|7:30 AM||Registration and Networking Breakfast|
|8:30 AM||Welcome and Opening Remarks|
|8:45 AM||Opening Keynote Address: "Portrait of a Targeted Attacker - Who's Behind Today's Most Sophisticated Attacks"|
|9:30 AM||Technology Spotlight Session by Trend Micro: "Cyberprofessionalism: Why Hackers Are Winning...and What We Can Do About It"|
|10:00 AM||Networking Break|
|10:15 AM||Panel Session 1: "The Most Effective Methods for Identifying and Stopping Targeted Attacks"|
|11:00 AM||Panel Session 2: "Malware Prevention in 2014 and Beyond"|
|11:45 AM||Closing Remarks|
|12:00 PM||Networking Lunch|
George Kurtz is an internationally recognized security expert, author, entrepreneur and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems.
One of Dark Reading's founding editors, Tim has spent more than 24 years as an IT journalist, industry analyst, therapist, and bartender. Tim has previously served as the business editor for Network Computing, chief of reporters at InternetWeek, and executive editor at DataTrends Publications.
Eric Bruno is a contributing editor to InformationWeek with more than 20 years of experience in the information technology community. He is a highly requested moderator and speaker for a variety of conferences and other events on topics spanning the technology spectrum from the desktop to the data center.
Harry Sverdlove Bit9's Chief Technology Officer, draws from nearly two decades of application design and analysis with industry-leading IT enterprises to add a new layer of technical expertise and strategic vision to Bit9's Trust-based Security Platform.
JD Sherry is responsible for providing guidance and awareness regarding Trend Micro's entire security portfolio aimed at protecting both commercial and government ecosystems. Well-versed in enterprise and data center architecture, Mr. Sherry has successfully implemented large-scale public, private and hybrid clouds leveraging the latest in virtualization technologies.
Chris Eng, vice president of research, is responsible for integrating security expertise into Veracode's technology. In addition to helping define and prioritize the security feature set of the Veracode service, he consults frequently with customers to discuss and advance their application security initiatives.
TK Keanini brings nearly 25 years of network and security experience to the CTO role. He is responsible for leading Lancope's evolution toward integrating security solutions with private and public cloud-based computing platforms. TK is also responsible for developing the blueprint and solution that will help Lancope's customers securely benefit from the promise of software-defined networking (SDN).
Derek Manky formulates security strategy based on years of threat and industry knowledge, with a goal to make a positive impact towards the global war on cyber crime. Manky has presented research and strategy world-wide at many security conferences, including meetings with leading political figures who help define the future of cyber security. He works globally within the security industry and Computer Emergency Response (CERT) to connect the dots, providing mitigation advice and threat forecasts based on correlated data and personal knowledge.
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com