Mainstage

Document created by tinacostilla on Sep 14, 2012Last modified by tinacostilla on Jul 8, 2014
Version 2Show Document
  • View in full screen mode

Mainstage

Combatting today’s sophisticated threats to enterprise security requires controls at the research, infiltration, discovery, capture, and dissemination steps of the attack process, as well as strategies to mitigate damage once a breach occurs. Join us to better understand the problem and see demos of the HP products that put you in the driver’s seat.

 

 

HP Protect keynote: HP Security: Make it Matter

Art Gilliland, Senior Vice President HP Software Enterprise Security Products

Art will discuss HP’s unique vision for the enterprise security market. In an era in which security threats have become a professional "market" characterized by highly specialized participants who steal, buy and sell information at different points in a complex process -- how can enterprises best protect themselves? Art will examine the five phases of a modern attack: research, infiltration, discovery, capture and dissemination. Combatting this new adversary requires specialized controls at each step in the attack process and solutions for mitigating the damage after the inevitable breach occurs.

 

Bruce Schneier Independent Security Technologist and Author

 

Hugh Njemanze

CTO and Vice President, Worldwide Research and Development, HP Enterprise Security

 

Hugh will demo HP’s latest product innovations, highlighting significant performance and scalability upgrades, and new types of analysis that can now be done to bolster organizations’ defenses in specific phases of the attack process.

 

John R. South

Chief Security Officer, Heartland Payment Systems®

 

John will cover how security intelligence is the key to effectively fighting the internal and external threats--malware, malicious activity, and internal fraud--that plague companies of all sizes today. However, most enterprises still rely on manual processes to effect a defense against these threats, and, consequently, are in reactive mode rather than operating more proactively. John will examine why adopting secure coding practices and implementing quality test and review in the SDLC process establishes a baseline for proactive defense, but a well-grounded security intelligence methodology is critical to operating in today’s information industry.

 

 

 

 

 

 

 

 

Attachments

    Outcomes