title
Registration is free, but the conference is priceless

Register Now

2014. New Year. New Technology.
New Conference. And now it's 2 days!

Save the dates!

The 2014 AT&T Cyber Security Conference will be held on September 3 & 4 at the New York Marriott Marquis, Times Square.


Watch the live webcast on September 4, Day 2!

September 3 will not be webcast or recorded.



Note: No webcast will be available on September 3rd.

AT&T and industry experts will present three half-day (3 hours) tutorials in parallel tracks. At registration, you will choose the tutorial that suits you best.

For Now and Future Executives

Ed Amoroso will present 43 practical suggestions for CSOs and CISOs to improve their business threat posture in 2014 and beyond.



Ideas and Suggestions for Improving Your Threat Posture in 2014 and Beyond

Join this session to learn much of what you need to know to create and run a security organization in a large business enterprise.

A clear path to a successful Chief Security Office is paved with good intentions and plenty of stones. Learn how to build a solid CSO posture, and explore some of the components, the structure, and important lessons learned along the way, as well as preparing for the future. The speaker, Edward Amoroso, is an experienced senior executive who has lived the life of a CSO of a large enterprise business.

For Security Managers

An IANS security expert explores the risks in the enterprise that relies on cloud, mobility and third parties.





Exploring Risk and Understanding Changes in the World of Cloud, Mobility, and Third Party Systems

In this session, we will explore how risk assessment and understanding changes in the modern world of cloud, mobile and third party systems make up so much of what we use.

We will explore ways to test, assess, and understand this risk including the new technologies involved, while staying within organizational boundaries. The session will include strategic guidance including how you tackle these all at the same time, evaluate each, and prioritize to create the overarching strategy.

For Security Practitioners

iSEC Partners security experts provides practical, hands-on security information for the person who faces the challenges every day.




Secure Mobile App Development and Common Pitfalls

With mobile applications being deployed for almost every product, smartphones and mobile apps are becoming the target of an increasing number of attacks. This makes mobile application security an area of great interest.

This tutorial will teach security practitioners how to develop secure mobile apps as well as how to pentest them. You will learn common pitfalls experienced by Android and iOS developers every day. The course will cover platform specific security models, application architecture and security-relevant application components such as APIs and IPC. An introduction to mobile app penetration testing will be presented through live demos on vulnerable applications. Lastly, you will learn how to test APIs on a web server, scan for SSL/TLS vulnerabilities and select safe cipher suites.

No prior knowledge of mobile security is required for this tutorial. The live demos will make use of standard penetration testing tools such as a web proxy (burp) and an active scanner (sslyze).




Learn from Top Security Ninjas:





Note: The live webcast will be available on September 4th at 9:00 am ET on this website.

You will not want to miss joining us when top security experts speak on leading-edge security topics, such as:

  • How do I address the exploding number of sophisticated security threats?
  • What strategies can I implement to best provide end-to-end protection for my network?
  • How should I secure all our mobile devices when connecting to the enterprise?
  • How will mobile and cloud data and apps be protected?

In addition, the conference features three speaker tracks and a Technology Walk.

  • Track 1: Technology Talks - AT&T and industry security experts deliver talks and presentations on the latest security technology and trends in mobility and cloud.
  • Tracks 2 and 3: Tools and Tutorials - Industry security experts deliver technical talks and hands-on demos.
  • Technology Walk - Technology products, ideas and innovation kiosks will be open for exhibits and demos throughout the conference days.

Click here to view full agenda.

At the end of Day 2, September 4, there will be a networking reception. Prize drawing included!

Four Great Keynotes:




city



2014 Diamond Advertisers

Arbor
Blue Coat
Checkpoint
Cisco
Fortinet
IBM
Intel McAfee
IXIA
Juniper
NIKSUN
Palo Alto Networks
radware
Symantec
Unisys

2014 Platinum Advertisers

Catbird
f5
HP
Security On-Demand
WidePoint

2014 Gold Advertisers

Digital Defence Inc
FireEye
Riverbed
Trend Micro


© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all AT&T other marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
ATT Logo