Join us for another packed night! Learn and prosper! See the latest of and the greatest from top tier industry leaders and rub shoulder with fellow security professionals. The November Information Security event will include the following agenda:
Netwrix Corporation - Netwrix Corporation's core competency is in configuration auditing of critical systems across the entire IT infrastructure. With the broadest platform coverage available in the industry, innovative technology and strategic roadmap aiming to support different platforms, devices and applications, Netwrix offers award-winning auditing solutions and superior customer service at affordable prices. Founded in 2006, Netwrix has evolved as #1 for configuration auditing as evidenced by thousands of satisfied customers worldwide. The company is headquartered in Irvine, CA, with regional offices in New Jersey, Ohio, Georgia and the UK. Netwrix is ranked No. 73 on the Inc. 5000 list of the Top 100 Software Companies and an overall 831 on the Inc. 5000 list of America's Fastest Growing Private Companies in 2013.
STEALTHbits Technologies, Inc. enables ‘Control Through Visibility’ offering the industry's most comprehensive platform for visibility into IT security, compliance, and operations. Built from the ground up, STEALTHbits solutions extend across the IT landscape into technologies such as Active Directory, File Systems, Exchange, SharePoint, SQL Server, and more to provide deep insight into the health, security, and compliance stature of the environment. Gartner 2013 Cool Vendor
NopSec was founded to pursue a vision: IT security and effective vulnerability risk management can be a business advantage. NopSec is a technology company focused on helping businesses to proactively manage security vulnerability risks and protect their IT environment from security breaches.
Our flagship product,Unified VRM™, is a SaaS solution that enables vulnerability management for applications and infrastructure that reside on premises and in the cloud. Unified VRM takes a holistic approach to finding, filtering, and fixing exploitable vulnerabilities. Our customers dramatically reduce the turnaround time between identification of critical vulnerabilities and remediation. Streamlined reporting allows senior management to see progress being made against vulnerability risks on an ongoing basis. And customers can help avoid potential financial losses and damage to their public reputation associated with a security breach.
"Enterprise Trends and Cool Hacks from Blackhat / Defcon" by Carlos Hoyos of the CIO Security Lab at IBM
Carlos Hoyos will talk about DefCon and Black Hat - one of the largest security conference in the world. Over 7,000 where people attended. The focus of the conference ranged from mobile, hardware, DIY products, malware, DDOS, privacy and anything digital that you can think of. Hoyos will provide a list of things that he found interesting at DefCon: Femtocells, exploiting apps for fun & profit, attacking mobile encryption, compromising mobiles through USBs, mobile devices broadcast too much information, wireless authentication is still too weak, SIM cards are minicomputers and run Java.
Carlos Hoyos leads the CIO Security Lab at IBM, a security incubator and accelerator to pilot and deploy emerging tech in security and mobility. He's a techie, and when not hacking things, can be found cycling or exploring Brooklyn with his two young kids.
Food and drinks will be provided Thankyou STEALTHbits Technologies, Inc.