KEYNOTE: | The Cloud - Security Nightmare or Our Next Great Hope? (Keynote) |
DATE: |
|
LOCATION: |
Moscone Center, Main Stage, |
SPEAKERS: |
|
OVERVIEW: Security professionals in general distrust the cloud; they are concerned about losing control, fly-by-night third party solutions, privacy and surveillance. However, the cloud provides a way to address issues such as the vanished perimeter, ubiquitous connected devices and new categories of attack. This keynote will discuss how we can shift the dynamic and use the cloud to defend against the increasing security challenges we are facing. |
Additional
In addition to the keynote session, company executives and researchers will offer insight on current threats and industry trends related to browser security, vulnerabilities within popular embedded devices, and how to best drive effective security programs across government agencies and enterprises.
SESSION: | Continuous Monitoring with the 20 Critical Security Controls (SPO1-W02) |
DATE: |
|
LOCATION: |
|
SPEAKERS: |
|
OVERVIEW: The 20 Critical Security Controls (CSC) outline a practical approach to implementing security technologies by providing proven guidelines for protecting IT environments. Continuous monitoring plays a critical role in implementing the 20 CSC, and the good news is that there are new tools that can help automate adoption of the 20 CSC. This session will detail how to use these tools to protect corporate environments and keep your data secure. |
SESSION: | Is Your Browser a User Agent, or a Double Agent (DSP-R04A) |
DATE: |
|
LOCATION: |
|
SPEAKERS: |
|
OVERVIEW: Privacy shouldn't be an afterthought in the browser. Data security within web and mobile apps relies on technical controls such as same-origin policy and sandboxing. As browsers add more complex features, the industry must weigh the trade-off between improving APIs for developers and limiting the ability of attackers to abuse those APIs. This presentation will cover privacy threats that apps may encounter via the browser. |
EVENT: |
Press Conference: Introducing a New Free Service in Collaboration with the |
DATE: |
|
SPEAKERS: |
|
|
|
|
|
|
OVERVIEW: Companies and organizations are under siege by online attacks, many of which could be mitigated. This special booth session will feature a panel of respected information security luminaries who will discuss the history of the SANS 20 Critical Security Controls, reveal information on the how the most prevalent attacks can be addressed by the controls and how companies today can effectively adopt them to strengthen security. |
EVENT: | Book Signing and Q&A: What Everyone Needs to Know About Today's Cyberthreats |
DATE: |
|
Author: |
|
Presentation by Singer with Q&A to follow conducted by |
Also next week, at BSidesSF 2014, taking place
SESSION: |
|
DATE: |
|
LOCATION: |
|
SPEAKERS: |
|
OVERVIEW: While technology advances with innovative approaches to solving problems and increasing productivity, the security of new devices and systems is often an afterthought. This session will cover methodologies for obtaining ICS software and hardware, and other industrial control devices, and assessing their security. The session will also include a real-time example of a vulnerability discovery in a popular embedded device. |
More information on
About
CONTACT:Melinda Marks Qualys, Inc. (650) 801-6242 mmarks@qualys.comRod McLeod Bateman Group for Qualys (415) 503-1818 qualys@bateman-group.com