May 2015 – Next Gen Perimeter Protection
By Isaac Salles on April 20, 2015
Date |
Venue |
Presentations |
|
– |
Check back after this event. |
Details: |
Date |
Monday, May 11, 2015 (Register) |
Event Start Time – End Time |
2:00 – 5:00 pm |
Overall Event Title |
Next Gen Perimeter Protection |
Event abstract |
As attacker techniques shift, organizations must have a robust strategy to address both insider and external threat actors. While the recent April program focused on insider threats, this session will focus on preventing and detecting advanced attacks at the perimeter. In these sessions, various presenters will cover emerging technologies and approaches to perimeter protection as well as key considerations for identifying and implementing the next generation of applicable technology.
|
Venue |
Cisco Systems, 1 Penn Plaza, New York, NY 10119
|
Dress Code |
Business casual |
Event kickoff opening remarks |
2:00 – 2:10 |
Speaker |
NYMISSA President Joseph Rivela, CISSP |
Session description |
Welcome attendees |
|
|
Session Title |
Perimeter Defense: Presented by Lastline |
Start Time – End Time |
2:10 – 2:55 |
Session Description |
Perimeter Defense: Presented by Lastline |
Speakers |
Jeff Pollard |
Bio(s) |
Jeff Pollard has more than 10 years of information security experience including roles specializing in forensics, incident response, malware reverse engineering, managed security services, and consulting. He joined Lastline in March of 2015 and acts as Worldwide Technical Architect focused on educating organizations on the use of evasive attack tools by advanced threat actors. Prior to joining Lastline, Jeff was a Global Architect for Mandiant (now a FireEye company). He’s been a part of presales engineering and consulting teams for Dell SecureWorks and Verizon focused on Global customers with responsibilities spanning from technical architecture to engagement management. His primary focus is on Security and Incident Response workflow – enabling Security Operations and Incident Response teams to rapidly assess, contextualize, respond, and adapt to sophisticated threat actors and their techniques. In addition he enjoys the study of macro and micro trends in attack tools, threat actor behavior, and threat intelligence. |
|
|
Session Title |
Perimeter Defense: Presented by Palo Alto Networks |
Start Time – End Time |
2:55 – 3:30 |
Session Description |
Perimeter Defense: Presented by Palo Alto Networks |
Speakers |
TBA |
Bio(s) |
|
Networking Break |
3:30 pm – 3:50 |
Session Title |
TBA |
Start Time – End Time |
3:50 – 4:30 PM |
Session Description |
TBA |
Speakers |
TBA |
Bio(s) |
|
|
|
Who should attend (customize to each session content) |
Who should attend this session:ISSA Members, ISACA Members and FS/ISAC Members (and other ISAC’s)This program has been created for information security practitioners, but may also be of interest to the following:Auditors who intend to evaluate threat management within an enterprise.Security practitioners seeking to accomplish or implement Threat Management objectives.Security Management & Executives – With a goal of understanding industry practices trends, and seeking perspective on implementing technical assessment activities in the context of a broader application security program. |
|
Posted in Event Calendar