Breakout Sessions
FOCUS 11 features over 70 targeted, highly technical sessions. Breakouts will offer insights and best practices to help you optimize your security and compliance initiatives. View a detailed FOCUS session schedule.
Click on the red arrows to view sessions within each track. See below for track descriptions.
Caribbean Solutions Lab and London Security Solutions: Deep Dive — Endpoint Protection: Tips and Tricks for Getting the Most Out of your Suite
Sean Slattery, Technical Director and McAfee Instructor, Caribbean Solutions Lab
Dennis London, Partner and Vice President, London Security Solutions, LLC
Security is more than just deploying an anti-virus solution. Effective security comes from integrating endpoint, web, email, device control, and gateway protection. Learn about techniques applied in diverse industries such as manufacturing, healthcare, utilities, and education that can improve your security posture and compliance.
Intel and McAfee: The New Reality of Stealth Crimeware — Security Beyond the Operating System
Thom Sawicki, Product Strategy – Intel Endpoint Security, Intel
Dave Marcus, Mcafee Labs Director – Security Research and Communications, McAfee
Today's cyber criminals want to steal data quietly, without being noticed. They often turn to malware laden with stealth techniques, such as rootkits, encryption, and obfuscation, to evade current security solutions that protect within and above the operating system. To fight back, security requires a different vantage point. Find out more in this in-depth session.
Ponemon Institute and The Doe Run Company: Data Protection Best Practices
Craig Williams, Information Security Officer, Doe Run
Larry Ponemon, Chairman and Founder, Ponemon Institute
Budgets and resources are tight, yet companies know it's important to protect their data to meet external mandatory compliance requirements and internal needs to keep company intellectual property safe. Let industry expert Larry Ponemon help you discover the latest best practices and thinking nominated by your peers for successful data protection and encryption. Let McAfee customer Craig Williams help you understand how The Doe Run Company has brought those best practices to life.
HBGary: Protecting the Endpoint from the Rise of Cyber Terrorism
Greg Hoglund, CEO, HBGary, Inc.
Whether working alone or in small groups, hackers create cyberattacks to harm and disrupt operations, causing severe economic and brand damage to large corporations. This presentation discusses this new wave of cyber terrorism and the need for organizations to collect their own threat intelligence.
Intel and McAfee: Endpoint Security Management Beyond the Operating System for Stronger Security and Lower Costs
Dave Singh, Intel vPro Product Manager, Intel
Jens Rebaum, Manager – Software Development, McAfee, Inc.
Roger Wood, Director – Product Management, McAfee
Does your company own PCs with Intel vPro and AMT chipsets? Do you even know where they are in your network? Do you want to exercise the power of that technology to improve your security posture and reduce costs of security operations? Intel vPro and Active Management Technology operate beyond the operating system allowing you to save power, apply and provision software, and remediate compromised or corrupted systems. Communication outside the operating system needs to be addressed with a "security first" mindset. This session explores endpoint security management beyond the operating system.
McAfee: Deep Dive — Exploit Toolkits and Advanced Web Attacks Exposed: Detection and Protection
Erik Elsasser, Sales Engineer, McAfee, Inc.
Jon Paterson, Enterprise Solutions Architect, McAfee, Inc.
As malware developers continue to innovate, you need not only to counteract but stay one step ahead. This action-packed session will take an in-depth look at an exploit toolkit and expose how it works. You'll see some of the latest attack trends in action, learn about methods and tools for analyzing these attacks and learn how McAfee Web Gateway can help protect against such attacks. This session will not be available for viewing.
FedEx and McAfee: Strategic Web Protection for the Large Enterprise — Deployment Best Practices and Real ROI
Whit Janes, Technical Advisor, FedEx
Christopher Cinnamo, Senior Product Manager – Web Gateway, McAfee, Inc.
How can you protect web traffic for over 100,000 users? Hear from FedEx and learn best practices from this Fortune 100 enterprise. Learn the real ROI that followed this deployment: reduction in desktop/server detections, firewall load, and connections. Hear how a McAfee Web Gateway deployment helped save their budget and network.
McAfee: When Email Gets Nasty — Spear Phishing, Botnets, and Targeted Attacks
Joe Brown, Systems Engineer, McAfee
Today's email threat landscape has evolved. Hackers are using sophisticated methods designed to fool users with targeted, focused attacks. Botnets-as-a-Service are readily accessible for cyberattacks, and targeted attacks have become carefully orchestrated to elude defenses. Join McAfee as we share an inside view of these threats and how you can prepare your defenses to thwart them.
McAfee: Moving Targets — Access & Security Regardless of Location or Device
Thomas Bryant, Solution Architect Lead – Content Security, McAfee, Inc.
Michael Schneider, Senior Product Manager – Web Gateway, McAfee
Options for network access-from the aging laptop to scores of new smartphones and devices-continue to expand workforce mobility. While this might be great for your employees, it's a potential nightmare for your security team. Learn how a consistent, layered security approach can best protect your mobile web traffic, your corporate web traffic, and your enterprise.
McAfee: Social Media’s Effect on the Threat Landscape
Bob Wicklund, Enterprise Solutions Architect, McAfee, Inc.
Tim Roddy, Sr Director, Product Marketing, McAfee, Inc.
Twitter. Facebook. LinkedIn. Social media is here to stay, and it's changing the world. It's not just changing how we communicate, but also changing the world of security by tearing the doors off the web threat vector. In this presentation, McAfee will discuss evolving messaging and web security threats, how social media has changed the landscape, how much the problem costs, and what you can do to mitigate risk in this open age of communication.
L3 Communications, SAIC, and Six3Systems: Deep Dive — The Network Security Challenge: Assuring Cyber Resiliency
Scott Aken, Vice President – Cyber Strategy and Development, L3 Communications
William Boyle, Director – Product Management, McAfee, Inc.
Robert Giesler, Senior Vice President – Cyber Programs, SAIC
Michael Kushin, Executive Vice President and CTO, Six3Systems
Is your organization prepared for the impact of a significant cyber attack? Do you know how to continue critical government missions while under fire? During inevitable security breaches, learning how to maintain the mission and contain damage is key. This session includes an interactive discussion on how to secure supply chains and protect key critical infrastructures for reliable operation through a cyber attack.
Catholic Healthcare West, Community Hospital East, Spectrum Health, and VCU Health System: Achieving Continuous Compliance within Secure Healthcare Environments
Michael E. Ruehmkorff, Director – Security Operations, Catholic Healthcare West
Josh Kinsler, Senior Security Architect, Community Hospital East
Tom Conway, Manager – Business Development, McAfee, Inc.
Jerry Matt, Engineer – TIS Information Security, Spectrum Health
Mike Meikle, Director – Security Operations, VCU Health System
Learn how to create and maintain compliance while securing non-traditional medical devices. This session will discuss the major concerns with securing a multitude of new and non-traditional devices specific to healthcare IT, including the key factors in overcoming security and privacy issues. It will also cover ways to protect critical assets for stronger healthcare services.
Apollo Group, New York City Health and Hospitals, NJVC, and Physiotherapy Associates: Security in the Age of a Mobile Workforce and Mobile Devices
Scott Carlson, Principal Security Engineer, Apollo Group
Kevin Brownstein, Manager – Systems Engineers, McAfee, Inc.
Egon Rinderer, Chief of Cyber Security, NJVC, Inc., NGA
Corey Cush, Assistant Vice President – Infrastructure Services, NYC Health & Hospitals Corp
Kevin Slate, Vice President – Information Technology, Physiotherapy Associates
Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more and more devices both in the traditional office and in the teleworking and mobile workforce. Join the interactive discussion on best practices for proactively managing devices across all levels of your agency.
CSC, HP, and NIST: Continuous Monitoring and FISMA Compliance
Graham Logsdon, Director – Global Security Solutions (Americas), CSC
Anil B. Katarki, DC2 Security Manager, HP
William (Tony) Cole, Director – Professional Services (Federal), McAfee, Inc.
Dave Waltermire, SCAP Architect, NIST
Continuous monitoring is a key component in the risk management process. Join an interactive discussion to learn how real-time threat monitoring can affect IT infrastructure. Discover what is needed in an agency's security architecture, how to navigate the latest processes, and how to comply with government regulations like FISMA.
CSC, Lockheed Martin, Military Health System, and Prince George’s Community College: Securing the Government Cloud
Hal Munsell, Network Engineer – Senior Principal Leader, CSC
Tom Hines, Chief Architect – Networks and Security, DoD-MHS
Christopher Kachigian, NexGen Chief Security Officer, Lockheed Martin
Scott Montgomery, Vice President – Business Development, McAfee, Inc.
Ajay Gupta, Director of IT Security Services, Prince George's Community College
Learn how to overcome the main security concerns of today's government cloud infrastructure. Cloud computing is a major priority for the administration and the American people. Public and private sector must work together to secure the cloud and address key issues in establishing this security. Join and listen to a discussion on how to build a secure framework as well as establish continuous security practices for cloud systems across agencies.
Track 3 Public Sector Lunch Session: Solving the Security Conundrum – How to Do More with Less
Cathilea Robinett, Executive Director, Center for Digital Government
Jhone M. Ebert, Chief Technology Officer, Clark County School District
Todd E. Olson, Chief Financial Officer, Governor's Office of Information Technology
John Cleveland, Chief, Security & Compliance Section, State of CA Employment Development Department
Chris Buse, Chief Information Security Officer, State of Minnesota
Phyllis Schneck, VP & CTO, Public Sector, McAfee
With cyber attacks and threats at an all time high and growing exponentially, the need for not just cyber security awareness, but rather a solid defense-in-depth strategy to help thwart attacks, has never been greater. At the same time, state budgets are shrinking and headcount is decreasing making it even tougher on agencies to maintain their existing levels of security much less consider making new investments. What do you do? Learn from key state and local government leaders who will share some of the innovative steps they have taken to solve this conundrum and hear from Executive Director of Center for Digital Government Cathilea Robinett as she gives a state of the union. You will also learn from Dr. Phyllis Schneck, McAfee's Public Sector CTO as she takes you through the current threat landscape and ways you can help mitigate your risk. This presentation will not be available to view or download.
McAfee: Deep Dive — 20,000 Leagues Under the Sea: Network Security Plus Hacking Exposed Network Edition Demo
Vinay Anand, Senior Director – Product Management (Network Security), McAfee
Ryan Wuensch, Technical Director – Network Security, McAfee
Stuart McClure, Senior Vice President & General Manager – Governance, Risk, & Compliance, McAfee
Well-coordinated, targeted attacks are rapidly on the rise. These attacks are orchestrated by a growing group of malicious hackers with very damaging objectives. Responding to sophisticated, multi-vector attacks requires a sophisticated, multi-vector solution. In this deep dive session, McAfee network security and McAfee Labs experts will demonstrate the power of event correlation, Global Threat Intelligence, and integration across network and endpoint to discover and stop even the stealthiest attacks. Using the recent Night Dragon Attacks as an example, presenters will perform a live demonstration of how McAfee network security solutions block the latest attacks from the beginning.
CloudShield: Protecting High-Value Networks
Tim Peterson, Principal Architect, Strategic Development, CloudShield
Paul Rebeles, Vice President, Director of Information Assurance Services, SAIC
Chris Jordan, Vice President, Network Intelligence, McAfee
Today's networks are under a constant barrage of sophisticated attacks. New layered protections are necessary to provide visibility of the threats, identify vulnerabilities, and ultimately prevent the attacks from compromising and disrupting network operations. The combination of McAfee Network Threat Response (NTR), McAfee Global Threat Intelligence (GTI), CloudShield Cyber Platforms and SAIC expert security analysts offers security architects and enterprise defenders a new and sophisticated approach to dealing with advanced malware and other emerging threats. This breakout session will provide an overview of this layered approach and provide attendees with a tangible blueprint for accelerating advanced malware detection and mitigation.
Advance Auto Parts, Catholic Healthcare West, Oracle, and McAfee: Panel: A Few Good Men—Real Lessons from Real Network Security Heroes
Joel Yonts, CISO, Advance Auto Parts
Ben Herrick, Senior Security Engineer, Catholic Healthcare West
Mark Tonnesen, Senior Vice President and CIO, McAfee, Inc.
Leonid Stavnitser, Senior Director, Security Solutions Center, GIT Risk Management, Oracle
Join this panel discussion with some of the industry's most respected security executives and professionals. Panelist will share insights into the latest network security best practices that help keep their networks safe.
McAfee: The Right Stuff—Executives Share the McAfee Vision for the Future of Network Security
Manish Gupta, Vice President – Product Management, McAfee, Inc.
Ramesh Gupta, Senior Vice President – Product Operations- Network Security, McAfee, Inc.
Find out where your investment in McAfee Network Security will take you in the next three to five years. Join McAfee executives as they uncover the strategy and roadmap for network security, highlighting how a new generation of threat research and intelligence, high-performance architectures, and cross-vector correlation delivers superior levels of network security through enhanced visibility, performance, and control. This presentation will not be available to view or download.
McAfee: Catch Me if You Can — How to Detect, Respond to, and Prevent Targeted Attacks on the Network
William Boyle, Director – Product Management, McAfee, Inc.
Targeted attacks have nearly every IT organization quaking in their boots these days. Targeted attacks, by nature, are extremely difficult to detect and even harder to prevent-until now. Join this session and learn how behavioral intelligence and multi-event attack detections can detect and prevent even the most sophisticated APTs. McAfee also presents the latest tools for network forensics and advanced malware detection.
Citrix and McAfee: Deep Dive — Plan for Success: Scalable Enterprise Design and Layered Security for VDI
Rob Ferencik, Sr. Sales Engineer, Virtualization Team – West, Citrix Systems, Inc.
Brandon Tschida, Systems Engineer, McAfee, Inc.
This session delves into the hosted desktop options with Citrix and McAfee MOVE for VDI and provides guidelines for capacity planning and resource management. Learn from Citrix technical experts that a single desktop type will not cover all use cases and what to consider in designing for an architecture that scales and aligns with user requirements, expectations, and necessary security protections. This deep dive session will give an overview of the types of hosted desktop options and show the resources needed to support these configurations with McAfee technical security experts outlining the recommended security controls and how to minimize resource impacts and deliver ease of security management.
ATB Financial and McAfee: Embracing the Consumerization of IT While Mitigating Risk — How a Financial Institution Can Find Balance
Chris Timmons, Senior Manager – Information Security (GCIH, CISSP), ATB FInancial
Brian Contos, Director – Vertical Solutions Marketing, McAfee, Inc.
Join in a frank discussion about the security issues present when addressing the consumerization of IT while protecting critical business assets. Learn from financial organizations how they find balance and use a range of controls and processes for success.
VMware and McAfee: Leaders in Changing the Way You Will Think about Data Center Security
Jeremiah Cornelius, Information Security Architect – Technical Alliances, VMware
Matt Brinkley, Solutions Architect, McAfee
This session gives a peek into the strategic work that McAfee and VMware are engaged to achieve higher effectiveness for security management in the data center and the cloud. Get an introduction to the triple power (endpoint, edge and application) of the newly introduced API sets and development framework from VMware and how this might change your perception of how operations and security can intertwine. The highest levels of availability and responsiveness along with dynamic resource pools deliver unprecedented flexibility and reliability. These environments demand the best security paradigm to deliver business critical applications, services, and private cloud infrastructure. Get a chance to ask direct questions to key technical experts and learn more about the vision and direction of security enhancement that McAfee and VMware are tackling for the next-generation data center/private cloud.
Forrester Research and McAfee: Managing Personal Devices in Enterprises
Chenxi Wang, Vice President and Principal Analyst, Forrester Research
Kevin Sapp, Senior Director – Mobility Product Development, McAfee, Inc.
Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure processes such as remote wipe, pin-based entry, and centralized management will satisfy security requirements of some organizations. However, when the mobile actions of the user conflict with the interests of the enterprise, this raises notable legal issues surrounding the adoption of personal devices in the workplace. To address the often conflicting legal, privacy, and security requirements, security professionals must work with general counsel, a chief privacy officer, and an IT ops lead to develop a robust mobile policy baseline. For a successful mobile implementation, you must also balance the security requirements of the enterprise with the user's device experience. This session investigates a mobile policy framework and technology options to securely manage personal devices in enterprises.
McAfee: Optimizing Security for Virtualized Environments
Chris Ellis, Sales Systems Engineer, McAfee, Inc.
Find out how to better secure your virtual infrastructure environment. This session will investigate the impact of virtualization on security and the limitations and drawbacks of relying solely on traditional security technologies. This presentation also will discuss a new breed of solutions optimized for virtual environments and will explore how to build a "best of breed" hybrid architecture.
McAfee: Deep Dive — Hacking Exposed Countermeasure Session: Virtual Patching for Databases
Dan Sarel, Vice President – Database Security Products, McAfee, Inc.
Slavik Markovich, Vice President and CTO – Database Security, McAfee
So you figured out that your corporate databases can be hacked by a 10-year old. What can you do to protect them? This session will demonstrate some hacking methods and discuss countermeasures, such as best practices and hardening, database management system native security methods and their limitations, vendor security patches, and McAfee vPatch technology.
McAfee: Network Security on the Silver Screen
David LePage, Enterprise Solutions Architect, McAfee, Inc.
Dana Torgersen, Product Marketing Manager, McAfee, Inc.
Most traditional firewalls are blind to Web 2.0 (port 80) applications and encrypted (port 443) traffic. But the next generation McAfee Firewall enables you to see and control this traffic. Built on 15 years of enterprise firewall expertise, our next generation firewall is used by some of the most secure networks in the world. Join this session to learn the basics about next generation firewalls, including user and application visibility and policy-based control, streamlined rule management, visualization of network traffic, plus our heritage of protecting critical assets within high assurance environments. You'll leave with a new understanding of how to protect your network and look at security depicted on film in a whole new light!
COUNTRY Financial, Cyber-Ark Software, Intel, NitroSecurity, and McAfee: Security Connections Panel — Visibility and Velocity: The Power of Multi-Vendor Integrations
Tim Lieder, Information Security Analyst, COUNTRY Financial
Richard Weeks, Vice President, Cyber-Ark Software
Girish Juneja, Director – Application Security and Identity Products, Intel
Ed Barry, Vice President – Security Innovation Alliance, McAfee, Inc.
Michael Leland, CTO, NitroSecurity
Don't let your security systems become islands. Companies that use standalone products and consoles in today's heterogeneous IT environment face higher risk and operational costs. McAfee is leading the way, not just in integrating its own portfolio, but also integrating its management platform with over 100 partners in over a dozen security markets. Learn how McAfee works with partners to lower the cost of ownership and operation through smart integrations.
McAfee: McAfee Risk Advisor in the Real World
Scott Taschler, Sales Systems Engineer, McAfee, Inc.
Dave Karp, Solution Architect Lead – Risk & Compliance, McAfee
McAfee Risk Advisor combines threat, vulnerability, and countermeasure data to give you a truer picture than ever before of risk in your environment. However, risk metrics are only as good as the data used to generate them. Find out how you can ensure Risk Advisor is producing optimal and accurate results which lead to efficiency gains in vulnerability management and remediation processes.
McAfee: Where Are You Exposed? Learn to Duck and Cover or Provide Real Mobile Security
Jimmy Shah, Software Development Engineer, McAfee, Inc.
Paul Dahn, EMM Solution Architect (Americas), McAfee, Inc.
Today's mobile workforce are becoming the enterprise's next line of exposure. "Jailbroken," "rogue devices," and "data loss" are terms that will make even the most seasoned information security officer take notice. This technical session will focus on the growing threats identified from McAfee Labs, a demo on the true exposure, and how to mitigate risk from a bad app. After attending this session, you will learn the recommended configuration defaults for best protection and how to create reports and policies that will provide enterprise-level visibility and compliance for your mobile workforce.
Amedisys, Apollo Group, and McAfee: Deep Dive — Getting Value from your McAfee Data Loss Prevention Investment
Paul Bosworth, Senior Information Security Engineer, Amedisys, Inc.
William Thorn, Senior Manager of Information Security, Apollo Group, Inc.
Anthony Kubinski, Enterprise Solution Architect, McAfee
You've either bought or are considering purchasing McAfee Data Loss Prevention (DLP). What's your implementation strategy? Should you start with network monitoring, or is device control your first step? How do you automate DLP so that it doesn't interfere with your business? Who are the business stakeholders that need to be involved? In this session, learn field-proven deployment best practices from experienced McAfee DLP solution architects.
HP: Establish Control Through Comprehensive Visibility
Peter Usherwood, Practice Lead – Secure Boardroom, HP
How do you integrate and maintain your security policies and processes in alignment with your business drivers, compliance requirements, and threat profile? In this session, you will learn how you can utilize and combine your existing sources of security data into one central system, enabling your enterprise to make business led operational and investment decisions, measurably reduce business risk and drive business growth. Security experts from HP will show how you can use the advanced tools and methodologies in HP's Secure Boardroom to integrate with McAfee ePO and other technologies to provide a comprehensive view of your overall security program and the ability to drill down into the detail of specific security controls and functions.
Intel: Benefits from Hardware-Assisted Intel Security Features
This session will provide an overview of the hardware-assisted security features built into Intel processors and how these are being utilized by end customers to help them tighten security along the entire network.
Tyco and McAfee: Creating a Security Program within a Web-Based Application World
Jason Malley, Tyco International, Ltd.
David Bryant, Tyco International, Ltd.
Rudolph Arajo, McAfee
Most large corporations develop and maintain a large web-based business presence that spans multiple business units as well as time zones. Implementing effective and consistent security controls across the varied business units and geographies is difficult but, as we've seen in the news, failure to do so can lead to public embarrassment, loss of revenue, loss of sensitive data, and an impact to the company's financials. From a risk management perspective, developing a mechanism to secure web-based applications is key to maintaining a secure business presence and maintaining customer confidence. In this session, we will discuss lessons learned and show how your organization can start to create a security program framework that addresses web-based applications and scales to your environment.
Cyber Security Strategies, Security & Defence Agenda, and McAfee: Are the US and its Allies Prepared to Defend their Vital Institutions From Cyber Attacks?
Robert Lentz, President & CEO, Cyber Security Strategies
Giles Merritt, Director, Security & Defence Agenda
Phyllis Schneck, VP & CTO, Public Sector, McAfee
Nation states, international criminal syndicates, and terrorists are deploying sophisticated attacks against such vital institutions such as defense, intelligence, and homeland security departments. Are the US and its allies prepared to respond? Which nations are the most and least prepared? This session will feature scholars and former government officials who collaborated on a global study under the leadership of the Security Defense Agenda, a leading security think tank based in Brussels, who will address these vital questions.
Track 7 Security from the Trenches Lunch Session: Securing the Digital Oil Field
Ayman Al-Issa, Chief Information Security Officer,
Hear about the "Digital Oil Field Cyber Security," a first-of-its-kind cyber security design in the world, and learn how McAfee is working with a leading oil company in the Gulf region to protect their SCADA systems and integrating the solution into their business networks. Gain insight into protecting your critical network infrastructure, and find out how McAfee's integrated security solution and services takes into account all threat vectors and builds in resilience to ward off any unknown attacks. This presentation will not be available to view or download.
McAfee: Deep Dive — Being Aware of the Big Bad Wolf: A Security Management Deep Dive
Sven Schrecker, Software Architect, McAfee, Inc.
Jon King, Solutions Architect, McAfee
Many organizations today struggle with the overwhelming volume of security data generated by the swarm of tools required to implement security processes. Achieving a deep understanding of where you are at risk, what is at risk, and how it is at risk is the key to tipping the balance of power back over in your favor. This deep dive examines security management using McAfee ePO and McAfee Risk Advisor to effectively turn raw data into actionable security information for improving the level of security in your organization.
Kaiser Permanente and McAfee: Operational Risk Management
Richard Seiersen, Security Principal, Kaiser
Kevin Reardon, Sr. Director, Worldwide Value Consulting, McAfee, Inc.
Take action NOW, move your organization from tactical to strategic. How? By deploying an Operational Risk Management framework, organizations can transform their environment, taking Risk Management to the next level. Automate the collection of enterprise assets, threats, and vulnerabilities and mitigate policy data. McAfee solutions such as Vulnerability Manager, Policy Auditor as well as McAfee Risk Advisor play a key role within the ORM Framework. In this presentation we will outline the ORM framework as well as the real world ROI it delivered to the business.
Accuvant: Unpublished Secrets to Managing your McAfee Security Infrastructure
Paul Dant, Partner Services Director, Accuvant
Spanning hundreds of thousands of nodes, hundreds of clients and six continents, Accuvant's team of experts has deployed the largest, most complex McAfee security solutions in the world. From migrations to optimizations to integrations, Accuvant has provided invaluable expertise across McAfee's entire product footprint. In this session, take a look behind the scenes at unpublished secrets from the world's foremost McAfee Professional Services Partner. Accuvant Architects will demonstrate effective and pragmatic solutions to some of the industry's most difficult implementation, operational and management challenges. As we dive deep into some of McAfee's network, endpoint and content security products, you will learn to apply Accuvant's proven methodologies in your own environment to even further increase the return on your investment. When it comes to security, there are already too many secrets. Don't miss this opportunity to uncover ours.
Hospital Corporation of America and McAfee: The Business Need for Continuous Vulnerability Monitoring and Risk Management
Cameron Hicks, Security Threat Engineer, HCA
Michael Flicek, Senior Security Threat Engineer, Hospital Coporation of America
Robert Banniza, Manager – Threat and Vulnerability Management, Hospital Corporation of America
Brian Robison, Senior Product Manager, McAfee
You don't have to separate security from the business. Using a very unique approach, the two can complement each other. Learn how Hospital Corporation of America uses McAfee Vulnerability Manger to deliver business continuity through better risk management.
McAfee: McAfee Application Control — Delivering ROI by Utilizing Best Practices Deployment Methodology
Brian Brown, Solutions Architect, McAfee, Inc.
McAfee Application Control represents a new paradigm in combining security, operations, and compliance in one tool. This session will focus on how to successfully deploy Application Control using a proven Best Practices methodology developed from real world implementations. Learn the tips and tricks to configure and deploy Application Control in various environments (POS Systems, corporate data centers, desktops/laptops) and avoid pitfalls. The linking of security practices with operational aspects and compliance requirements will be addressed via functional scenarios demonstrating the benefits to those three key areas.
International Rectifier and McAfee: Deep Dive — Experience McAfee Data Protection
James Tu, Director of Information Security, International Rectifier
Dan Larson, Enterprise Solution Architect, McAfee, Inc.
Anthony Kubinski, Enterprise Solution Architect, McAfee
Learn how you can get more out of your existing McAfee data protection investments. From design to execution, your endpoint encryption and data loss prevention installations can operate even better with the help of our McAfee experts and their proven tips and tricks. You'll find this technical deep dive refreshing, filled with practical insights you can use right away.
McAfee: Simplifying Encryption Software Updates
Anthony Merry, Senior Product Manager, McAfee, Inc.
Stefan Backstrom, Senior Product Manager – EMEA, McAfee, Inc.
Dave Anderson, Senior Director – Solutions Marketing, McAfee
Are you ready to update your full disk, file/folder, and removable media encryption software to the latest and greatest versions? Are you dreaming of how McAfee ePolicy Orchestrator will make encryption management more streamlined and effective? Or perhaps you are contemplating updating your software? Join McAfee experts as they examine benefits, strategies, implementations, tips, and how-to's gathered from real world experience to help make your job easier.
McAfee: The Anatomy of Today’s Threat Vectors and How to Stop Them: an Architectural Review of McAfee Security Products
Jim Waggoner, Director – Product Management, McAfee, Inc.
Dan Wolff, Group Solution Marketing Manager, McAfee, Inc.
Matt Brinkley, Solutions Architect, McAfee
How has McAfee designed technology to protect against the major threat vectors? Threat vectors are ever-changing and you need to understand the same exploit roadmap the bad guys are using to penetrate your security. A multi-layered protection environment is more important than ever. In this session, McAfee's senior endpoint architect and product management will help you discover how malware is trying to get through your defenses and how to best utilize the right technology in the McAfee endpoint protection products to be better protected.
McAfee: Accelerate Data Classification
Ratinder Ahuja, Vice President – Reconnex Technology, McAfee
Data classification is fundamental to good information security, but how do you overcome ever-increasing mountains of data? Inventorying your sensitive data is a good first step, yet this alone leaves your data vulnerable. A better approach would be one that quickly analyzes your data, automatically categorizes it, and ties into existing remediation workflows. Learn how the latest advances in McAfee Data Loss Prevention will help your data classification project succeed and scale, paving the way to a coherent, appropriately prioritized data protection program.
Ernst & Young, Saviynt, and McAfee: Protecting Sensitive Information with Dynamic Data Loss Prevention (DLP) Policies and User Behavior Analysis
Anil Markose, Senior Manager, Ernst & Young
Chris Bell, Vice President, Business Development, Saviynt
Rich Trezza, DLP Solutions Architect, McAfee
Enterprise Resource Planning (ERP) systems such as SAP and Oracle often store private employee information, supplier and customer lists, product pricing, and even valuable intellectual property. Traditionally, the security around this information has been limited to the capabilities of the ERP system through access controls, segregation of duties, and monitoring within the ERP system. However, since the information can be extracted by an authorized user in many different formats and because the information is constantly accessed and modified, it becomes difficult to protect this information from data loss once it leaves the ERP system. How can you create policies for a DLP tool if you do not know what to look for? Attend this session, and learn how this problem is being solved for a leading chemicals company. By identifying sensitive information as it leaves an ERP system, dynamically creating DLP policies to protect that information, and analyzing user activities to detect high risk behaviors, this innovative solution solves one of today's most pressing DLP challenges.
McAfee: Deep Dive — McAfee Quality Initiative
Jim Sartain, Senior VP, World-Wide Quality, McAfee
This session will cover the McAfee strategy for driving continuous improvement in product quality and customer experience. Topics will include the McAfee customer feedback process, software engineering best practices, tools and metrics used to maximize threat detection while minimizing falses, and the product and security content quality assurance and release process.
McAfee: McAfee Labs Capabilities and Processes
Rees Johnson, Senior Vice President & General Manager – Network Security, McAfee, Inc.
McAfee Labs employs 300+ of the most talented information security scientists and researchers in the world. It is responsible for identifying, categorizing, and characterizing each of the 55,000 new pieces of malware that appear each day. This session reviews the processes used to identify and protect against the propagation of these threats. Learn about research that will drive new McAfee products in coming years.
McAfee: Beyond Signature-Based Protection — Next-Generation Anti-Malware
Brian Trombley, Director – Product Management (Consumer), McAfee
Graham Strachan, Director – Engineering, McAfee
The new McAfee malware detection engine revolutionizes the methodologies used to identify known and emerging threats. This session covers the changes in architecture, usage of real time, cloud-based threat intelligence, and accelerated protection schemes to improve detection and minimize "time-to-protection." Learn how these changes can be applied to protect endpoints, mobile devices, and IT infrastructure.
McAfee: Targeted Attacks — Reality or Myth?
Rahul Mohandas, Senior Research Lead, McAfee, Inc.
Gone are those days when hackers used to attack for name and fame. The current generation of hackers are financially motivated and sponsored entities. This presentation talks about McAfee Labs investigation into targeted attacks and the use of these attacks against high profile targets designed to steal sensitive information.
McAfee: Emerging Threat Landscape
Vincent Weafer, Senior Vice President – McAfee Labs, McAfee, Inc.
As the emergence of Night Dragon and this year's other enterprises attacks prove, the volume and sophistication of malware attacks continues to increase. This session reviews new and emerging trends in malware development and deployment. Topics covered include mobile malware, social platform vulnerabilities, evolving hacker tactics, botnet trends, and hactivism/cyber war events.
Lockheed Martin and McAfee: Deep Dive — Unknown Data Center Breaches: A Layered Defense Strategy Against Targeted and Persistent Attacks
Chad Anderson, Endpoint Security Manager, Lockheed Martin
Mike Cioffi, Solutions Architect, McAfee, Inc.
Swaroop Sayeram, Senior Product Manager – Application / Change Control, McAfee, Inc.
Your servers have been breached, user IDs have been compromised, hackers are doing a low and slow crawl of your network, and you aren't aware of it. Such attacks, known as targeted attacks, are increasingly focused on data centers and often go undetected. This session examines ways to detect targeted attacks, layered risk management tactics, and strategies to protect critical assets. This presentation will not be available to view or download.
McAfee: Don't Let Security Undermine your Data Center Build Outs
Chad Holmes, GHE Sales Engineer, McAfee, Inc.
bret brasso, Field Account Manager, McAfee, Inc.
Data center architectures are evolving to meet the complexities of increasing business requirements to stay competitive and agile. The challenge for data center architects and IT leaders is to build security into the design and architecture phase. Proactive security versus bolting on security after a costly incident will free businesses to move forward more quickly and with confidence. This session proposes best practices for creating secure, optimized data center architectures to enable agile business services. This presentation will not be available to view or download.
Intel and McAfee: Do I Really Need to Build a Private Cloud? Stop Thinking About Them, Learn What We Can Do for You, and Understand the Business Advantages
Billy Cox, Director of Cloud Software Strategy, Intel
Brian Foster, Senior Vice President, Worldwide Product Management, McAfee
Learn why infrastructure needs to change to support the future of business. How do you get from where you are today to where you need to be? You might find yourself building a cloud. This session provides valuable insights into market alliances and transformations, and explores the transition to next-generation infrastructures and technologies.
Crossbeam and McAfee: Solutions for 10, 40, and 100 Gigabit Data Center Networks
Peter Doggart, Director of Product Marketing, Crossbeam
David LePage, Enterprise Solutions Architect, McAfee, Inc.
A converged 10GbE fabric promotes efficiency, manageability, and flexible uses of computing resources. Future data centers will look toward faster speeds of 40 Gigabit and 100 Gigabit Ethernet to keep pace with increasing demand for bandwidth. This session explores a comprehensive security solution for high availability data center networks and demonstrates how this solution reduces the total cost of infrastructure management.
McAfee: Sharing is Caring — How McAfee IT Addresses Data Center Security
Chris Taylor, Security Engineer, McAfee, Inc.
Byron Holt, Information Security Manager, McAfee, Inc.
McAfee data centers host a variety of assets and services that are vital to the company and its customers and partners. These systems include corporate systems with regulated data, engineering systems used to develop security products, customer facing systems meeting PCI level 1 merchant requirements, and the infrastructure for McAfee Global Threat Intelligence and Security-as-a-Service security services. See how the McAfee Global Security team is working to simplify and standardize the data center environment to enable better threat detection and response. This session focuses on the application of newer technologies at the network, hypervisor, and host levels to drive a unified security strategy.
McAfee: Deep Dive — Protecting your Assets in the Cloud
Scott Chasin, CTO – Content and Cloud Security, McAfee, Inc.
Despite the enormous interest in cloud computing, security remains the top barrier for adoption. In this practical, technical session, McAfee experts discuss and demonstrate how to protect data moving to and through the cloud across all devices, as well as how to better and more securely manage identities in the cloud ecosystem.
Apollo Group: Case Study — Building a Unified Security Model across Cloud Traffic
Lenin Aboagye, Principal Security Architect, Apollo Group
As the enterprise embraces the cloud, the primary traffic channels of email, web, and identity authentication begin to proliferate beyond the firewall to mobile and off-premise private cloud platforms. This traffic crosses security layers, each requiring a unique set of security capabilities to address data loss, identity federation, and threat prevention. Commonly this requires deployment of multiple vendors and expensive professional services to create a cohesive, working system. In this session, hear a Fortune 1000 company present a case study illustrating how it more efficiently and effectively secured its data moving to and through the cloud using McAfee Cloud Security Platform.
Intel: Building and Protecting Identity and Trust in the Cloud
Blake Dournaee, Product Management – Application Security and Identity Products, Intel
Today cloud access security requires more than a simplistic secure VPN tunnel or a single sign-on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. In this session, Intel showcases key technologies that are in being used today to build a trusted client to cloud connection. This session demonstrates how enterprise-class security can be extended to the cloud for client aware access control, user to cloud SSO, and web services security.
Bloor Research: Choosing a Secure Cloud Provider
Fran Howarth, Senior Analyst – Security, Bloor Research
While most cloud providers say that security is a top priority, how do you really know whether you can trust them to protect your data or infrastructure reliably and securely? In this informative session, McAfee Cloud security experts discuss the things you should ask and be looking for when choosing a cloud computing provider.
Intel: Securely Managing your APIs in the Cloud
Andy Thurai, Chief Architect, Application Security and Identity Products, Intel
While the mantra of "reusing" existing assets and infrastructure has become established as part of the common language associated with Cloud based REST/SOAP based implementations, companies have been exposing their application functionality through Application Programming Interfaces (APIs) to other applications and developers for years. While, at first glance, API management might be an old concept, Cloud based implementations pose new risks for Web services and Web API transactions. In this session, Intel will discuss key technologies that will help you protect an increasingly important Enterprise I/O point - one, that in today's environment has the potential to connect and expand the Enterprise to new customers through all manners of technology to meet today's demands.
McAfee: Deep Dive — McAfee ePolicy Orchestrator 4.6 Web API Demo
Colby Burkett, Sales Engineer, McAfee, Inc.
Torry Campbell, Solution Architect Lead – Endpoint Security, McAfee, Inc.
This live demonstration will explain how to use the McAfee ePolicy Orchestrator 4.6 Web API to automate activities such as system management, platform maintenance, incident response, and reporting.
Avecto: The "Least Risk" Windows 7 Migration
Mark Austin, CTO, Avecto
As organizations migrate to Windows 7, they are also introducing desktop lockdown. While this greatly reduces security risks, it also reduces end user productivity and increases IT support - both serious issues for any business. The "least risk" Windows 7 migration is about empowering users without compromising the integrity and security of your corporate system. This session discusses the challenges along the path to rolling out secured Windows 7 desktops, and the tools available to McAfee and Avecto customers which make this possible.
Lockheed Martin and McAfee: Migrating to McAfee ePolicy Orchestrator 4.6 in a Global Enterprise
Alan Boothby, Information Assurance Engineer, Lockheed Martin
James Wolfe, Chief Security Engineer, Lockheed Martin
Greg Wirt, Global ePO/MA Tier III Team Lead, McAfee
This session will discuss migrating to McAfee ePolicy Orchestrator 4.6. Topics will include: 1) Upgrade vs. Re-architecture: Why we chose to build new. 2) Being on the leading edge: Can you really move a first iteration of a new version of a tool? 3) Speed bumps along the way: Bad indexes, crashing event parsers, impending end of support. 4) Build for success: Active participation in the McAfee JDP, Beta, and EAP. 5) Drinking your own champagne: Running your desktop in beta before you take it to the users. 6) Migration: Thoughts on how to migrate your infrastructure quickly. 6) How we did it: Tools, team, and technical topics.
McAfee: A Network with a View — Advanced Tips for Increasing Visibility of Behavior and Threats on your Network
Sangram Dange, Director of Product Management – Network Security, McAfee, Inc.
Anwer Siddiqui, Sales Systems Engineer, McAfee, Inc.
If there's one thing all network managers have in common, it's the desire to see exactly what's happening on their networks. In this session, McAfee Network Security experts will demonstrate several ways to view and interpret network traffic patterns, device behavior, and threat-based anomalies to help you take back control of your network.
Accuvant and McAfee: Optimize Network Security Using Best-in-Class Risk Management
Russ Tegan, McAfee Solutions Architect, Accuvant
Darren Thomas, Enterprise Solution Architect – Risk & Compliance, McAfee
Srinivas Loke, Senior Technical Product Manager, McAfee
An in-depth risk assessment of most corporate and data center networks will uncover countless system and application vulnerabilities, many carrying severe risk exposure to critical assets. Despite knowing their networks are at risk, most IT organizations lack the tools and operational resources to patch infrastructure in a timely fashion. In this session, McAfee experts demonstrate how tight integration between McAfee risk management and network security solutions provides an optimized response to your organization's largest security risks. The session includes a live demonstration of how to easily access and quantify global risk and immediately prioritize and deploy countermeasures.
NitroSecurity and McAfee: Deep Dive – Security Risk Management and SIEM
Michael Leland, Office of the CTO, NitroSecurity
Jerry Skurla, Executive Vice President, Marketing, NitroSecurity
Dave Anderson, Senior Director – Solutions Marketing, McAfee
Learn how SIEM is a critical component for any company to successfully manage a security, risk, and compliance strategy.
NitroSecurity: Information Management with McAfee ePolicy Orchestrator and SIEM
Michael Leland, Office of the CTO, NitroSecurity
The integration between McAfee ePolicy Orchestrator and SIEM enables more effective management and protection of sensitive information. A solution demonstration will showcase how the integration supports risk and compliance management.
NitroSecurity: Content Aware SIEM – Beyond Logs and Events
Mel Shakir, Office of the CTO, NitroSecurity
Next-generation SIEM solutions integrate and correlate database sessions and application layer data to help detect data loss from both trusted insiders and advanced external threats. A demonstration will showcase these powerful threat detection and incident response capabilities.
Global SecurityAlliance Partner Summit – The Power of Three
The McAfee Worldwide Channel Group invites you to attend our partner keynote session where you will learn about The Power of Three: McAfee, Intel, and our Partner community. Find out how together we are creating innovative solutions for our customers and leading the fight against cybercrime. Additional Power of Three Sessions - Programs, Opportunity, and Partners: Spend two days getting program and product roadmap updates, exclusive sneak-peeks of new technologies on the horizon, and tips on how to leverage the power of our new profitability and enablement programs to drive more business. You'll meet the people who are dedicated to helping you succeed: the McAfee channel executives from around the world, product, technical, operations, and regional sales teams. Best of all, you get a great opportunity to network with other partners from around the world and down the street in the McAfee SecurityAlliance Partner Program. Expand your reach through our Security Innovation Alliance, find out how other partners are tackling their customer's security challenges, and learn about new markets you can enter. View agenda here. Note: If you are a member of the McAfee SecurityAlliance program and you register for FOCUS, you get access to the Partner summit at absolutely no cost.
Firewall Demo — How to Add Security Controls that Are Missing from Stateful Firewall Deployments
Join this fast-paced, technically deep session covering how to use McAfee Firewall Enterprise as a security gateway to protect critical assets in data centers and private/hybrid cloud environments. This session will address how to protect email, web, application, and services infrastructures, as well as how to provide true application-level control (like command filtering) as a core part of a layered defense approach. Learn about key features that only McAfee Firewall offers to protect high-assurance environments. Find out how to protect critical data in highly regulated and compliance-driven environments, and learn how to block connections from countries you don't conduct business with.
Firewall User Group
Join McAfee Firewall product leaders for this interactive session. This session will cover tips and tricks, recent feature innovations, and product vision and direction.
Firewall Office Hours
If you either work on or own firewalls, we want to hear from you! Find out about product enhancements, and let us know which feature upgrades you would like to see in the future.
McAfee Web Gateway – In-Depth Technical Session
Join McAfee Web Gateway experts for this in-depth technical session, and learn how one large customer deployed Web Gateway v7 in record time. The technical administrator for this organization will share best practices, tips, and tricks. McAfee Web Gateway experts will discuss authentication, monitoring, and troubleshooting and will help you get the most out of your Web Gateway deployment by sharing rules creation best practices and malware scanning options and controls. The session will conclude with a roadmap presentation and discussion, giving you the opportunity to share current challenges and thoughts on what you'd like to see in the future. This session will offer a unique opportunity to spend time with the Web Gateway experts and get all your questions answered.
Introducing McAfee Email Gateway 7
Join us for a sneak preview of the next-generation email security solution, McAfee Email Gateway 7. This interactive session will offer a product overview, a preview of the new GUI, and discussion of product enhancements. A product demonstration will include newly enhanced and integrated technologies: McAfee ePolicy Orchestrator, data loss prevention, compliance, and encryption.
Please note: this session is from 1:00 pm - 3:00 pm and repeats 3:30 pm - 5:30 pm.
McAfee Network Access Control – Connecting McAfee Network Security Platform with McAfee Endpoint Security
Learn how McAfee Network Access Control enables enterprise customers to address key business problems and initiatives such as end device consumerization and compliance. This presentation offers an overview of the solution and discusses key use-cases and deployment best practices. This session also offers you the unique opportunity to meet with McAfee Product Management. Please note: Interest in this session is extremely high, and space is limited. Be sure to arrive at least 15 minutes early to ensure your admission.
Network Security User Group
Join your peers for an open dialogue on the latest network security topics. McAfee, network security executives, product managers, and engineers will lead discussions on the McAfee network security portfolio: McAfee Network Security Platform, McAfee Network Access Control, McAfee Network Threat Behavior Analysis, and McAfee Network Threat Response. This information-packed session will cover product feature enhancements and product roadmaps, and will include an interactive Q&A session with McAfee experts and executives who will advise how to keep your business up, running, and secure.
Network Security Office Hours
Meet with the McAfee Network Security experts for an informal chat on our world-class network security products. Drop by to ask a question or discuss how McAfee solutions can help you increase your operational efficiency and reduce IT efforts.
Powering On While Under Attack: Cyber Resiliency and Threat Landscape in Critical Energy Infrastructure
Operation Aurora, Stuxnet, Night Dragon, and Shady RAT comprise hundreds of compromises across the critical infrastructure sectors, and across the attack spectrum from espionage to kinetic damage. Global critical infrastructures and key resources require protection that can outwit the well-funded, nefarious and nimble cyber adversary. This is core to McAfee strategy: Security, authentication and situational awareness at a micro and macro level: within our chips, hardware, firmware, software and overall cyber ecosystem, to include both machine real-time data sharing and human global public-private collaboration. We invite you participate in a panel discussion led by McAfee Global Public Sector CTO Dr. Phyllis Schneck with members of the Pacific Northwest Labs to understand how to provide next-level security protection to defend against insidious and persistent threats targeting the manufacturing and process industry.
Mobility Customer Advisory Round Table
The roundtable session is an opportunity for customers to meet with a cross-functional McAfee team-product managers, product marketing managers, and solution engineers-to share their thoughts on McAfee Enterprise Mobility Management. Hear roadmap discussions, learn best practices from solution architects, and learn more about securing new mobile devices and operating systems. Please Note: Interest in this session is extremely high, and space is limited. Be sure to arrive at least 15 minutes early to ensure your admission.
Mobility Customer Advisory Round Table
The roundtable session is an opportunity for customers to meet with a cross-functional McAfee team-product managers, product marketing managers, and solution engineers-to share their thoughts on McAfee Enterprise Mobility Management. Hear roadmap discussions, learn best practices from solution architects, and learn more about securing new mobile devices and operating systems. Please Note: Interest in this session is extremely high, and space is limited. Be sure to arrive at least 15 minutes early to ensure your admission.
Endpoint Boot Camp and Beyond
This targeted group meeting will focus on protecting customer endpoints from today's sophisticated threats that are designed to steal data and compromise businesses. Come to this action-packed meeting to hear from the product experts on best practices to properly secure your endpoints across your environment. Learn hands-on tips and tricks from McAfee experts about McAfee endpoint solutions: McAfee ePolicy Orchestrator, McAfee Endpoint Protection - Advanced Suite, McAfee MOVE AntiVirus, application whitelisting, and more. Find out how to optimize protection against the different threat vectors targeting your endpoints.
Please Note: Interest in this session is extremely high, and space is limited. Be sure to arrive at least 15 minutes early to ensure your admission.
CMSB Partner Summit (Invitation Only)
This exclusive event is dedicated solely to the exchange of ideas, needs, and strategies for McAfee's consumer, mobile, and small business partners. All speakers and topics will explore how McAfee's consumer technologies and strategic plans can help our partners achieve their business goals and keep their customers secure. This track is by invitation only. Please contact us at CMSBFocus11@mcafee.com if you have questions.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee R&D Innovation Fair
McAfee R&D Innovation Fair offers customers the opportunity to interact directly with McAfee product engineers. Preview a sampling of innovations to come with next-generation security and security management capabilities. By appointment only. Please email Kelly_Butterfas@McAfee.com or stop by to schedule an appointment.
McAfee Labs Round Table
Leading researchers from McAfee Labs will discuss their latest research into malware, cybercrime, hactivism, & cyberwar.
Track Descriptions
Track 1 – Endpoint Protection: The Cornerstone of Security
Endpoints are a major vector for cyber attacks and must withstand relentless assaults from cybercriminals. Ensuring your endpoints are fully secured is critical to businesses success. McAfee endpoint protection solutions provide continuous, updated, and powerful security against the entire spectrum of threats, from zero-day exploits to hacker attacks. Attend these sessions to get a better understanding of how your peers are using McAfee solutions to protect their endpoints. Learn tips and tricks to make you and your staff more effective and efficient.
Track 2 – Securing the Latest IT Technologies: Web and Email
Technology trends come and go, but the need to be secure and compliant remains a constant. Find out how leading organizations have embraced new communication options and technologies without compromising their security.
Track 3 – Public Sector: Cutting-Edge Government Security
Government entities have a unique set of security concerns. Sessions in this track address the most significant factors impacting the cyber security landscape. Learn the latest global trends in securing new technology within government, as well as how to address the ever-changing security regulations.
Track 4 – Network Heroes: Protecting Next-Gen Networks Against Super-Villains
Lex Luthor? The Joker? Superheroes have it easy. At least when compared to the thousands of villains and millions of invisible weapons you and your networks face each day. This track includes several blockbuster sessions covering super-power network security strategies and technologies for next-generation networks. Be a hero and learn how to protect your network with intelligent, adaptable network security that is smart enough to conquer today’s most villainous attacks.
Track 5 – Pushing the Boundaries of Mobility, Virtualization, and Cloud Infrastructure
Technology by itself is not disruptive. It's business and user demands of technology that push the boundaries of security and compliance. Learn from McAfee, partners, and customers how to manage mobility, virtualization, and cloud infrastructure.
Track 6 – Security Foundations
To achieve their diverse business goals, customers need to understand technologies such as vulnerability management while being vigilant about their risk posture. This track offers a range of sessions covering data, network, systems, and risk management solutions.
Track 7 – Security from the Trenches
Every day is a new day in security. The threat landscape shifts at a frenetic pace and everybody struggles to understand the issues and refortify their defenses before they are the next target. This track takes you behind the scenes highlighting what’s being done to uncover the modern day security threats and offers solutions and best practices to address these threats.
Track 8 – Best Practices in Security Management
Today’s security management is all about situational awareness, managing risk, visibility, compliance, and dashboards. Hear experts discuss their security postures and explain how easy, consistent access to data helps them identify the real security risks. Presenters will share their experiences, insights, tips and tricks, and best practices.
Track 9 – Data Protection: Safeguarding Data Everywhere
Regardless of your company's size, everything you do to protect your infrastructure, networks, and devices is ultimately about protecting your organization's vital data assets. Regulated data, sensitive information, and intellectual property all require appropriate protection. Whether you need to encrypt laptops, USB drives, and other mobile devices or implement data loss prevention to provide greater control over how your data flows throughout your organization and beyond, these sessions offer practical implementation examples and best practices for effective data protection in today's challenging environment.
Track 10 – The Changing Threat Landscape (Featuring McAfee Labs)
McAfee Labs global research team of 350+ scientists and researchers provides the most comprehensive Global Threat Intelligence in the industry. Backed by a portfolio of more than 400 patents, a network of millions of sensors spanning the Internet, and in collaboration with leading computer vendors and government agencies, McAfee Labs delivers unparalleled protection against both known and emerging threats via a complete suite of security products. In this track, McAfee Labs researchers will discuss emerging threats, malware trends, and the steps being taken to ensure McAfee customers have the best protection available.
Track 11 – Protecting the Next-Generation Data Center: Optimizing for Physical, Virtual, and Cloud Architectures
The data center has morphed. A raised floor and locked room no longer mean you are protected. Data, servers, databases, mission-critical systems, and IT infrastructure all need to work together seamlessly. Sessions in this track will discuss best practices for keeping data centers safe, functioning, and enabling your business.
Track 12 – Securing the Cloud Ecosystem
Within 10 years, more than half of the world’s data will pass through or be stored in the cloud ecosystem. Understanding the risks and best practices for securing the cloud is critical as businesses of all sizes in both private and public sectors embrace this revolutionary new framework for computing.
Track 13 – Technology Tips and Tricks
Do more with less. It’s the IT mantra. This track will dive deep into how your peers are managing the growing IT pressure to be more efficient and more responsive to business needs. Through case studies and sessions led by product experts, learn best practices for systems and network management and find out how to fine-tune your security infrastructure overall.
Track 14 – Bringing SIEM into the Security Mix
The ability to monitor IT event data automatically from any application, device, or system is a core requirement to manage a security, risk, and compliance program effectively. Security information and event management solutions can help users automatically collect, correlate, and analyze events to help determine their overall risk profile and security status. This track highlights how and why SIEM enables users to manage risk and security more effectively, and better protect their business.
View the Session Schedule for info on Track 14 sessions.
Be sure to check the Targeted Group Meetings page for additional FOCUS sessions.
(ISC)2 CPE Credits for FOCUS 11
(ISC)2 Type "A" CPEs are awarded to (ISC)2® members for activities which are directly related to the Domains of the CISSP.
CPEs are awarded at the rate of one CPE per hour of activity for information security events. As an official (ISC)2® CPE Submitter, McAfee can submit CPEs for
you after FOCUS 11. Please provide your (ISC)2 member number and your first and last name to pam_granlund@mcafee.com,
and your CPEs will be posted by (ISC)2® within approximately 4-6 weeks.
FOCUS ATTENDEES: Create your Own Agenda
Use the FOCUS Agenda Builder to identify the sessions you most want to attend and make the most of your FOCUS experience. Use your registration login information to enter the My Event Site, and click on "My Schedule" to create your personalized agenda.