The 2014 AT&T Cyber Security Conference will be held on September 3 & 4 at the New York Marriott Marquis, Times Square.
AT&T and industry experts will present three half-day (3 hours) tutorials in parallel tracks. At registration, you will choose the tutorial that suits you best.
AT&T CSO Ed Amoroso takes you on a journey to the Chief Security Office of the future.
Join this session to learn much of what you need to know to create and run a security organization in a large business enterprise.
A clear path to a successful Chief Security Office is paved with good intentions and plenty of stones. Learn how to build a solid CSO posture, and explore some of the components, the structure, and important lessons learned along the way, as well as preparing for the future. The speaker, Edward Amoroso, is an experienced senior executive who has lived the life of a CSO of a large enterprise business.
An IANS security expert explores the risks in the enterprise that relies on cloud, mobility and third parties.
In this session, we will explore how risk assessment and understanding changes in the modern world of cloud, mobile and third party systems make up so much of what we use.
We will explore ways to test, assess, and understand this risk including the new technologies involved, while staying within organizational boundaries. The session will include strategic guidance including how you tackle these all at the same time, evaluate each, and prioritize to create the overarching strategy.
iSEC Partners security experts provides practical, hands-on security information for the person who faces the challenges every day.
With mobile applications being deployed for almost every product, smartphones and mobile apps are becoming the target of an increasing number of attacks. This makes mobile application security an area of great interest.
This tutorial will teach security practitioners how to develop secure mobile apps as well as how to pentest them. You will learn common pitfalls experienced by Android and iOS developers every day. The course will cover platform specific security models, application architecture and security-relevant application components such as APIs and IPC. An introduction to mobile app penetration testing will be presented through live demos on vulnerable applications. Lastly, you will learn how to test APIs on a web server, scan for SSL/TLS vulnerabilities and select safe cipher suites.
No prior knowledge of mobile security is required for this tutorial. The live demos will make use of standard penetration testing tools such as a web proxy (burp) and an active scanner (sslyze).
You will not want to miss joining us when top security experts speak on leading-edge security topics, such as:
In addition, the conference features three speaker tracks and a Technology Walk.
At the end of Day 2, September 4, there will be a networking reception. Prize drawing included!