the future. |
Speakers |
Glen Saunders
Senior Security Engineer, iSEC Partners
|
Bio(s) |
TBD |
|
|
Session Title |
What the Shell!? |
Start Time – End Time |
2:55 – 3:30 |
Session Description |
An overview and presentation on what you need to know about Shellshock. How to determine if you are vulnerable? How bad was it? What to do now. |
Speakers |
Ken Belva – Silverback Ventures LLC
|
Bio(s) |
TBD
|
Networking Break |
3:30 pm – 3:50 |
Session Title |
Keep Calm and Patch On: Executive Panel |
Start Time – End Time |
3:50 – 4:30 PM |
Session Description |
An executive perspective of the recent 0-days plaguing the industry. How to prepare, how to react and how to respond. What processes and operational procedures can be implemented to help better manage such vulnerability releases in the future. |
Speakers |
Executive Panel |
Bio(s) |
Andrew Conte –Information Security Officer – Guardian Life InsuranceChristopher Olsen – Director, Preventative Technical Security Services (PTSS) – ADPShilpan Patel – Security Program Manager – Quidsi |
|
|
Who should attend |
Who should attend this session:ISSA Members, ISACA Members and FS/ISAC Members (and other ISAC’s)This program has been created for information security practitioners,
but may also be of interest to the following:Auditors who intend to evaluate configuration management within an enterprise.Security practitioners and system admins seeking to accomplish or implement Configuration Management objectives.Security Management & Executives – With a goal of understanding industry practices trends, and seeking perspective on implementing technical assessment activities in the context of a broader application security program. |
Registration |
Register
|
|
Posted in Event Calendar, General