Loading images...
Loading images...
Loading images...

November 2014 – 0-Days and Days After

Date Venue Presentations
Check back after this event.
Details:
Date November 13,2014
Event Start Time – End Time 2 PM – 5 PM
Overall Event Title 0-days and the Days After
Venue

The Warwick Hotel
65 W 54th St, New York, NY

Dress Code Business casual
Event kickoff opening remarks 2:00 – 2:10
Speaker NY ISSA Board Member
Session description Welcome attendees
 
Session Title Heart-Bleed-Out
Start Time – End Time 2:10 – 2:55
Session Description An overview of Heartbleed and what is was so impactful. Challenges and lessons learned of managing it, and how to prepare for similar issues in the future.
Speakers
Glen Saunders
Senior Security Engineer, iSEC Partners
Bio(s) TBD
 
Session Title What the Shell!?
Start Time – End Time 2:55 – 3:30
Session Description An overview and presentation on what you need to know about Shellshock. How to determine if you are vulnerable? How bad was it? What to do now.
Speakers Ken Belva – Silverback Ventures LLC
Bio(s) TBD
Networking Break 3:30 pm – 3:50
Session Title Keep Calm and Patch On: Executive Panel
Start Time – End Time 3:50 – 4:30 PM
Session Description An executive perspective of the recent 0-days plaguing the industry. How to prepare, how to react and how to respond. What processes and operational procedures can be implemented to help better manage such vulnerability releases in the future.
Speakers Executive Panel
Bio(s) Andrew Conte –Information Security Officer – Guardian Life InsuranceChristopher Olsen –  Director, Preventative Technical Security Services (PTSS) – ADPShilpan Patel – Security Program Manager – Quidsi
 
Who should attend Who should attend this session:ISSA Members, ISACA Members and FS/ISAC Members (and other ISAC’s)This program has been created for information security practitioners,
but may also be of interest to the following:Auditors who intend to evaluate configuration management within an enterprise.Security practitioners and system admins seeking to accomplish or implement Configuration Management objectives.Security Management & Executives – With a goal of understanding industry practices trends, and seeking perspective on implementing technical assessment activities in the context of a broader application security program.
Registration Register