SC Congress New York Exposes Latest Cyber Threats, Security Challenges and Resolutions

Share Article

Prominent Security Professionals Come Together to Discuss The Growing Threat Landscape and Ways to Address New Challenges From A New Generation of Cyber Criminals

“This year, SC Congress New York is laser-focused on discussing and solving the next level of cyber threats by uniting the nation’s best security experts,” said Illena Armstrong, editor-in-chief, SC Magazine.

SC Congress New York, a premier IT security event produced by SC Magazine, has announced its annual conference and expo in New York. SC Congress New York will be held at The Metropolitan Pavilion in Manhattan on October 11, 2012. Timely topics for this year’s event include: identifying “real” cyber threats, addressing the pressing issues around BYOD, combating insider threats and balancing “big data.” Attendees will leave with immediate knowledge and implementation skills to integrate into their organizations.

“This year, SC Congress New York is laser-focused on discussing and solving the next level of cyber threats by uniting the nation’s best security experts,” said Illena Armstrong, editor-in-chief, SC Magazine. “New challenges from advanced data stealing malware to the introduction of mobile devices in the enterprise are prompting IT professionals and organizations to innovate and reach a new level of security. I encourage all of you to join us as we look to end the year with a fresh approach to security and a leg up on cybercriminals as we enter 2013.”

The 2012 SC Congress New York Keynote Sessions Include:

Insider Threat Redux - Jill Vaughan, CISO, TSA                                                                                                     All efficient CISOs are well aware of the risk the insider poses to the enterprise. In this session, hear first-hand the way a rather visible organization has dealt with this challenge methodically, efficiently and with proven results. From spot forensic audits to security awareness, this is a success story from which all can take home valuable information.

The “Big Data” Conundrum
Data security and privacy once again are front and center with the "Big Data" discussion. Either because of regulations or for marketing and development needs, organizations store vast amounts of data, putting client and propietary information at risk. The key is to balance what data you choose to store with security measures to keep it safe.

The Cybersecurity Maturity Model - Robert F. Brese, CIO, US Department of Energy
The cybersecurity maturity model is a concept in setting standard of cybersecurity best practices around information accessibility, preparedness, etc. This keynote provides an opportunity to learn how the Department of Energy has developed a scalable sector-specific model in partnership with industry to develop and measure cybersecurity capabilities.

Other Highly Anticipated Sessions Include:

DDoS, Stuxnet and Flame: Identifying and defending against the real cyber threat - Cedric Leighton, Colonel, USAF (Ret), founder and president, Cedric Leighton Associates

Organizations have been plagued by Stuxnet, Flame and even the resurgence of DDoS attacks – all originating from hacktivists and state-sponsored actors. Our panel of experts will delve into the real threats to organizations. Void of marketing hype, fancy acronyms and FUD, hear what a group of end-users are most worried about and what they presently or are intending to do about it.

BYOD + total cost of ownership + risk = Trouble

  • Keith Wilson, managing director and CISO, TIAA-CREF Financial Services
  • ViJay Viswanathan, director and CISO, HD Supply

The notion that BYOD leads to cost savings seems to be losing steam as virtually all research is showing that it, in fact, ends up costing organizations more. Add to that the clear risk in having personal, un-managed devices touching your network and the whole picture starts fading even more. We'll help clarify the situation.

The CEO loves you: They just don't know it yet

  • Tony Sager, information security consultant; former chief operating officer - information assurance directorate at U.S. Department of Defense

Each year, CISO types hope their message will carry to the rest of the C-suite. It is vital to get heads wrapped around the fact that security needs attention and funding. Some have figured it out, but so many haven't. So, we will delve deep to uncover how security can earn its place on the CEO's agenda and become an integral part of an organization's risk management strategy.

Featured speakers at SC Congress New York include:

  •     Cedric Leighton, Colonel, USAF (Ret), founder and president, Cedric Leighton Associates
  •     Keith Wilson, managing director and CISO, TIAA-CREF Financial Services
  •     ViJay Viswanathan, director and CISO, HD Supply
  •     Patrick Tully, principle and chief technology officer, Avatar New York
  •     Robert F. Brese, CIO, US Department of Energy

Registration for the conference is currently open. To register for the conference, view the agenda and see a full list of speakers, media partners and sponsors visit: http://congress.scmagazine.com/

About SC Magazine
SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. The brand’s portfolio includes the SC World Conference and Expo, SC Congress Canada, SC Magazine Awards, SC Directory, SC Magazine Newswire and SC Magazine IT Security Executives Forums
Fan us on Facebook! http://www.facebook.com/SCMag
Follow us on Twitter: http://twitter.com/scmagazine

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Hally Wax
MIX Public Relations
(206) 353-0888
Email >
Visit website