The sessions I don’t want to miss (but probably will). These sessions all strike my fancy in some way, and I would love to make it to them. Some are time competing and others take place after I am gone, but I wish I could attend. There are at least two that I am sure I will attend:
Session Code: | P2P-108C | |
Session Title: | Where will InfoSec be in 2020? | |
Facilitator: | Pete Lindstrom Research Director Spire Security |
|
Scheduled Date(s)/Time(s): | Tuesday, February 28 03:50 p.m. Room 112 |
|
Session Length: | 50 minutes | |
Session Abstract: | Take off your flak jacket and put on your thinking cap. It’s not often we get to be fearless prognosticators, but now is the time. Come to this session to listen, brainstorm, and debate the nature of risk and security in the year 2020. What will IT architectures look like? How will we protect them? Come with an open mind and leave with strategic ideas and interests for your security program. |
Session Code: | DEB-001 | |
Session Title: | Software Liability: Our Saving Grace or Kiss of Death? | |
Moderator: | Pete Lindstrom Research Director Spire Security |
|
Panelist: | Bruce Schneier Chief Technology Security Officer BT Marcus Ranum Chief Security Officer Tenable Network Security, Inc. |
|
Scheduled Date(s)/Time(s): | Wednesday, February 29 12:00 p.m. Room 134 |
|
Session Length: | 50 minutes | |
Session Abstract: | “Software could be more secure” may be the understatement of the century. Vulnerabilities have infested our code for as long as there’s *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge – and also the focus of this debate.Software liability is oft-cited as one potential approach to creating more secure code. Clearly, there are strong advocates and as strong detractors. Today is the day we work everything out and decide whether software liability would be our saving grace or the kiss of death. |
For these others, I will do my best to make them:
ASEC-203 | Never Waste a Crisis — Necessity Drives Software Security Improvements | Wednesday | February 29 | 10:40 AM |
ASEC-302 | Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? | Thursday | March 1 | 9:30 AM |
ASEC-401 | Engineering Smart Grid Security | Friday | March 2 | 9:00 AM |
ASEC-402 | Hacking’s Gilded Age: How APIs Will Increase Risk and Foment IT Chaos | Friday | March 2 | 10:10 AM |
AUTH-003 | David Brooks: The Social Animal: The Hidden Sources of Love, Character, and A… | Wednesday | February 29 | |
DAS-201 | Can Data Breaches Be Stopped, Really? | Wednesday | February 29 | |
DAS-302 | Message in a Bottle – Finding Hope in a Sea of Security Breach Data | Thursday | March 1 | 9:30 AM |
EXP-108 | The Six Most Dangerous New Attack Techniques and What’s Coming Next | Tuesday | February 28 | 3:50 PM |
EXP-204 | The Role of Security in Company 2.0 | Wednesday | February 29 | 1:00 PM |
EXP-302 | Hacking Exposed: Embedded – The Dark World of Tiny Systems and Big Hacks | Thursday | March 1 | 9:30 AM |
EXP-303 | Terrorist Groups in the Online World | Thursday | March 1 | 10:40 AM |
EXP-401 | Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous” | Friday | March 2 | 9:00 AM |
EXP-403 | From Technology to Psychology: Understanding the Social Psychology of Hackers | Friday | March 2 | 11:20 AM |
GRC-106 | Risk Management Smackdown II: The Wrath of Kuhn | Tuesday | February 28 | 1:10 PM |
GRC-107 | Taking Information Security Risk Management Beyond Smoke & Mirrors | Tuesday | February 28 | 2:40 PM |
GRC-203 | The Metric System: Why Meaningful Metrics Matter | Wednesday | February 29 | 10:40 AM |
HOT-107 | BYOD(evice) without BYOI(nsecurity) | Tuesday | February 28 | 2:40 PM |
HOT-201 | Embedded Insecurity: What Lies Beneath | Wednesday | February 29 | 8:00 AM |
HOT-203 | Hacking Exposed: Mobile RAT Edition | Wednesday | February 29 | 10:40 AM |
HT1-108 | Vulnerability Panel: Is it ZERO Day or ZERO Care? | Tuesday | February 28 | 3:50 PM |
HT1-203 | The Psychology of a Cyber Predator; Decoding the Deviate Mind | Wednesday | February 29 | 10:40 AM |
HT1-204 | Why is Search Engine Poisoning Still the #1 Web Malware Vector? | Wednesday | February 29 | 1:00 PM |
HT1-402 | The Three Myths of Cyberwar | Friday | March 2 | 10:10 AM |
HT1-403 | Estimating the Likelihood of Cyber Attacks When There’s “Insufficient Data” | Friday | March 2 | 11:20 AM |
HT2-107 | SSL and the Future of Authenticity | Tuesday | February 28 | 2:40 PM |
HT2-202 | Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers | Wednesday | February 29 | 9:30 AM |
LAW-204 | Tackling the Identity Management Liability Problem | Wednesday | February 29 | 1:00 PM |
MBS-302 | Vetting Mobile Apps for the Warfighter | Thursday | March 1 | 9:30 AM |
MBS-303 | BYOD: Securing Mobile Devices You Don’t Own | Thursday | March 1 | 10:40 AM |
MBS-402 | iOS Security Internals | Friday | March 2 | 10:10 AM |
P2P-204B | Cloudy With a Chance of Risk | Wednesday | February 29 | 1:00 PM |
SECT-201 | Innovation and Technology Transfer in Security: From the Lab to General Use | Wednesday | February 29 | 8:00 AM |