Sessions Catalog
FOCUS 12 features over 70 targeted, highly technical sessions. Breakouts will offer insights and best practices to help you optimize your security and compliance initiatives.
Click on the red arrows to view sessions within each track.
See below for track descriptions. Click here to view a detailed FOCUS session schedule.
Deep Dive – Panel: Taking Network Intrusion Prevention to the Next Level
Ross Reed, Technical Advisor, FedEx
Corey Epps, Manager, Network Security, FedEx
Ryan Wuensch, Technical Director Network Security, Mcafee
Vinay Anand, Sr. Director Product Management, McAfee, Inc.
Tim Massie, Senior Security Engineer, Xerox
Next-generation intrusion prevention is reshaping the way IT deploys security in today's environments. High-accuracy at 80 Gpbs; strong correlation abilities; protection for virtualized environments; integration with threat intelligence, application, risk and endpoint data; and SIEM are all part of the game. This session is led by experts who will dive into the latest, most advanced IPS capabilities - focusing on deep inspection, signature optimization, advanced correlation, preventing advanced malware, consuming extra intelligence, and more.
- Gain technical insight into key capabilities for today’s advanced Network IPS
- Discover practical tips for threat intelligence integration
- Learn the best practices that you can use immediately within your network security platform deployments
Solera Networks: Cure Situational Blindness – 20/20 Visibility into Advanced Targeted Attacks with Big Data Security Analytics
Joe Levy, CTO, Solera Networks
When it comes to swift incident response, security intelligence and big data analytics gives you 20/20 visibility into the full network conversation and the complete picture of any security event. Learn how to respond to difficult post-breach questions: Who or what caused the breach? What systems or data were compromised? Are we sure it's over? Full packet capture combined with high-speed deep packet inspection, indexing, and reconstruction gives you the complete context.
- Gain complete visibility with combined security intelligence and big-data analytics
- Understand which difficult questions must be answered for quick incident response
- Learn how to better protect your company
The Future of Network Security: McAfee Executives Share Their Vision
Pat Calhoun, SVP/GM Network Security, McAfee, Inc.
Matt Glen, VP, Product Management - Network Security, McAfee, Inc.
Organizations worldwide are rethinking their network security strategies. McAfee leaders will discuss what they foresee as the future of the network and how McAfee network solutions will meet these requirements. Topics include: network security vision for intrusion prevention , firewall, behavior analysis and integration across the McAfee portfolio- including extra intelligence from endpoint and network sources, deeper integration with McAfee Global Threat Intelligence. This presentation will not be available to view or download.
Beverly Hills Wealth Management: Identity Access Management as a Business Differentiator
John Stuart, CIO, Beverly Hills Wealth Management
Timothy Roddy, Senior Director, Product Management, McAfee, Inc.
Vikas Jain, Group Product Manager, McAfee, Inc.
One advantage of the cloud is the ability to create innovative and scalable applications with a lower cost of deployment. A vital element is managing identity and access management, in order to protect sensitive information in the cloud. Hear Beverly Hills Wealth Management and McAfee discuss BHWM's strategy for delivering enterprise-level connectivity and service tools at a newly formed Registered Investment Advisor. Discover how strategic partnerships, cloud-based identity, and access management methods typically found in large financial institutions have helped BHWM become an independent investment services differentiator.
- Discover past and present financial services and how new federation techniques are empowering the independent advisor practice
- Understand the environment and business requirements at BHWM and how they are protected by McAfee identity and access management tools
- Learn about the parallel development of Maestro, BHWM’s custom SharePoint portal combined with McAfee’s Cloud Identity Manager products
An Inside Look – How McAfee Solved Its Own Network Security Challenges
PATRICIA HATTER, SVP Operations and CIO, McAfee, Inc.
Josh Archambault, Network Manager, McAfee, Inc.
McAfee runs one of the most attacked websites and some of the most attacked networks in the world. Join the McAfee security operations team, along with an introduction by McAfee's CIO, for an exclusive behind-the-scenes look at our own deployments of network intrusion prevention, firewalls, URL filtering, SIEM, global threat intelligence, and more.
- See a detailed view of a holistic network security strategy across an often-attacked global organization
- Learn lessons from the security trenches related to advanced attacks
- Gain a unique sense of internal procedure, working to resolve the same challenges you face
Deep Dive – Operationalizing Security
Christopher Laasch, Lead Solutions Architect, Cal Poly Pomona
Sean Slattery, Technical Director & McAfee Instructor, Caribbean Solutions Lab
Dennis London, Partner & Principal Consultant, London Security Solutions;, London Security Solutions
McAfee ePolicy Orchestrator (ePO) software contains a wealth of security, threat, and risk and compliance information. But without guidance, finding those hidden gems can be challenging. Discover effective ways to query your database and gain valuable insight into the behavior of your users, systems, and applications. You'll leave this session knowing how to glean actionable intelligence from key dashboards and reports, and how to enhance your policy tuning and security processes.
- Learn McAfee ePO software tips and understand how to leverage the threat log and database to improve threat response
- Learn how to develop value-added dashboards that are actionable
- Discover how to use rogue system detection to identify new systems coming onto your network
Security Connections Panel — Visibility and Velocity: The Power of Multi-Vendor Integrations
Brian Karney, President & COO, AccessData
Anthony Gigliotti, President, Autonomic Software
Ward Holloway, Vice President, Business Development, FireMon
Ed Barry, VP, Security Innovation Alliance, McAfee, Inc.
Eric Zenke, AVP of Managed Security Services and Threat Operations, SAIC/CloudShield
Don't let your security systems become islands. Companies that use stand-alone products and consoles in today's heterogeneous IT environment face higher risk and higher operational costs. McAfee is leading the way not just in integrating its own portfolio, but also in integrating its management platform with more than 135 partners in more than a dozen security markets. Learn how McAfee works with partners to lower the cost of ownership and operation through smart integrations.
- Learn how McAfee Security Innovation Alliance partners have integrated with McAfee ePO software and other solutions to solve real-world security problems
- Learn how customers are lowering operational security costs with integrated workflows, threat protection, and risk assessment
- Learn how you can maximize the value of your existing security investments, reduce time to problem resolution, and lower operational costs
Utilizing Intel vPro for Reduced Ops Costs and Optimized Security
Terry Cutler, Solution Architect, Intel
Roger Wood, Director Product Management, McAfee
By communicating with endpoints at a level beyond the operating system, McAfee ePO Deep Command allows security administrators to configure and remediate powered-down or disabled endpoints from a central site, using an established and familiar management platform: McAfee ePolicy Orchestrator. In this session, hear from customers who have implemented McAfee ePO Deep Command and Intel’s vPro technology to help manage PCs when they are powered-down or disabled.
- Understand how McAfee ePO Deep Command uses features from Intel’s vPro platform
- Learn about specific use cases McAfee ePO Deep Command will help solve customer problems
- Find out how customers have implemented McAfee ePO Deep Command to improve security management and lower operational costs
Baker Hughes: Unleash the Power of McAfee ePolicy Orchestrator
Jimmy (Te-Hsin) Yang, Capacity Event Services Manager, Baker Hughes
Donald Forehand, Director - Client Computing, Baker Hughes
Ulli Tanurhan, Product Manager, McAfee, Inc.
If you thought McAfee ePolicy Orchestrator (ePO) had powerful automation features, have you looked at the McAfee ePO Web API, which takes automating security tasks to a whole new level? The McAfee ePO Web API is a useful feature that has been added to the latest version of McAfee ePO 4.6 to help improve the way you manage security on the McAfee endpoints.
- Learn how you can improve management of security tasks
- Hear from customers who have implemented McAfee ePO Web API to make their job easier
- Get access to resources to help you start using McAfee ePO Web API immediately
Predictive Security – Uncovering the Soft Spots with McAfee Solutions
Sven Schrecker, Chief Architect, Risk & Compliance, McAfee, Inc.
Darren Thomas, Senior Product Manager, McAfee, Inc.
Situational awareness is critical to effective security. A critical component is a clear understanding of your IT environment. Complementing an SIEM’s ability to give visibility into actual security events, McAfee Risk Advisor, McAfee Vulnerability Manager, and McAfee Policy Auditor provide visibility into potential security and compliance concerns. The combination of these tools helps you prioritize your efforts to focus first on areas of higher risk of vulnerability or audit failure.
- Understand where you are at risk, what is at risk, and how it is at risk, and how to tip the balance of power back in your favor
- Learn how to automate the collection of enterprise assets, threats, and vulnerabilities and mitigate policy data
- Hear practical advice from experts on how to implement and use these risk and compliance solutions to improve your overall risk posture
Deep Dive Panel – Continuous Monitoring and FISMA Compliance
Anil Katarki, Chief Information Security Officer, DHS Account. HP Enterprise Services, Hewlett Packard
KENT LANDFIELD, Director, Content Strategy, Architecture and Standards, McAfee, Inc.
Thomas Hines, Chief Architect, Networks and Security, Military Health System
Corey Cush, AVP of Infrastructure Services, New York City Health and Hospitals
David Waltermire, Security Automation Architect, NIST
Continuous monitoring is a key component of risk management. Join an interactive discussion to learn how real-time threat monitoring can improve enterprise security posture and compliance while also reducing operating costs. Discover what is needed in an agency's security architecture, how to navigate the latest processes, and how to comply with government regulations like FISMA.
- Learn how to achieve the most secure and cost-effective compliance
- Learn the benefits of continuous monitoring as a part of your agency's security plan
- Learn how to comply with FISMA requirements, including supplying real-time data on network status
RedSeal Networks: Proactive Security Management Solutions
Mike Lloyd, Chief Technology Officer, RedSeal Networks
Continuously monitoring the network environment helps to quickly pinpoint weaknesses in order to fortify the network before an attack occurs. RedSeal 5 Platform is a proactive security management solution that analyzes and simplifies the complex interaction between firewalls, routers, load balancers and vulnerable hosts to deliver an in-depth understanding of the overall network security architecture. Learn how McAfee and RedSeal use vulnerability information to analyze it in the context of the network to determine IT risk and the effectiveness of existing security access controls.
- Understand how the integration of McAfee ePO, McAfee Vulnerability Manager and Red Seal 6.0 can greatly reduce your network attack surface
- Learn how to streamline access control policy creation using end-to-end network visualization and prioritize exposed vulnerabilities for remediation within the context of network access
- Learn how to optimize existing network controls to shield known risks and to create meaningful reports that demonstrate actual risk to operations and compliance to policy
Whitelisting Panel – Protecting Fixed-Function or Low-Bandwidth Systems
David McMorries, Commanding Officer, Marine Corps Network Operations and Security Center
Tom Conway, Director, Federal Business Development, McAfee, Inc.
Terry Carlson, APEO IM, CIO/G6, Chief Software Architect, U.S. Army
Glenn Avery, Information Assurnace Manager, US Army, PM-AS
For systems where the function of the device is firm, fixed, or doesn’t benefit from high or consistent bandwidth, traditional blacklisting, heuristics, and reputation checking aren’t practical. Whitelisting is a necessary tool in your security arsenal and is part of the overall suite of products whose functionality includes reporting through enterprise security management for overall network monitoring. Learn how a Department of Energy National Lab tested McAfee whitelisting capabilities for securing the electric grid.
- Learn how the threat landscape will be mapped against the protections offered by a variety of technologies
- Gain a useful mapping that will help security practitioners determine which tool can best assist based on the type of device and the threats it might face
- Learn how whitelisting can provide secure, cost-effective protection
Situational Awareness and Global Threat Intelligence Panel – The Next Wave in Improved Enterprise Security
Drew Newman, CIO, DoD Operations, HP
Jeffrey Laskowski, Lockheed Martin Corporation
Phyllis Schneck, VP & CTO Global Public Sector, McAfee, Inc.
E. Egon Rinderer, Technical Executive, NJVC
Effective security starts with real-time visibility into all activity on all systems, networks, databases, and applications. The key to increasing situational awareness is the ability to collect, maintain, and process billions of data points in real time and historically. This creates a “big data” challenge. Learn how organizations are overcoming these challenges and how McAfee Global Threat Intelligence and McAfee Enterprise Security Manager provide a unique analysis capability monitoring and reporting the most relevant data.
- Learn how to mitigate the risk involved with more and more users, devices, and new technology
- Learn what data restrictions and guidelines should be used as new technology is adapted
- Hear about new security tools that are available for protection anytime, anywhere
Panel – Security in the Age of the Mobile Workforce and Mobile Devices
Mike Meikle, Healthcare IT Industry Leader,
Robert Bigman, CEO, 2BSecure and former CISO, Central Intelligence Agency, 2BSecure
Bob Besharat, Acting CTO, CSC
Scott Montgomery, VP Public Sector Solutions, McAfee, Inc.
Learn the latest trends and protections for the mobile workforce, including managing multiple devices. Security risks rise with the addition of more devices in the traditional office and in the teleworking and mobile workforce. Join the discussion on device integrity, management of "bring you own device" (BYOD), and mobile management through McAfee ePolicy Orchestrator and reporting through McAfee Enterprise Security Manager.
- Learn how to mitigate the risk involved with more and more users, devices, and new technology
- Learn about data restrictions and guidelines that should be used as new technology is adapted
- Find out about new security tools are available for protection anytime, anywhere
Deep Dive – Proactive Server Protection with McAfee Application Control: Protecting the Heart and Soul of Your Company
Joseph McMahon, Enterprise Solutions Architect, McAfee, Inc.
Tony Kiser, eSecurity Sr. Engineer, Seagate Technology
What if your Active Directory servers fail? What would it cost your company in dollars and reputation? In this technical deep dive session, learn what steps can be taken to proactively protect your server infrastructure.
- Learn how to effectively use application whitelisting to secure the domain server environment
- Learn how to enforce the change process
- Debunk the myth of complexity: Learn best practices for simplifying application whitelisting
Accuvant: Tuning and Optimization of Next-Generation McAfee Network IPS/IDS Systems
Russ Tegen, Solutions Architect, Accuvant
The number of false alarms generated by IDS/IPS appliances can overwhelm security personnel and reduce the value of network security solutions. In this session we will demonstrate tips and tricks developed throughout the years of consulting services on how to properly tune and remove false positives while at the same time exploring next generation features and functionality to increase the security posture of your organization.
- Learn how to eliminate false positives events from your IPS/IDS solution
- Step-by-step guide on migrating from detection to prevention
- Extend your IDS/IPS solution with next generation features and functionality
Hawaii Medical Service Assoc.: Building a Better Database Security Strategy with McAfee
Eric Daley, Infrastructure Engineer, Hawaii Medical Service Association
Slavik Markovich, CTO Database Security, Mcafee
Despite a growing number of cyberthreats targeting highly sensitive and valuable information, many organizations fail to establish a critical line of defense for their business-critical databases without compromising performance for threat protection and compliance for business continuity. Hear from a McAfee database security customer on how they implemented database security strategies that helped them achieve robust security, continuous compliance, lower costs, and optimal security management practices.
- See why perimeter security and native DBMS security features fall short in protecting databases
- See why establishing complete visibility into the database landscape is the first step on the path to security
- Learn how virtual patching helps close the high-vulnerability window while maintaining continuous compliance
How the Cloud Is Irreversibly Changing the Service Provider’s Business
Jason Shostrand, Technical Sales Manager, Intel
Rodel Alejo, Director, Product Management, McAfee, Inc.
Service providers are using the cloud to transform their networks, business and service models to better compete and serve their customer base. This session will cover key market factors and trends with best business practices on how an Open Cloud Platform Architecture in which clouds are secure, interoperable, built on multi-vendor solutions and standards will enable service providers to optimize and monetize their clouds. Security is a key aspect for adoption/delivery of cloud applications and services. We will discuss an off premises security solution for mobile workers in conjunction with how service providers can provide a differentiated solution set to their customer base.
- Learn about game-changing cloud market trends
- Learn strategies and considerations for service providers to evolve their offerings
- See how new security tools for service providers to adopt and market
Android – The Next Operating Environment Frontier
Eric O'Brien, Director Embedded Security, Mcafee
Alok Shukla, Senior Product Manager, McAfee, Inc.
Whether or not the Android OS was intended to run on hardware other than smartphones, many people are thinking of ways to incorporate it into systems, from GPS to UIs on connected consumer devices. Rich graphics, access to an application ecosystem, and sophisticated interactivity contribute to Android's momentum and growth in embedded markets. But how secure is Android? Join this session to examine why protections on Android are necessary and to discuss the McAfee approach.
- Hear how Android in impacting embedded solutions
- Learn the latest malware trends, including Android-specific threats and movement from homegrown OS to COTS
- Gain insight into the McAfee approach to securing Android in the embedded space
Deep Dive – McAfee Labs Update and Mobile Threat Landscape Overview
Rees Johnson, SVP Product Management McAfee Labs, McAfee, Inc.
Jimmy Shah, Senior Mobile Researcher, McAfee, Inc.
Vincent Weafer, SVP McAfee Labs, McAfee, Inc.
McAfee Labs identifies, categorizes, and characterizes each of the 55,000 new pieces of malware that appear daily. This session highlights changes in technology and processes made in the last year to increase the amount of malware detected and to simplify the deployment of new signature files while minimizing the need for extra .DATs. This session also highlights the mobile threats in the wild and the trends in both the technology and attack techniques of these threats.
- Learn about McAfee Labs services and processes updates
- Learn about mobile threat trends we expect to see evolve in 2013 to 2014
- Learn the best practices for protecting mobile devices
Endpoint Malware Detection – Moving Beyond Signatures
Brian Trombley, Director Product Management, Mcafee
Graham Strachan, Senior Director, Engineering, McAfee, Inc.
The days of purely signature-based malware detection are long over. Providing effective antivirus protection now requires a sophisticated blend of signature, heuristic, behavioral, and contextual analysis. This session discusses the changes in scanning technology and content coming to McAfee’s AV products and the improvements in detection and performance that users will experience.
- Learn the sources of improved detection effectiveness
- Understand impact of new scanners and content on performance and resource utilization
- Learn more about migration preparation
The Third Pillar – Intel Security Research
Sridhar Iyengar, Director, Systems Research Lab, Intel
Prasanna Mulgaonkar, Director, Endpoint Security Software and Services, Intel Corporation
Dave Marcus, Director of Research, Mcafee
Most information security products are focused on detecting and mitigating attacks at the operating system plane and above. McAfee DeepSAFE and McAfee Deep Defender, developed jointly by McAfee and Intel, are the first security products focused on preventing attacks beneath the OS. This session focuses on how these technologies were conceived and developed, how they improve an enterprise's security posture, and the role they will play in securing mobile devices in the future.
- Understand the necessity of sub-OS protection
- Learn about the unique architectural advantages of McAfee DeepSAFE
- Understand how the McAfee DeepSAFE approach will protect mobile devices in the future
Lockheed Martin: Global Digital Cyber Warfare
James Wolfe, Chief Security Engineer, Lockheed Martin Corporation
Dave Marcus, Director of Research, Mcafee
There has been much discussion about the emergence of a new type of battle that will begin between nation states one day. This new battleground will not be fought with guns and planes, but with bits and bytes.
- Understand the goals and emerging cyber war attack vectors
- Learn about the risks to private enterprise security
- Discover the best practices for preventing cyber war activities from putting private sector assets at risk
Global Threat Intelligence – Proof Case, Case Studies, and Futures
Doug McLean, Sr Director-Product Marketing-McAfee Labs, McAfee, Inc.
McAfee Global Threat Intelligence (GTI) is the cloud-based, real-time threat data stream that feeds all McAfee products and optimizes threat detection. This session focuses on exactly how GTI improves detection and an enterprises security posture, steps McAfee is taking to further leverage GTI in its strategic products, detailed case studies demonstrating the value of GTI, and where GTI is headed next.
- Learn the role of GTI in improving detection effectiveness
- Learn about GTI operations and security
- Learn about future GTI technology directions
Deep Dive – Take Your Data Protection to the Next Level
Keith Page, Senior Security Engineer, Digital River
Dan Larson, Solution Architect, McAfee, Inc.
Michael Avdeev, Enterprise Solutions Architect, McAfee, Inc.
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data wherever it is stored or travels is a top priority. Explore key aspects of Endpoint Encryption and DLP with technical experts to help you make the most of the latest advancements in technology and data protection.
- Gain a deeper understanding of the technologies behind Encryption and DLP
- Discover the advantage and synergy of Endpoint Encryption and DLP working together
- See how a customer implements a comprehensive data protection with DLP and Endpoint Encryption
FedEx: Advancements and Trends in Endpoint Encryption
Shen Ouyang, Manager, Data Security, FedEx
Anthony Merry, Senior Product Manager, McAfee, Inc.
Learn how McAfee Endpoint Encryption is keeping up with the latest in trends, hardware, software, management, and security. Be ready for major changes like Windows 8 and hardware assisted security. Get a sneak preview of the next versions of McAfee encryption. Learn how FedEx efficiently manages and supports encryption while keeping their business moving forward.
- Prepare for hardware changes like OPAL, BYOD, Ultrabooks and Windows 8
- Leverage new tools and features including Intel, remote management, FIPS, and more
- Learn how FedEx automates and simplifies large scale encryption deployments
NATO and TITUS: Intelligent Data Loss Prevention with Endpoint Classification
Richard Trezza, Enterprise Solution Architect, McAfee, Inc.
John Tatman, Principal IA Engineer, NATO
Blair Canavan, VP Business Development, TITUS Inc.
Learn how Data Loss Prevention (DLP) and end-user classification work together to help prevent both accidental and malicious data loss. McAfee extends TITUS protection against malicious data loss by protecting additional vectors, like removable media and web posting. The combined DLP/classification policy work together to simplify data protection enforcement with the McAfee ePO centralized console and automate workflows for remediation and investigation of events to identify risks before data breaches and damages have occurred.
- Engage end users in the data classification process to reduce false positives and false negatives
- Simplify the prioritization of data loss events to easily distinguish inadvertent data loss from malicious insider activities
- Improve data protection and reduce the internal operational costs of DLP with the combined capabilities of McAfee and TITUS
St. Luke's Health System: Making the Move From Legacy to McAfee ePolicy Orchestrator Managed Encryption
Naveen Chakrapani, Associate Product Manager, McAfee, Inc.
Anthony Merry, Senior Product Manager, McAfee, Inc.
Reid Stephan, IT Security Manager, St. Luke's Health System
There have never been more reasons, a better time, and easier tools to transition from legacy (i.e., SafeBoot) encryption to McAfee ePolicy Orchestrator (ePO) managed McAfee Endpoint Encryption. Learn the what, why and how of getting the latest advances in encryption technology working for you. Find out how a large health system moves to ePO managed encryption while saving lives 24/7.
- Top reasons and benefits of updating now
- Easy tips and time saving tools to make the transition easy
- Updating encryption in a dynamic organization
Protecting Your Data in a BYOD World
Dr. Ratinder Ahuja, CTO & Vice President of Network, Mobile & Content, Mcafee
Trey Wafer, Group Product Manager, McAfee, Inc.
With the consumerization of the corporate world and proliferation of mobile devices, protecting your sensitive data is on a whole new playing field. Traditional data loss prevention approach is not enough. Come and collaborate with experts on a comprehensive strategy to address the data loss challenges from BYOD, managed or unmanaged devices and cloud applications. Learn how a combination of best practices and process control can protect your data from network all the way to applications.
- See how consumerization and mobile devices have changed the landscape of data protection
- Learn how new approaches can prevent data loss on mobile devices
- Hear from the experts real-world examples on tackling data loss from fully managed devices to totally unmanaged devices (BYOD)
Deep Dive – Get the Most Out of Your Endpoint Protection Suite
Adam Rosen, Security Analyst, Campbell Soup Company
Dan Wolff, Endpoint Security Product Team, McAfee, Inc.
Industry-leading IT organizations use more than antivirus to protect themselves. Effective security comes from a multilayered approach that includes web, email, and device protection, along with the right blend of behavioral techniques. Learn about how McAfee customers apply the latest security technologies to improve security posture and compliance.
- Hear real-life examples of how customers get the most out of McAfee endpoint suites
- See how key endpoint products are best configured using McAfee ePolicy Orchestrator
- Get real-life tips to help optimize your investment
Intel and McAfee Shared Technology – A Powerful Roadmap for the Next Generation of Security
Thomas Sawicki, Product Strategy, Intel
Bryan Gale, Senior Director, Product Management, McAfee, Inc.
McAfee and Intel have been collaborating for years and now this collaboration on advanced security technologies is on hyper drive. Attend this strategic, technical review of Intel's security portfolio, along with current and future areas of McAfee-Intel development.
- Gain insights into the unique and powerful technologies that McAfee and Intel are developing
- Learn how you can take advantage of Intel's 10+ years of computing security
- Learn how to incorporate the power of this collaborative effort into your corporate strategy for greatest ROI
Roadmap for Embedded Security – Boot Level Protection Technology
Peter Barry, Solutions Architect, Intel
Eric O'Brien, Director Embedded Security, Mcafee
Protecting the boot sequence is key when it comes to embedded devices. System launches need to be controlled such that only an authentic system boot sequence can launch. Join this session to learn what types of threats exist at this level and how McAfee and Intel are working together on forward-looking boot authentication technologies.
- Learm how security is “built in” on today’s embedded devices, with whitelisting as a best practice
- Understand current pain points and market needs for protecting the boot sequence
- Look forward into McAfee’s strategy to leverage an Intel hardware root of trust for maximum endpoint protection
Walmart: Optimal Solutions for Securing Servers in the Data Center
Corby Laverty, Sr. RSAM, Mcafee
Deepak Thakkar, Director, Data Center Product Marketing, McAfee, Inc.
Nolen Scaife, Technical Expert, Walmart
The challenge of securing servers in the data center is how to achieve optimal security while having minimal impact on system resources. Traditional server security solutions often cause negative effect on server CPU availability, and this is unacceptable in a data center environment. Whitelisting combined with blacklisting is an easy-to-use, effective solution for addressing server security in the data center. This technology relies on dynamic trust models and innovative security features that thwart advanced persistent threats without requiring signature updates or labor-intensive list management. When used together with blacklisting, this solution provides optimal protection, with a predictable, low impact on server availability.
- Learn about the optimal server security architecture with minimal impact on server availability
- Discover the key benefits of whitelisting technology for server protection
- Gain insight into the challenges of securing a server against advanced persistent threats
Anatomy of Today’s Threats and How to Stop Them – An Architectural Review of McAfee Products
Dan Wolff, Endpoint Security Product Team, McAfee, Inc.
Matthew Brinkley, Solutions Architect, McAfee, Inc.
Let’s face it: Threats have gotten much more complex, using multiple, consecutive methods to attack. These methods fall into four distinct categories, which willed be covered in this session. At McAfee, our years of experience and worldwide research teams continually analyze the threat landscape. This presentation explores some of the research that delineates the four phases of every malicious attack and illustrates how you can protect yourself and your business.
- Learn about the top vectors used by today’s threats
- Find out how the attack graph methodology can assist in recovery from infections and in planning
- Develop a comprehensive security strategy addresses all four phases of attack
Deep Dive – Don’t Go It Alone: You Are Only as Good as Your Supply Chain
Charles Ross, VP, North America Technical Operations, McAfee, Inc.
Kevin Reardon, Sr. Director, WW Value Consulting, McAfee, Inc.
The definition of what a company is has changed. It has expanded into a larger network of people and processes. You can't go it alone: relationships with partners are the key to success. Find out how to build a solid supply chain that includes people and processes.
- Understand why building a solid and secure supply chain is the key to success and the ramifications of not focusing on it
- Learn how to assess the quality of your supply chain
- Understand the downstream effect of an issue impacting the supply chain
SAIC: CISO Challenges with the Consumerization of IT
Jack O'Meara, Chief Information Security Officer, VP, SAIC
CISOs are facing difficult challenges, because they have to balance ever increasing regulatory requirements and user demands for emerging technologies such as social media, cloud services and employee-owned smart devices, while ensuring adequate protection of company and customer data.
- Users will request new functionality without understanding associated security risks to the enterprise
- CISO must use a risk management based approach to advise senior management of the security risks vs. user productivity and business operations
- At the end of the day, senior management will make the final decision regarding new technologies that are appropriate for their enterprise
Tyco: Security Strategic Planning
Gene Fredriksen, CISO, Tyco
Today, CISOs are beginning to see the value of using established strategic planning principles to guide their efforts. At its core, strategic planning is nothing more than a formalized process for setting goals based on business objectives and then mapping out how to accomplish those goals. It’s Business 101 applied to security. Without a plan you will spend your time reacting to everything that goes bump in the night.
- Learn about a practical framework for creating a basic strategic plan
- Learn methods to map programs, risks, and initiatives to business objectives
- Hear strategies for achieving business buy-in to the security strategic plan
HP: Cloud Security – Securing Your Enterprise
Ed Reynolds, HP Fellow, HP Enterprise Security Services
The transformation of mobile access and the rebirth of distributed computing in the form of the cloud have literally destroyed the "safe harbor" of mainframes, servers, and storage and data networks. This session outlines some of the concerns with cloud security, and considers how to address these issues. As a general principle the best time to architect security is during the very beginning of the system architecture phase of a project. Engineering security from the ground up is necessary to provide secure services for cloud-based platforms. This session will discuss considerations for securing an enterprise's use of cloud-based services.
- Learn about the top three concerns for moving to the cloud: Security, Performance and Availability
- Understand why it is important to address these issues at the beginning of the system architecture phase of the project
- Ensure that your enterprise is not adding risk to your business by leveraging the cloud
Riches, Ruin, and Regulations: Build Your Security Plan Around the “3Rs”
Brian Kenyon, VP, Solution Architecture, McAfee, Inc.
Organizations don’t become optimized overnight, and they certainly don’t do it without a strategic plan. CISOs are usually replaced if they are too noisy or too quiet, so how do you reach a happy medium? Avoid the paradox: Build a plan that has clearly documented business risk compliance obligations. Attend and see a customer case study that reaches a strategic and optimized middle ground.
- Learn how to build a real security plan
- Find out how the threat landscape affects your plan
- Learn how the “three Rs” (riches, ruin, and regulations) affect your plan
CISO Perspectives – Where Policy, Technology, and Education Intersect
Mary Rossell, Info Tech Manager, Intel
Uy Huynh, Senior Director Sales Engineering, Mcafee
Brent Conran, Chief Security Officer, McAfee, Inc.
The Director of Enterprise Information Security Operations at Intel, Mary Rossell, and the Chief Information Security Officer of McAfee, Brent Conran, are responsible for protecting the mission critical business operations of nearly 100,000 employees. Both meet the enemy each day with a combination of policy, technology, and education. In this session, they will discuss how these three tools intersect to optimize the security posture of a company. They will also cover the changing threat landscape and its impact on companies.
- Learn how to use policy, technology and education to protect mission critical data
- Understand how policy, technology and education work together to improve the organizations' overall security posture
- Insight into real life examples and best practices
Panel— Crisis Management, SIEM and the Law: Turning Anxiety into Opportunity
David Swift, Managing Principal Consultant, Accuvant
Brent Conran, Chief Security Officer, McAfee, Inc.
Bradon Rogers, Vice President, Worldwide Sales Engineering, McAfee, Inc.
Lydia Parnes, Partner, Wilson Sonsini Goodrich & Rosati
It's not a question of "if," but rather of "when" your organization is hit by a threat. While it's true that such events put a great deal of pressure on the team, these occurrences are also great learning opportunities for your legal, IT and security organizations. These occurrences can also highlight gaps in process and technology, when these gaps are filled, organizations move from reactive to optimized. This panel discussion will highlight best practices from the experts in SIEM, as well as forensics, using technology and the law to turn a crisis into proactive management.
- Learn what you should do first when a security crisis hits your environment
- Find out who are the important individuals who can help
- Learn how a SIEM solution can prepare you for an attack
Panel – Cyber Security Cost vs. Value: How Can We Measure the Risks?
Mark J. Morrison, Principal Director to the Deputy Chief Information Officer for Cybersecurity, Department of Defense
Dave Martin, Chief Security Officer, EMC Corporation
Scott Montgomery, VP Public Sector Solutions, McAfee, Inc.
Dave Aucsmith, Director Security Solutions, Microsoft
Kevin Cooley, CIO 10th Fleet Cyber Command, U.S. Navy
Terry Halvorsen, CIO, U.S. Navy
Ray Letteer, Chief, Cybersecurity Division; Marine Corps Senior IA Official, US Marine Corps, C4 Department
Information attacks are increasing, and so is the amount of money spent on security. This panel of government CIOs and Commercial Security Chiefs will discuss the ever-changing and delicate balance between cyber security and the cost of security. If these questions are on your mind, attend what promises to be a lively and interactive discussion with industry and government leaders who are facing these challenges on a large scale. Some questions that will be addressed:
- How can we begin to control the amounts spent on security while still having the best security for our needs? Where is the best place to invest security dollars?
- What's the risk? Is there a difference between how the government and how industry calculates the risk? Should there be?
- Are the processes and evaluations measuring security effectiveness measuring the right things? How can we make this easier for both government and industry to do?
SUPERVALU: From the Backroom to the Boardroom – Aligning Information Security with Business
Gary Eppinger, CISO and VP: Enterprise Security, Real Estate Market Development, Legal and Pharmacy Systems, SUPERVALU
When it comes to security and risk management, the road to a building a mature model is not without its challenges. Though choices are plentiful, the path is not. This session will help answer these questions: How much do I invest in new security tools and processes? What new government regulations do I need to comply with? What is my risk of a security breach? Am I proactive around security best practices?
- Identify the right security investments to make
- Discover key measures and metrics
- What is the path to align the datacenter needs to the needs of the boardroom
Security Context Is of Prime Importance – Metrics Without Meaning Are Useless
David O'Berry, Technology Strategist, Advanced Technology Group, McAfee, Inc.
Reporting on your individual area, on individual processes, and on individual products doesn’t always provide you with the kind of information you need. The latest scan may show that 99.9% of your assets are not at risk to the latest threat; however, what the report may not tell you is that this percentage is only valid for the assets you know about. Learn how to deliver metrics that are more meaningful and provide a context for analysis.
- Learn to apply value to metrics
- Learn how to provide context for the numbers
- Take the first step toward greater understanding and intelligence with SIEM
HyTrust and McKesson: A Matter of the Hypervisor – Security Implementations for Next-Generation Data Centers
Preetham Gopalaswamy, Director Product Management of Virtualization, Mcafee
Greg Brown, CTO & VP Cloud and Data Center Solutions, McAfee, Inc.
Patrick Enyart, Senior Director - Security Operations, McKesson Corporation
The data center has undergone major shifts with virtualization. However, security in many environments continues to be anchored by physical models. This puts the data center at greater risk with an increasing number of vulnerable attack surfaces. Organizations need to explore a new model that seamlessly integrates existing physical security controls with new agile security models for virtualized environments.
- Learn about a comprehensive framework for building trust into a virtualized infrastructure
- Discover how to determine and enforce access policy
- Find out how to segment infrastructure for use by multiple business units
Panel – Making Service Providers Part of Your IT Strategy for Data Centers
Jeff Smits, Vice President of IT Operations, Mcafee
Marvin Wheeler, Alliance Chairman, Open Data Center Alliance
Gail Coury, Vice President, Risk Management, Oracle
Service providers have a critical role in the future of cloud computing capabilities. How do you evaluate the security capabilities of the Service Providers they plan to do business with? How do you handle risks with information sharing with a Service Provider? Our expert panel will tackle these questions and provide service provider best practices and trends.
- Get detailed insight on how to keep enterprise data safe when working with third parties
- Learn how to get the most from your security services providers
- Get guidelines on choosing and managing secure data center and cloud services
Enabling a Secure Cloud Data Center While Maximizing Efficiency
Sridhar Mahankali, Network Architect, Intel Corporation
Like many other IT departments, Intel IT is moving to the cloud to enable quality, velocity, efficiency and capacity for providing business services. Cloud adoption requires IT to adopt new technologies, and presents both challenges and opportunities for the security of the company's data, systems, networks and business functions. This session describes how Intel IT has managed the balance between the risks and controls for virtualization of two different environments: Intel's Internet facing DMZ and Intel's internal High Trust Zone for mission critical and data sensitive enterprise applications.
- Gain technical insight into how Intel IT is moving toward the cloud
- Learn the challenges and opportunities inherent for the security of company data in the cloud
- Understand how Intel IT has managed the balance between the risks and controls of virtualization
VMware and McAfee: Building Security in Virtualized, Cloud Environments to Maximize Performance
Raj Samani, VP & Chief Technology Officer EMEA, McAfee, Inc.
Matthew Brinkley, Solutions Architect, McAfee, Inc.
Jeremiah Cornelius, Security Architect Partner Alliances, VMware
McAfee and VMware have partnered to achieve higher effectiveness for security management in the data center and the cloud. Learn about strategies for optimized security management for network, endpoint, and management. Learn what to consider in designing a data center and cloud architecture that securely adapts to changing business demands and user requirements. Discover deployment and configuration options that minimize impact on resources, deliver simplified management, and ensure protection against otherwise vulnerable attack layers.
- Learn how McAfee solutions are optimized for virtualized environments
- Hear the architectural considerations for optimizing performance and availability
- How to protect against threat vectors and against hypervisor vulnerabilities
In Cloud We Trust – Practical Steps for Securing the Client to Cloud Continuum
Iddo Kadim, Director, Datacenter Technologies, Intel 1
Rishi Bhargava, Senior Director Product Management, Mcafee
Cost savings, lower management, and rapid elasticity are some of the attractions of cloud computing. However, cloud computing involves sacrifices -- physical control of the hardware, and the lack of oversight of infrastructure that processes data and services -- making today's enterprises hesitant to broadly adopt cloud. This session proposes a model for ensuring integrity at each point in the cloud continuum for continual assurances of security posture and data integrity.
- Learn about solutions that extend visibility and control through the entire server stack
- Discover new ways to ensure that devices are secure and can be trusted to access cloud services
- Understand the value of real-time integrity assessments in cloud environments
Deep Dive – Situational Awareness: Risk-Based Incident Management
Dave Karp, SMP BU Technical Director, Mcafee
Mike Epplin, Enterprise Solutions Architect, McAfee, Inc.
Learn how to gain strong situational awareness for risk-based incident management through a step-by-step process to assess and optimize SIEM for strong actionable intelligence. The emphasis will be placed on operationalizing SIEM to shorten the incident response time window.
- Learn how to assess current situational awareness and identify required improvements
- Find out how to operationalize SIEM for incident response
- Learn how to leverage threat, risk, and content context for stronger attack recognition
Case Study – Detecting Insider Threats
Miguel Crespo, Manager, Information Security CoE, Ernst and Young
Mehlam Shakir, Product Manager, McAfee, Inc.
TANUJ GULATI, CHIEF TECHNOLOGY OFFICER, Securonix
Insiders can easily penetrate company defenses to gain access and privileges to sensitive data. Hijacked credentials allow insiders to go unnoticed by the organization's security measures. To battle the insider, companies are now using signature-less behavior modeling solutions to identify targeted threats and mitigate the risks and exposure that they present. McAfee and Securonix are leading this transformation in the industry. Join them as they walk through an investigation of a manufacturing company that utilized McAfee/Securonix technology to identify a data breach.
- Understand how to identify an insider threat
- See a new model for mitigating insider threats
- Learn best practices from a customer case study
Optimizing SIEM
Keith Page, Senior Security Engineer, Digital River
Scott Taschler, Solutions Architect, Mcafee
Synergetic interoperability allows you to share data and use available tools to their fullest potential to create a solution that protects against the threat of malware and data loss. Learn methods you can use to get quantified information regarding the risks inherent with SIEM and other tools, as well as the insight to control and minimize threats.
- Hear the top three ways to optimize SIEM implementations
- Learn methods for operationalizing SIEM for best results
- Find out about event feeds and analytics that provide the most value
Accuvant: Threat Identification Through Context in SIEM
David Swift, Managing Principal Consultant, Accuvant
This interactive session covers how to use context to enhance data in SIEM to find threats. Discussions include using SIEM to identify zero-day threats, integrating Global Threat Intelligence (GTI), and how to make sense of firewall events using multiple data sources to increase event relevance.
- Learn why single sources are of limited value
- Learn how integrating and overlaying multiple data sources can dramatically increase detection rates of emerging threats and APTs while improving the relevance of security events
- Find out how non-traditional data sources such as Blacklists/GTI and human resource data can be highly valuable
Sharpen Attack Recognition with McAfee Global Threat Intelligence and SIEM
Dave Karp, SMP BU Technical Director, Mcafee
Doug McLean, Sr Director-Product Marketing-McAfee Labs, McAfee, Inc.
The integration of McAfee Global Threat Intelligence (GTI) with McAfee Enterprise Security Manager optimizes attack recognition by providing deep context into source reputation. This session covers how to leverage McAfee GTI within SIEM, both through automation and operationally.
- Learn what McAfee GTI is and what it offers SIEM
- Learn how to leverage McAfee GTI to prioritize incident response
- Learn how to operationalize McAfee GTI for optimal efficiency
Deep Dive – Threats, Trends, and Business Priorities within Today's Critical Infrastructures
Raj Samani, VP & Chief Technology Officer EMEA, McAfee, Inc.
Industrial control systems (ICS) are getting more attention than ever from the security industry, and the result is a continuing evolution of the risks and threats to the many critical infrastructures that rely on these systems. Luckily, the security tools and countermeasures are evolving as well, allowing security to be embedded more deeply into industrial systems.
- Learn how ICS is vulnerable by design and how SCADA hacking modules have found their way into commercially available tools
- Hear about ICS attacks and incidents that have occurred
- Learn how threat trends and countermeasures both evolve and leapfrog each other, illustrating that security is a process, not a product or a project
Protect Sensitive Data that Resides in IT and SCADA
Eric Knapp, Director, Critical Infrastructure, McAfee, Inc.
There’s a lot of important information concerning industrial control system operations -- data generated by the ICS that is used by business systems to increase production efficiencies, maximize trading, and increase the bottom line -- from controller model numbers to “recipes” used by the ICS to produce an end-product. The theft of this data can lead to loss of intellectual property, extortion, or even to the development of weaponized attacks.
- Learn how business and control networks directly impact each other and see how a risk to one can be a risk to the other
- Find out why data protection is as important as other security measures
- Discover new methods of ensuring the integrity of communications and data access within the embedded ICS systems
SAIC: Securing Critical Infrastructure with Application Whitelisting and Change Detection
Gib Sorebo, Chief Cybersecurity Technologist, SAIC
Learn how to leverage the naturally deterministic characteristics of industrial control system environments to harness the features of application whitelisting and change detection technologies to improve performance and reduce security risks.
- Understand the inherent risks and vulnerabilities in control systems
- Learn how application whitelisting and change control can leverage these deterministic qualities to lock down and protect control systems
- Learn techniques to improve your company risk posture
The Business of Security – Increase Operational Efficiencies
Ayman Al-Issa, Digital Oil Fields Cyber Security Advisor, ADMA
Implementing end-to-end security throughout all SCADA and industrial control systems is easier said than done. It’s hard to justify the costs of implementing strong security controls. Tough decisions need to be made about which controls to deploy, where to deploy them, and when. Learn about the cyber attacks faced by industrial control system operators and the costs associated with the consequences of those attacks so you can build a business case for stronger cyber security. This presentation will not be available to view or download.
Mitigate Multi-Zone Attacks with a Connected Detection, Prevention, and Response Strategy
Robert Chavez, Systems Engineer, Intel 1
Eric Knapp, Director, Critical Infrastructure, McAfee, Inc.
Critical infrastructures present three unique types of networks. The business systems and networks that we know of as “the enterprise” are increasingly interconnected, internally, geographically, and via the cloud. The automated process networks are getting more distributed and more intelligent, and the SCADA systems that monitor and control those processes are more interconnected -- and vulnerable -- than ever. A cohesive solution that secures industrial systems across zones and works with SCADA and ICS systems is necessary to protect our critical infrastructures.
- Learn about three unique environments and security challenges in critical infrastructure
- Gain an understanding of the different endpoint, network, and data security requirements in each of these areas
- Understand what tools are available today to help mitigate threats and how these tools are evolving to meet even greater challenges in the future
Create a Key Risk Indicator Dashboard Using ISO 27000 Framework with McAfee Solutions
Michael Leland, SIEM Solution Architect, McAfee, Inc.
Vijay Upadhyaya, Technical Marketing Manager, McAfee
This session looks at how to build a risk dashboard with an ISO 27000 framework to demonstrate how customers can build their own customized risk indicators. Learn how to determine if you have weaknesses and lower and upper thresholds of appropriate risk. Find out how to create and leverage risk ratings and weights to add business alignment and address concerns about uncovering truly critical incidents in a timely manner.
- Gain an understanding of a framework using McAfee Enterprise Security Manager, McAfee Policy Auditor, McAfee Vulnerability Manager, and other products
- View a demonstration of how to build the framework
- Get highlighted results through case studies
Avecto: Benefits of Using Least Privilege to Comply with Regulatory Standards
Mark Austin, CTO, Avecto Ltd
Organizations face the challenge of satisfying auditors who are evaluating their compliance with industry and government standards and regulations, including USGCB, SOX, HIPAA, and GBLA. To comply with these stringent legislations, enterprises need to prove that their data is secure as it passes through their systems.
- Discover new ways global organizations are using least privilege to address challenges
- Learn how to optimize risk management, ensure compliance, establish organizational standards, and enable effective monitoring and reporting
- Learn how to empower users as they perform their daily tasks
Xerox: How to Deliver Smart Print Solutions While Maintaining Security and Compliance
Rick Dastin, President, Enterprise Business Group, Xerox Corporation
This session looks at how Xerox is delivering simple solutions for a complex world and taking an active stance on providing robust security within their systems. Find out how this approach helps protect customers data, privacy, and enhance compliance.
- Learn about McAfee embedded security in Xerox solutions
- Find out why this helps companies protect their data and privacy
- Learn how to address compliance mandates
St. Joseph's Health Hospital: Achieving Real-Time HIPAA Security Compliance
Mike Meikle, Healthcare IT Industry Leader,
Feisal Nanji, Interim CSO, St. Joseph's Health System
Executives faced with HIPAA security compliance require tools and processes that enable real-time compliance. This session examines some key security tools and technologies that can be used to architect a solution.
- Learn the reason why Healthcare HIPAA Compliance needs re-thinking
- Learn how these organizations are implementing more intelligence to advance compliance
- Tips on how best to utilize key security tools and technology specifically for HIPAA
AxiaD IDS and Nordic Edge: How to Implement a PCI Compliant Network with Strong Authentication at Lower Costs
Bassam Al-Khalidi, CEO, AxiaD IDS, INC
Jan Johansen, Business Development, Nordic Edge
Hear how Hughes provided a PCI compliant authentication and identity management infrastructure to a large restaurant chain. This included advanced multi-tiered delegated administration that resulted in greater flexibility and control with lower costs. See how PCI compliance was achieved in a new, cost-efficient manner using McAfee and third-party technologies. Learn how to streamline and automate the maintenance and ongoing operation of a compliant infrastructure.
- How to control access for PCI compliance, but allow for delegated administration for flexibility
- Review how automation resulted in cost savings and sustainable compliance
- Introduction to Nordic Edge technology and how strong access identity enables easier compliance
Deep Dive – The New Frontier: Mobile Malware
Jimmy Shah, Senior Mobile Researcher, McAfee, Inc.
Trey Wafer, Group Product Manager, McAfee, Inc.
The proliferation of mobile malware has grown exponentially in the past several quarters. These new threats target personal and corporate data. This session examines what measures can be put in place to stop data loss on smartphones and tablets.
- Hear about new examples of mobile malware
- Learn best practices to protect mobile data
- See mobile malware in action
Are Consumer Mobile Technologies Enterprise-Ready?
Paul Luetje, Enterprise Solutions Architect, McAfee, Inc.
Employees are demanding the ability to bring their smartphones and tablets to work and to be able to access corporate email and other business apps. Typically, consumer devices are not considered secure and manageable according to IT policies. This presentation explores how to extend corporate security policies to mobile devices.
- Understand the risks arising from the use of mobile devices
- Learn methods to mitigate risk and ensure regulatory compliance
- Hear a case study of mobile security implementation and lessons learned
Tangoe: A Complete Solution for Mobile Device Security and Expense Management
Nathan Jenniges, Director Product Management, McAfee, Inc.
daniel rudich, tangoe
Businesses today are facing unique challenges due to the mass consumerization of IT, and they are demanding flexible solutions that will optimize their wireless costs, ensure security and ease of fleet management while they tackle mobile device diversity. Companies of all sizes and industries are searching for solutions that will offer real-time mobile policy enforcement and infrastructure protection, and increase user accountability for smartphones, tablets and mobile PCs. Learn how McAfee and Tangoe help businesses save money, increase security and productivity by attending this presentation.
- Learn how McAfee and Tangoe help businesses save money, increase security, and productivity
- Understand how to incorporate flexible solutions that will optimize wireless costs and ensure security
- Gain the information you need to offer real-time mobile policy enforcement and infrastructure protection
Securely Exposing Cloud Services and Data to Mobile Clients
Andy Thurai, Chief Architect & CTO, Application Security and Identity Products, Intel
To reach consumers (and increasingly, partners and employees), you need mobile apps that may expose enterprise-grade APIs to malware threats. Beyond securing the device, one of the key security issues you need to address is how backend application services and data can be secured at the API level. A mobile API can open up access to enterprise systems, which creates a security problem. In this session, Intel and McAfee experts examine how an API gateway design pattern can act as a type of mobile middleware for data control and security of mobile and cloud applications.
- Understand different mobile security models and how server side mobile middleware can increase security
- Determine how to rapidly expose and repurpose existing legacy application services via APIs to mobile clients
- What are the threat protection models you need to consider for mobile to app store or mobile to enterprise app delivery
Insight USA: IT Security Needs of Small and Mid-Sized Businesses
Caroline Hinton, Vice President Product Marketing - Software, Insight
Smitha Murthy, Senior Product Manager, McAfee, Inc.
Small and mid-sized businesses (SMBs) find themselves in a challenging position. They know that they need to protect sensitive data, but they also have tight budgets. Add to that the reality that hackers are paying more attention to SMBs, and the issue takes on even greater significance. Learn about McAfee solutions that fit the needs of SMBs in a reliable and cost-effective way.
- Examine the nature of SMB verticals and how this drives their security needs
- Learn which threat vectors are most commonly used by hackers when attacking SMBs
- Learn how McAfee SaaS endpoint solutions offer reliable and affordable protection
Deep Dive – Blended Threats: The One-Two Punch Delivered by Email and Web
Joe Brown, Security Systems Engineer, McAfee, Inc.
Email continues to be a major channel for launching malware – from seemingly innocent spam to targeted attacks. With new techniques like snowshoeing, these emails are getting delivered and the malicious web links they contain are getting clicked. Join McAfee as we share an insider's view of today’s blended email and web threats and how you can prepare your defenses to thwart them.
- Understand the current email threat landscape
- Understand how the threat landscape has changed the requirements for email and web protection
- Get tips for enhancing blended email and web protection
CSC: The Cloud – Clear Migration Plans
Dean Weber, Chief Technology Officer, CSC Cybersecurity, CSC
Corporations are attracted to the promise that cloud offers an alternative to help them overcome significant barriers and improve productivity with on-demand cloud computing services, applications and become more agile, competitive, cost-effective and secure, but only if the security is appropriately addressed. Organizations must find innovative ways to deliver business critical applications without compromising security.
- Learn about key security controls that need your attention when considering cloud initiatives
- Find out what is required to ensure policy and regulatory requirements are met
- Learn how to consume Security As a Service
Keeping Up With the Times – Web Attacks: Detection and Protection
Jon Paterson, Enterprise Solutions Architect, McAfee, Inc.
This action-packed session takes an in-depth look at emerging malware threats and techniques and demonstrates how the new technologies in the McAfee Web Gateway Anti-Malware Engine provides enhanced proactive protection to handle today's web threats.
- Learn why new targets are vulnerable to attack
- See some of the latest attack trends in action
- Learn how McAfee Web Gateway can help protect against these threats
Osterman Research: Putting IT Back in Control – From BYOD to Off-Network Laptops
Timothy Roddy, Senior Director, Product Management, McAfee, Inc.
Michael Osterman, President, Osterman Research, Inc.
Anytime access from off-network laptops and a growing number of devices fueled by the BYOD trend is impacting organizations of every size. While employees benefit from having flexibility and their choice of the latest mobile, Web 2.0 and other technologies, organizations are at greater risk on a number of levels: from network security to compliance.
- Understand the problem and benefits that BYOD creates
- Understand how you can maintain BYOD policies and keep IT in charge
- Learn about technologies designed to protect against the problems created by BYOD
Hybrid Email Security – Getting the Best of Both Worlds
Gary Ulaner, Senior Manager Product Management, Mcafee
With more than 30% of organizations incorporating cloud as part of their email strategy, and another 23% planning to next year, is hybrid deployment becoming mainstream and it is right for your organization?
- Learn how hybrid deployment can elevate your email security
- Understand the business benefits of hybrid email
- Hear a hybrid success story on the deployment process and how the featured organization is benefiting from it today
Track Sessions
Over 70 sessions will offer insight and best practices to help you optimize your security and compliance initiatives. Hear real-world scenarios on how McAfee customers maintain the
highest standards of security. Benefit from deep technical presentations delivered by some of the brightest minds in the industry.
Track 1 – Network Security: Next-Generation Threats, Next-Generation Protection Solutions
McAfee network security solutions help enable operational efficiency, as well as advanced, layered defenses for some of the most sensitive and critical networks on earth. Attend this track to learn the latest trends and techniques, and find out how McAfee solutions help secure critical data centers, cloud infrastructures, corporate networks, and branch and remote offices worldwide.
Track 2 – Security Management: The GPS of Security
Deploy all the security you want, but without a way to “operationalize” or manage it, you will quickly become lost. Security management should make your security job easier, not harder. The cornerstone of McAfee’s security management platform is McAfee ePolicy Orchestrator (ePO). Hear experts discuss how to use ePO to assess security risk postures and explain how ePO makes managing security easier and more consistent across environments. Presenters will share their experiences, insights, tips and tricks, and best practices.
Track 3 – Public Sector: Efficiently Embracing State-of-the-Art Security Technologies
In today’s ongoing economic conditions, public sector organizations are forced to walk a tightrope between fulfilling business and mission objectives with reduced staff and budget. This track discusses how security professionals can embrace disruptive technologies such as cloud and mobile without putting their organizations and missions at risk. Find out how to improve security with less management overhead.
Track 4 – Trending Security Topics
From embedded devices and the cloud to simply keeping private information private, security conversations have gone from the backroom to the boardroom and straight into our living rooms. Through customer case studies and sessions led by security experts, hear about the latest security trends and walk away with best practices to keep you and your company ahead of the game.
Track 5 – McAfee Labs
This track highlights five McAfee Labs initiatives that are improving the security McAfee provides to its customers: 1) The evolution and unique security capabilities provided by McAfee DeepSAFE technology; 2) McAfee Labs’ vision for Global Threat Intelligence and the power of cross-vector threat correlation in identifying new and emerging threats; 3) Proof case for improving security efficacy based on the deployment of multi-vector threat mitigation technologies (endpoint, network, and cloud); 4) The power of heuristic and behavioral analysis techniques to identify and block both host and web born threats; and 5) Update on the McAfee next-generation endpoint detection engine’s technology and deployment plans.
Track 6 – Data Protection: The Easy Way
Discover how McAfee’s unified approach makes data protection effective and easy. Find out how you can protect and manage your sensitive data with endpoint encryption and data loss prevention. Explore how McAfee ePolicy Orchestrator provides robust security management in a streamlined, integrated way. Learn expert strategies and tips, real world examples, and best practices to optimize your organization’s data protection.
Track 7 – Next-Generation Endpoint Security
Today’s sophisticated threats are designed to steal data and compromise your business. To combat these threats, it is essential to utilize best practices to properly secure endpoints across your environment. Learn hands-on tips and tricks from McAfee experts, and understand how next-generation endpoint security will protect your infrastructure from chip to cloud. Find out how to apply technologies such as whitelisting, blacklisting, memory scanning, and hardware-assisted security to protect against the different threat vectors targeting your endpoints.
Track 8 – Security Battleground: Building Your Strategic Security Plan
Any company or institution can suffer irreparable harm due to cyber attacks. It’s estimated that within the next five years, $5 trillion in damages will be attributed to cyber attacks. This battle has become a full-blown war and in order to win, companies must first build their strategic security plan. Having a security plan enables organizations to properly invest, identify areas requiring innovation, and apply the right resources in the right places. This track highlights vital technologies and ROI strategies that McAfee is driving to help companies protect their information and win the war.
Track 9 – Data Center Futures: Protecting the Crown Jewels of IT
Data centers will need to embrace more virtualization and cloud computing capabilities to enable new levels of business agility and drive down costs. Because of the data center’s business-critical role, specialized tactics will be required to enable safe innovation in a cost-effective way. This track showcases partnerships with key data center infrastructure vendors and hybrid technologies for unified policy and controls across physical, virtual, and cloud environments.
Track 10 – Stronger Security Through SIEM
SIEM offers the promise of stronger situational awareness, simplified compliance, and an enhanced security posture. This track covers real-world best practices and customer case studies on how to get the most out of McAfee Enterprise Security Manager (ESM). Topics covered include accurate attack recognition, insider threat monitoring, operationalizing SIEM, bringing content and risk into the McAfee ESM view, and leveraging the unified compliance framework.
Track 11 – Protecting Critical Infrastructure
Beyond the headlines of impending doom that so often surround critical infrastructure, there are opportunities to optimize business operations, increase availability, and reduce risk. This track focuses on real threats and practical approaches to security in environments utilizing SCADA and ICS devices, as well as business optimization techniques.
Track 12 – Standards, Alliances, and Guidance to Compliance
IT compliance has matured quickly and there are now many resources to help develop a plan of action that is sustainable and demonstrates effectiveness through analytics, normalization, and lessons learned from those who have field experience. Attend this track and learn how optimized risk management works for compliance and how to gain more confidence in achieving privacy and data protection.
Track 13 – Protecting the Device, the Data, and the Applications
The “bring-your-own-device” phenomenon has hit IT organizations hard and left many challenged to figure out how to manage the proliferation and diversity of devices. Simply managing these mobile devices, however, is not enough. As IT networks grant users access to corporate data, security becomes critical to prevent sensitive data loss. This track highlights the best practices of managing and securing all devices, as well as the apps and corporate applications these devices are accessing.
Track 14 – Securing Web and Email
Web and email continue to be the primary channels for information flowing into and out of organizations. Protecting these vital channels has become increasingly more complicated as new deployment options, applications, and devices enter the mix. Find out how leading organizations have embraced new communication options and technologies without compromising corporate security.
Targeted Group Meetings
An assortment of targeted sessions will be offered at FOCUS on Thursday, October 25.
Security Management
Learn practical tips from longtime McAfee customer Lockheed Martin about disaster recovery with McAfee ePolicy Orchestrator (ePO) and find out how to secure your ePO security infrastructure. Hear best practices from McAfee technical experts on ePO architecture, management, and operations. Topics will include endpoint implementation framework, hardware selection, database implementation, and agent handlers and distributed repositories. With the acquisition of NitroSecurity, McAfee has added a powerful analytic capability into the Security Connected framework. Part of this interactive session, led by McAfee Experts, will cover Security Connected and SIEM at McAfee and solicit attendee feedback for the future.
Endpoint Top Gun: Strategy and Best Practices
This session examines McAfee strategy and best practices for protecting customer endpoints from today's sophisticated threats that are designed to steal data and compromise businesses. The definition of an endpoint has evolved to include every type of device you can imagine, so endpoint security must evolve to meet the new demands of those devices. Learn from product experts how to properly secure your endpoints, and get a glimpse of a roadmap for the future. Security solutions for mobile devices, data centers, cloud environments, and hardware-assisted security will all be covered. Find out how to optimize protection, performance, and availability for your environment. Please note: Interest in this session is extremely high, and space is limited. Be sure to arrive at least 15 minutes early to ensure your admission.
Rinse, Lather, Repeat: McAfee Continuous Monitoring and Why the Taxpayers will Approve of Security Connected
Join us for an exclusive information session on McAfee Continuous Monitoring Platform and our vision forward. We will present each component of our platform and the role each pays, both independently and as part of the entire platform. View the concepts of a fault-tolerant, self-healing network that learns and grows increasingly resilient while it protects access and data. As part of the Intel Corporation, McAfee captures the benefits of computing power, hardware design, policy management, network and endpoint security and threat intelligence to constantly measure progress in real-time, alert and remediate.
Rinse, lather, repeat.
Next-Generation Intrusion Prevention System for Smarter Protection and Improved Context
This session will walk through advanced IPS capabilities such as botnet protection, Dos/DDoS prevention, connection rate limiting, and correlation with other McAfee and partner solutions. Get context and enhanced visibility that will enable you to make intelligent blocking decisions to protect your assets.
Making a Smarter Firewall
Firewalls have undergone an evolution in the past few years around applications, users and threats. Unfortunately, most of these technologies still rely only on network traffic flows. Firewalls must get smarter by pulling in extra intelligence from flows outside the Firewall - including hosts, other network security devices and the cloud.
McAfee Web Gateway Deep Dive
Join McAfee Web Gateway experts for this in-depth technical session. Find out more about the 7.2 release including application control, the newly released version 7.3 with the updated Gateway Anti-malware Engine, ePO integration, Content Security Reporter, hybrid deployment support, and more. Get a preview of some of the upcoming Gateway anti-malware enhancements.
Service Providers – Who’s Responsible for Security?
Collaborative discussion on Global Telecommunication Strategy, policies, regulation, and responsibility when dealing with data center, mobile and cloud. Additionally, we will touch on 'big data' issues and how they tie into security. The objective is to facilitate an open discussion on security technology priorities, global regulation endorsements and coordinate the interaction between the service providers themselves and McAfee. This interactive discussion will be hosted by Phyllis Schneck- McAfee, CTO Public Sector and Tyson Macaulay- McAfee VP Global Telecommunications Strategy. Attendance will be limited to invited audience of carriers, service providers and telcos.
Global SecurityAlliance Partner Summit
The McAfee Global SecurityAlliance Partner Summit is Oct. 23-25, 2012 at The Venetian and The Palazzo Congress Center in Las Vegas.
McAfee is committed to listening to and working with you, our valued channel partners, to drive mutual success. At this year’s Global SecurityAlliance Partner Summit, we will:
• Share our vision and plan to combine your solution expertise with our security leadership and Intel’s rich heritage of innovation excellence to transform the security market.
• Highlight our Security Connected technology strategy as we help you differentiate by providing the industry’s only security portfolio that protects our mutual customers from the chip to the cloud.
• Confirm our commitment to your success by outlining a channel strategy that delivers the tools, training, programs, and resources to drive mutual growth and profitability.
We are extremely excited and optimistic about the future growth of the security market and look forward to providing an event where we can listen, learn, and accelerate together.
Global SecurityAlliance Partner Summit Agenda
Tuesday, October 23 |
|
7:00 AM - 6:00 PM |
Registration |
|
6:30 PM - 9:00 PM |
Welcome Reception at The Palazzo's Azure Pool
Hosted by Gavin Struthers |
|
Wednesday, October 24 |
|
9:30 AM - 11:30 AM |
FOCUS General Session
Featuring George W. Bush, 43rd President of the United States and
Todd Gebhart, Co-President, McAfee |
|
11:30 AM - 1:30 PM |
FOCUS Lunch in Expo Hall |
|
1:30 PM - 6:00 PM |
Partner Business Track
• Building a Successful Managed Services Provider Practice
• How to Sell McAfee: A Layered Approach to Network and Database Security
• Marketing Best Practices to Accelerate Growth
• Understanding Today's CIO
|
|
8:00 PM - 11:00 PM |
FOCUS Final Evening Special Event
Featuring Billy Idol |
|
|
Thursday, October 25 |
|
9:00 AM - 11:30 AM |
Global SecurityAlliance Partner Summit General Session
Featuring Mike DeCesare, Co-President, McAfee
Joe Sexton, Executive Vice President – WW Sales, McAfee
Gavin Struthers, Sr. Vice President – Global Channel Ops, McAfee
Scott McKain, Best-Selling Author / Executive Coach
|
|
11:45 AM - 1:15 PM |
Lunch
For Global SecurityAlliance Partner Summit attendees only |
|
1:30 PM - 3:30 PM |
Theater Sessions |
|
4:00 PM - 6:00 PM |
McAfee Executive Exchanges
Featuring Mike DeCesare, Co-President, McAfee
Todd Gebhart, Co-President, McAfee
Joe Sexton, Executive Vice President – WW Sales, McAfee
Gavin Struthers, Sr. Vice President – Global Channel Ops, McAfee
|
|
8:00 PM - 10:00 PM |
Partner Appreciation Party at TAO Nightclub
|
Agenda subject to change. A more detailed agenda and an official invite will be sent in July.
Global SecurityAlliance Partner Summit Sessions
Building a Successful Managed Services Provider Practice
Paul Dippell, CEO, Service Leadership, Inc.
Richard Bowman, Director of Global MSP and SaaS, McAfee
Lilian Wai, Partner Programs Manager, McAfee
In this session, Service Leadership, Inc. CEO and industry expert Paul Dippell will share a compelling and actionable look into his company’s groundbreaking method of planning and executing a transformation to best-in-class Managed Services. Then Richard Bowman and Lilian Wai of McAfee will uncover how McAfee’s Managed Services Partner (MSP) Program can jumpstart your efforts to drive growth and win Managed Services opportunities for your business. This session is intended for the full range of Managed Services experience, from those companies who have not yet decided to transform, to those who are in the process, as well as to those who are best-in-class and wish to stay that way.
How to Sell – A Layered Approach to Network and Database Security
Much like thermal and waterproof clothing layers protect trekkers in extreme weather, the right combination of network and database security layers can make all the difference when it come to protecting customers critical information against the growing volume of hacks and cyber-attacks aimed at them. In this session, you'll hear about the challenges facing today’s network and data center owners, and how to position McAfee Network and Database Security solutions together to win new deals. Learn how the McAfee Security Connected approach to integrated security brings out the best in our best-in-class technologies.
Marketing Best Practices to Accelerate Growth
Heather K. Margolis, President, Channel Maven Consulting
Lisa Matherly, Vice President of Worldwide Partner Marketing and Programs, McAfee
This session will highlight some recent channel marketing enhancements that were created to help make it easier to find key marketing assets and strengthen the marketing efforts of McAfee Channel Partners. Channel Maven Consulting will share the top marketing best practices that are proving to drive results for companies just like yours. Learn how to: 1)Capture your prospects attention by leveraging the right type of content; 2) Improve the return on your marketing investment through online email campaigns; and 3)Amplify your marketing efforts through social media. Most importantly, this session will offer the opportunity to take part in a customized co-marketing campaign designed to drive demand for your business and increase your sales pipeline.
Understanding Today’s CIO
Moderator: Joe Panettieri, Executive Vice President and Editorial Director, Nine Lives Media – a division of Penton Media
Patty Hatter, CIO, McAfee
Understanding the mindset of today’s CIO is critical to your success, but knowing how to prepare and impress on your next sales call can be a daunting task. This session provides an unprecedented opportunity to hear directly from CIOs on what works and what doesn’t when it comes to making that sales pitch. During this dynamic panel discussion, you’ll get answers from those who know best, CIOs. You’ll learn what’s top of mind for today’s CIO, how to get on a CIO’s radar and their calendar, and what matters and what impresses. Joining Joe will be a panel of four CIOs, including Patty Hatter, CIO of McAfee.
Consumer / Mobile Partner Summit
Tuesday, October 23 – Thursday, October 25
Join us for the Consumer / Mobile Partner Summit which will bring together McAfee customers, partners, and security professionals from around the world. Meet with McAfee executives, learn about trends in security, and understand why McAfee continues to be a leader and influencer in the security industry. Network with your peers, and share insights and strategies that will help you maximize the value of your security offerings to your customers.
Register now.
Consumer / Mobile Partner Summit Agenda
Tuesday, October 23 |
|
8:30 AM - 9:15 AM |
Consumer / Mobile Partner Summit Keynote:
Featuring Steve Petracca, Sr. VP and General Manager – CMSB Business Unit, McAfee |
|
9:30 AM - 11:30 AM |
FOCUS General Session:
Featuring Mike DeCesare, Co-President, McAfee |
|
11:30 AM - 1:00 PM |
FOCUS Lunch in Expo Hall |
|
1:00 PM - 1:30 PM |
Consumer / Mobile Partner Summit Keynote:
Featuring Todd Gebhart, Co-President, McAfee |
|
1:30 PM - 5:30 PM |
Consumer / Mobile Partner Summit Breakout Sessions |
|
6:30 PM - 9:00 PM |
Consumer / Mobile Partner Summit Dinner |
|
Wednesday, October 24 |
|
8:30 AM - 9:15 AM |
Consumer / Mobile Partner Summit Keynote:
Featuring Renee James, Sr. VP and General Manager – Software and Services Group, Intel |
|
9:30 AM - 11:30 AM |
FOCUS General Session:
Featuring George W. Bush, 43rd President of the United States
and Todd Gebhart, Co-President, McAfee |
|
11:30 AM - 1:00 PM |
FOCUS Lunch in Expo Hall |
|
1:00 PM - 5:00 PM |
Consumer / Mobile Partner Summit Breakout Sessions |
|
8:00 PM |
FOCUS Final Evening Special Event:
Featuring Billy Idol |
|
|
Thursday, October 25 |
|
9:00 AM |
Consumer / Mobile Partner Summit Golf Event |
|
Agenda subject to change.
Consumer / Mobile Partner Summit Sessions
Intel and McAfee Consumer Vision
Learn about the Intel and McAfee consumer vision and strategy including an overview of joint initiatives.
McAfee Consumer Products and Strategy
Hear about the 2013 McAfee consumer product solutions and strategy including key features and functionality.
McAfee Mobile Roadmap and Strategy
Hear about the 2013 McAfee Consumer Mobile Product roadmap and strategy including key features and functionality.
Understanding Consumer Perceptions about Security – Panel Discussion
Hear about new consumer trends, what’s on their minds, and how security plays a role.
Worldwide Marketing Strategy and Best Practices
Hear about the latest consumer market research findings and the McAfee consumer partner marketing strategy.
What Windows 8 Means for Consumers
Learn more about the Microsoft Windows 8 rollout and what it means for consumers and your subscribers.
Taking the McAfee User Experience to the Next Level
Learn how McAfee is enhancing the consumer user experience to optimize customer engagement within product offerings.
Cross Device Platform Hacking Demo
Get updated on the new threats in the market, see firsthand how a device can be susceptible to hacking, and learn how McAfee helps protect against these threats.
CPE Credits for FOCUS 12
CPE Credits for FOCUS 12
(ISC)2 Type "A" CPEs are awarded to (ISC)2® members for activities which are directly related to the Domains of the CISSP.
CPEs are awarded at the rate of one CPE per hour of activity for information security events. As an official (ISC)2® CPE Submitter, McAfee can submit CPEs for you after FOCUS 12. Please provide
your (ISC)2 member number and your first and last name to pam_granlund@mcafee.com, and your CPEs will be posted
by (ISC)2® within approximately 2-3 weeks. Be sure to scan your badge before each session you attend, so you can get credit. All CPE credit requests must be received by December 31, 2012.
FOCUS ATTENDEES: Create your Own Agenda
The FOCUS Agenda Builder is now available. To create your personailzed agenda, visit the "My Event" page and login using the email and password you used to register for the conference.