Registration and Networking Breakfast
Welcome and Opening Remarks - Tim Wilson, Editor-in-Chief, Dark Reading and Eric Bruno, Contributing Editor, InformationWeek
Opening Keynote Address: "Portrait of a Targeted Attacker - Who's Behind Today's Most Sophisticated Attacks"
George Kurtz, President/CEO and Co-Founder, CrowdStrike
Today's attacks are more targeted - and more sophisticated -- than ever before. Who are the people who write these next-generation attacks, and what are their motivations? What are their methods, and how do they choose their targets? In this special keynote presentation, an expert on today's most current and sophisticated threats will provide insights on who the attackers are, how they execute their craft, and what you can do to protect your organization.
Technology Spotlight Session: "Cyberprofessionalism: Why Hackers Are Winning...and What We Can Do About It"
JD Sherry, Vice President, Technology and Solutions, Trend Micro
Malcolm Gladwell's book Outliers discusses how a complex skill can be mastered if one spends 10 years or 10,000 hours honing those particular skills. Research and history shows us that skill mastery in hacking is proliferating, ultimately amassing techniques, weaponry and network-centric capabilities to target innocent victims, organizations as well as countries of interest. In this session, Trend Micro, VP JD Sherry will look deeper into the latest trends hackers are leveraging, especially those relevant to virtualization and cloud computing, as well as the economies and ecosystems that support them. Offense must inform defense and this session will discuss proven strategies for creating an effective defense for virtualized and cloud deployments against the elite hacking Outliers.
Panel Session 1: "The Most Effective Methods for Identifying and Stopping Targeted Attacks"
Moderated by Tim Wilson, Editor-in-Chief, Dark Reading and including panelists: George Kurtz, President/CEO and Co-Founder, CrowdStrike; JD Sherry, Vice President, Technology and Solutions, Trend Micro; Harry Sverdlove, Chief Technology Officer, Bit9
You've heard it over and over - every vendor promises that it has found the best way to detect advanced persistent threats and targeted attacks. In this unique panel session, four top experts will discuss how these methods and tools mitigate the situation - and debate the effectiveness of those methods and tools with each other.
Panel Session 2: "Malware Prevention in 2014 and Beyond"
Moderated by Eric Bruno, Contributing Editor, InformationWeek and including panelists: Chris Eng, Vice President, Research, Veracode; Tim "TK" Keanini, CTO, Lancope; Derek Manky, Global Security Strategist, FortiGuard
Today's malware is nothing like the random viruses that were created in the 1990s. Malware authors have developed new, multi-staged methods for building and deploying malware, and for delivering it to a targeted group of victims. As we look at capabilities for this year, we can see that malware will behave differently depending on the system it infects, and it may be shrouded in disguises that enable it to hide from currently-available detection tools. Worse, it is often generated automatically, so that it never looks the same way twice. What tools and methods are there for preventing this sophisticated malware? How will organizations be able to detect and stop it? In this panel, leading anti-malware experts offer their views on malware defense strategies for the future, and debate the relative effectiveness of existing tools and strategies.
Closing Remarks - Eric Bruno, Contributing Editor, InformationWeek