Loading images...
Loading images...
Loading images...

May 2015 – Next Gen Perimeter Protection

Date Venue Presentations
Check back after this event.


Date Monday, May 11, 2015 (Register)
Event Start Time – End Time 2:00 – 5:00 pm
Overall Event Title Next Gen Perimeter Protection
Event abstract

As attacker techniques shift, organizations must have a robust strategy to address both insider and external threat actors.  While the recent April program focused on insider threats, this session will focus on preventing and detecting advanced attacks at the perimeter. In these sessions, various presenters will cover emerging technologies and approaches to perimeter protection as well as key considerations for identifying and implementing the next generation of applicable technology.


Cisco Systems, 1 Penn Plaza, New York, NY 10119

Dress Code Business casual
Event kickoff opening remarks 2:00 – 2:10
Speaker NYMISSA President Joseph Rivela, CISSP
Session description Welcome attendees
Session Title Perimeter Defense: Presented by Lastline
Start Time – End Time 2:10 – 2:55
Session Description Perimeter Defense: Presented by Lastline
Speakers Jeff Pollard
Bio(s) Jeff Pollard has more than 10 years of information security experience including roles specializing in forensics, incident response, malware reverse engineering, managed security services, and consulting. He joined Lastline in March of 2015 and acts as Worldwide Technical Architect focused on educating organizations on the use of evasive attack tools by advanced threat actors. Prior to joining Lastline, Jeff was a Global Architect for Mandiant (now a FireEye company). He’s been a part of presales engineering and consulting teams for Dell SecureWorks and Verizon focused on Global customers with responsibilities spanning from technical architecture to engagement management. His primary focus is on Security and Incident Response workflow – enabling Security Operations and Incident Response teams to rapidly assess, contextualize, respond, and adapt to sophisticated threat actors and their techniques. In addition he enjoys the study of macro and micro trends in attack tools, threat actor behavior, and threat intelligence.
Session Title Perimeter Defense: Presented by Palo Alto Networks
Start Time – End Time 2:55 – 3:30
Session Description Perimeter Defense: Presented by Palo Alto Networks
Speakers TBA
Networking Break 3:30 pm – 3:50
Session Title TBA
Start Time – End Time 3:50 – 4:30 PM
Session Description TBA
Speakers TBA
Who should attend  (customize to each session content) Who should attend this session:ISSA Members, ISACA Members and FS/ISAC Members (and other ISAC’s)This program has been created for information security practitioners, but may also be of interest to the following:Auditors who intend to evaluate threat management within an enterprise.Security practitioners seeking to accomplish or implement Threat Management objectives.Security Management & Executives – With a goal of understanding industry practices trends, and seeking perspective on implementing technical assessment activities in the context of a broader application security program.