RSA Conference US Podcast
Summary: RSA Conference offers information security professionals around the world an unparalleled opportunity for networking and knowledge-sharing.
- Visit Website
- RSS
- Artist: RSA Conference
- Copyright: © 2011 RSA Conference
Podcasts:
Stuart McClure, CEO/President, Cylance The computing world has moved from the purely virtual to the real world physical. Everything from smart meters to insulin pumps to cardiac defibrillators to oil and gas pipelines and more. All of them connect together somehow to expose their vulnerabilities to the bad guy. Explore the world of embedded computing and the almost abject devoid of security built into these tiny systems. A well-published and acclaimed security visionary, Stuart McClure has over 25 years of profound technical, operational, financial and executive experience. Stuart McClure, is the CEO/President of Cylance, Inc., an elite global security services and products company solving the world’s most difficult security problems for the most critical companies around the globe. Prior to Cylance, Stuart was EVP, Global CTO and General Manager of the Management Business Unit for McAfee/Intel. Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004. Stuart is one of the industry's leading authorities in information security today. Lead author of “Hacking Exposed: Network Security Secrets and Solutions”. Download <08:47>
Mary Ann Davidson, Oracle Corporation Joshua Brickman, CA Technologies Mary Ann Davidson is Chief Security Officer at Oracle Corporation. She’s on the Board of Directors of the Information Technology Information Sharing and Analysis Center, and on the board of the Information Systems Security Association. She has been named one of Information Security's top five “Women of Vision” and was recently named to the ISSA Hall of Fame. She has served on the Defense Science Board and as a member of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. Ms. Davidson has a BSME from the U. Virginia and an MBA from the Wharton School. She has testified on cybersecurity before Congress. She was awarded the Navy Achievement Medal when serving as a commissioned officer in the US Navy Civil Engineer Corps. Joshua Brickman, project management professional, runs CA’s Federal Certifications Program. Brickman has led CA through the successful evaluation of sixteen products through the Common Criteria over the last five years (in both the U.S. and Canada). He has given talks at the last five International Common Criteria Conferences. Most recently, he has been a Steering Committee member on the Open Group consortium focused on Supply Chain Integrity and Security, The Trusted Technology Forum. He holds an undergraduate degree from Emerson College and a Masters in Management from Lesley College. Download <06:44>
Ira Winkler, Chief Security Strategist, Codenomicon It’s easy to tell whether there is a strong or weak security culture if you can recognize the patterns. Unfortunately the most talented security practitioners will fail if their organizations have a weak security culture. This session will cover how to tell what type of security culture you are dealing with, and the critical success factors to implement a strong security culture and real security. Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Download <08:48>
Julie Peeler, Foundation Director, (ISC)² As Foundation Director, Julie Peeler is responsible for building, leading and managing the (ISC)² Foundation to ensure it becomes a vibrant, wide-reaching and effective organization for the benefit of everyone who interacts with data and the Internet in their daily lives. Peeler is an accomplished market researcher and business strategist with nearly three decades of experience in both the for-profit and non-profit arenas. Her experience includes forging strategic partnerships, encouraging corporate social responsibility and employee volunteerism, nonprofit board development, strategic planning and marketing. She has worked in senior management positions at Americans for the Arts, Arts & Business Council Inc., J. Walter Thompson, and Foote Cone & Belding. Download <07:01>
Darlene Gore, Federal Public Key Infrastructure Program Manager Program Manager, GSA Chris Louden, Managing Director, Protiviti Government Services Darlene Gore is the Federal Public Key Infrastructure Program Manager. Gore manages the mission-critical Federal Public Key Infrastructure and is responsible for overseeing the operations of the FBCA including, certificate authorities (Federal PKI Common Policy Framework (FCPCA), Federal Bridge Certification Authority (FBCA), SHA-1 Federal Root Certification Authority (SHA-1 FRCA), E- Governance Certification Authorities (EGCA)) and the FBCA repository. Prior to joining GSA and accepting the IA position, she was the Public Key Infrastructure (PKI) Subject Matter Expert/Lead, and an Information Assurance Office for the Joint Chiefs of Staff (JS) at the Pentagon. She was responsible for all of the PKI issues and initiatives. She also executed the DOD Phase II PKI Implementation Plan. Chris Louden is a Managing Director in Protiviti’s Washington, DC (Alexandria, VA) office, overseeing the identity management Center and U.S. Federal Government CIO Solutions practices. Louden has substantial experience in all areas of information technology and is a recognized expert in identity management and information security. He has substantial identity management experience, including federation, inter-federation, Public Key Infrastructure, Identity and Access Management and Services Oriented Architecture (SOA). He has excellent written and verbal communication skills, including substantial public speaking experience. Download <03:41>
John DeLong, Director of Compliance, National Security Agency John DeLong is the Director of Compliance at the National Security Agency. In previous positions, DeLong has supported NSA/CSS senior leadership in various transformational efforts - advocating and leading the careful and efficient resolution of complex policy, technical, compliance and oversight issues. He has also developed and taught numerous classes at the National Cryptologic School in areas such as computer science and cybersecurity. He graduated magna cum laude from Harvard with a Bachelor of Arts degree in physics and mathematics and received his Juris Doctor, cum laude, from Harvard Law School. Download <04:31>
Kiersten Todt Coon, President and Chief Executive Officer, Liberty Group Ventures, LLC Kiersten Todt Coon is President of Liberty Group Ventures (LGV). Todt Coon executes risk management strategies for companies, governments, quasi-public entities and universities. She also conducts cyber security gap analyses for these clients. Prior to LGV, she was a partner at Good Harbor Consulting, Vice President at Business Executives for National Security, consultant for Sandia National Laboratories and an adjunct lecturer at Stanford. She served on the U.S. Senate Committee on Homeland Security and Governmental Affairs and drafted components of the Department of Homeland Security legislation. She graduated from Princeton University with a degree from The Woodrow Wilson School of Public and International Affairs and holds a Masters Degree in Public Policy from Harvard University. Download <04:23>
Robert Hinden, Check Point Fellow, Check Point Software Bob Hinden is the co-inventor of IPv6. Hinden is a Check Point Fellow at Check Point Software, and is chair of the IETF Administrative Oversight Committee and co-chairs the IETF IPv6 working group. He is also a member of the Board of Trustees of the Internet Society. He was co-recipient of the 2008 IEEE Internet Award for pioneering work in the development of the first Internet routers. Download <04:31>
Wendy Nather, Research Director, Enterprise Security Practice, 451 Research Andrew Ellis, Chief Security Officer, Akamai Technologies Wendy Nather is Research Director of the 451 Research Enterprise Security Practice. With over 20 years of IT experience, Nather built and managed the IT security program at the Texas Education Agency, where she directed multimillion-dollar initiatives for a statewide external user base of over 50,000. She also provided security guidance for the datacenter consolidation of 27 Texas state agencies. She previously worked in various roles in the investment banking division of Swiss Bank Corp (now UBS). Andy Ellis is Akamai's Chief Security Officer, responsible for overseeing the security architecture and compliance of the company's massive, globally distributed network. He is the designer and patent holder of Akamai's SSL acceleration network, as well as several of the critical technologies underpinning the company’s Kona Security Solutions. Download <05:40>
Atif Mushtaq, Senior Staff Malware Scientist at FireEye, Inc. Atif architected FireEye's core botnet detection engine, which is a signatures-less engine that can detect the presence of malware such as trojans, worms and botnets inside large networks. He writes often on network security issues, his articles can be found on FireEye's official blog at blog.fireeye.com. His research on botnets has led to many of the world's largest spam botnets of their time. The list includes Srizbi, Rustock A and B, Ozdok/Mega-D, Cutwail A and most recently the Grum botnet. Download <04:01>
Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike George Kurtz, President & CEO, CrowdStrike Over the last half a decade, Chinese intruders have penetrated companies as varied as Google, Adobe, and Lockheed Martin. The Hacking Exposed: PLA Edition talk will have live action demos with focus on tactics, techniques and procedures attributed to the People's Republic of China. We will demonstrate how attackers operate by using their own tools and tradecraft to compromise a target enterprise. Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike, leading Intelligence, Research and Engineering teams. A renowned computer security researcher, he is a thought-leader on cybersecurity policies and state tradecraft. As former VP of Threat Research at McAfee, he led the company’s Internet threat intelligence analysis, correlation, and visualization. In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and named those incidents. Alperovitch serves on Georgia Tech Information Security Center Industry Advisory Board and is a Senior Fellow at Atlantic Council. George Kurtz is co-founder and CEO of CrowdStrike, a cutting edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost 20 years of experience in the security space and has helped hundreds of organizations and governments around the world tackle the most demanding security problems. His prior roles include McAfee’s WW Chief Technology Officer and GM. Prior to joining McAfee, Kurtz was CEO and co-founder of Foundstone, which was acquired by McAfee. He also authored the bestselling security book, Hacking Exposed: Network Security Secrets & Solutions. Download <07:35>
Eric Chabrow, Executive Editor, ISMG Eric Chabrow, who oversees ISMG's GovInfoSecurity and InfoRiskToday, is a veteran multimedia journalist who has covered information technology, government and business. He's the former top editor at the award-winning business journal CIO Insight and a long-time editor and writer at InformationWeek. Download <05:37>
John Johnson, Global Security Program Manager, John Deere Dr. John Johnson manages technical security programs across more than 130 John Deere business units in 160 countries worldwide. Johnson has been responsible for architecting solutions that have been critical to maintaining global network security at John Deere. He has been with John Deere since 1999, prior to that he was network and security manager for the Theoretical Division at Los Alamos National Laboratory. He is a frequent speaker at industry conferences and serves on various industry boards, advisory councils and conference committees. He develops and teaches information security courses for several universities and is an advisory board member for The University of Advancing Technology. Download <07:29>
Kevin Sullivan, Principal Security Strategist, Microsoft Kevin Sullivan is a Principal Security Strategist with Microsoft’s Global Security Strategy and Diplomacy team, part of Trustworthy Computing, which focuses on driving strategic change, both within Microsoft and externally, to advance security and resiliency. Sullivan leads the group’s efforts on internet threat reduction, strategic pilots and critical infrastructure protection. He participates in several industry committees focused on technology and policy issues and is a frequent speaker at conferences. Prior to joining Microsoft, he specialized in system and network design for government, academic and private sector organizations. He earned a Bachelor of Science in Information Science from Northeastern University. Download <05:48>
Ian Green, Manager, Cybercrime and Intelligence, Commonwealth Bank of Australia Ian Green is the Manager of the Cybercrime & Intelligence team at Australia’s largest and one of the world’s largest banks. Green’s team is responsible for analyzing, monitoring and mitigating threats posed by organized crime groups, hacktivists and nation states. His team specializes in the collection, analysis and mitigation of banking Trojans. He has managed teams of penetration testers and been a penetration tester himself. He has been part of teams who regularly discover 0-day vulnerabilities in enterprise grade solutions. His strength is his communication skills, in particular, his ability to explain highly technical concepts in plain English. He has spoken in front of large and small audiences on various information security topics and has lectured at RMIT University. Download <04:00>