2014. New Year. New Technology.
New Conference. And now it's 2 days!
The 2014 AT&T Cyber Security Conference will be held on September 3 & 4 at the New York Marriott Marquis, Times Square.
Watch the live webcast on September 4, Day 2!
September 3 will not be webcast or recorded.
Note: No webcast will be available on September 3rd.
AT&T and industry experts will present three half-day (3 hours) tutorials in parallel tracks. At registration, you will choose the tutorial that suits you best.
Ed Amoroso will present 43 practical suggestions for CSOs and CISOs to improve their business threat posture in 2014 and beyond.
Join this session to learn much of what you need to know to create and run a security organization in a large business enterprise.
A clear path to a successful Chief Security Office is paved with good intentions and plenty of stones. Learn how to build a solid CSO posture, and explore some of the components, the structure, and important lessons learned along the way, as well as preparing for the future. The speaker, Edward Amoroso, is an experienced senior executive who has lived the life of a CSO of a large enterprise business.
An IANS security expert explores the risks in the enterprise that relies on cloud, mobility and third parties.
In this session, we will explore how risk assessment and understanding changes in the modern world of cloud, mobile and third party systems make up so much of what we use.
We will explore ways to test, assess, and understand this risk including the new technologies involved, while staying within organizational boundaries. The session will include strategic guidance including how you tackle these all at the same time, evaluate each, and prioritize to create the overarching strategy.
iSEC Partners security experts provides practical, hands-on security information for the person who faces the challenges every day.
With mobile applications being deployed for almost every product, smartphones and mobile apps are becoming the target of an increasing number of attacks. This makes mobile application security an area of great interest.
This tutorial will teach security practitioners how to develop secure mobile apps as well as how to pentest them. You will learn common pitfalls experienced by Android and iOS developers every day. The course will cover platform specific security models, application architecture and security-relevant application components such as APIs and IPC. An introduction to mobile app penetration testing will be presented through live demos on vulnerable applications. Lastly, you will learn how to test APIs on a web server, scan for SSL/TLS vulnerabilities and select safe cipher suites.
No prior knowledge of mobile security is required for this tutorial. The live demos will make use of standard penetration testing tools such as a web proxy (burp) and an active scanner (sslyze).
Note: The live webcast will be available on September 4th at 9:00 am ET on this website.
You will not want to miss joining us when top security experts speak on leading-edge security topics, such as:
In addition, the conference features three speaker tracks and a Technology Walk.
At the end of Day 2, September 4, there will be a networking reception. Prize drawing included!