Month: April 2015

Keynote Feature: Jennifer Steffens

Jennifer Steffens

@SecureSun

http://www.ioactive.com/

 

IOActive

IOActiveCEO_JenniferSteffens_2013_02.jpg (1074×1267)

As its CEO, Jennifer Steffens spearheads all aspects of IOActive’s global CEO business operations and drives the company’s strategic vision. Jennifer brings a wealth of industry and business experience to the company, having been an early member of several successful startups.

Earlier in her career, Jennifer was a Director at Sourcefire, where she helped build and grow its run rate from $250K to over $35M in just four years. She helped commercialize the Snort open source intrusion detection and prevention technology and built several service offerings around research initiatives. Prior to joining IOActive, Jennifer came to Seattle to help startup GraniteEdge reinvent itself. While there, she led initiatives to restructure the company and developed a product strategy that ultimately secured two additional rounds of funding. With over ten years of industry experience, Jennifer has held senior management positions at Ubizen, NFR Security, and StillSecure.

Jennifer is a well-respected media source, appearing in InfoSecurity Magazine, SC Magazine, Good Morning America, BBC, Reuters, The Guardian, and CBS News. She has been invited to give keynote presentations at a variety of conferences such as HackInTheBox. Jennifer is a member of EWF, ISSA, and OWASP.

RVAsec Keynote

Register now

 


Speaker Feature: Michelle Schaffer and Tim Wilson

Michelle Schaffer/ Tim Wilson

@mschafer

 

Michelle Schafer heads up Merritt Group’s Security practice where she applies more than a decade of hands-on PR-related security experience spanning every discipline. She is known for creating and implementing strategic communications campaigns that drive results for clients such as Venafi, CrowdStrike, Ionic Security, Mach37, BlackHat and more.
Michelle has presented at Security B-Sides DC/Las Vegas and ISSA events and was recognized as a top influencer in the security community in 2010 and has been quoted in “Women in Security” stories.

Tim Wilson is the Editor in Chief of the number one security trade publication, DarkReading.com.

 

Hasty Headlines in InfoSec: Don’t Be Fooled by Everything You Read!

This session will discuss why some data breaches like Sony and Target get much more media attention than others and what enterprises can do to keep their names out of headlines, or at least be prepared when or if it ever happens to them. It will also give you an inside look at how security media determine what’s major news and what’s not and how PR “spin” is all part of the process.

Register now

 


Silver Sponsor Feature: Fishnet Security

Fishnet Security

@fishnetsecurity

https://fishnetsecurity.com/

 

FishNet_Security_logo.jpg (505×146)

 

FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support and training. Since 1996, the company has enabled clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to over 5,000 clients worldwide.

Register now


Speaker Feature: Robert Stratton

Robert Stratton

@strat

https://www.mach37.com

 

200x200_stratton_Bob.png (200×200)Bob Stratton is a serial security startup guy. He is General Partner at Mach37, a business accelerator for security product startups. He was a pentester before you could buy it in a box, ran security for a tier-1 ISP, and helped launch one of the very first commercial network IDS products. He has been a Director of a major security software company’s research lab, and worked on the investment side to help bring a variety of new technologies to market. When he’s not hacking on ancient hardware, scanning satellites, or coaching startups, he might be flying airplanes, building radios or experimenting with fragrance chemistry.

How Security Products Could Change the World, and Often Don’t.

Many security professionals find themselves wondering how it is that some security products ever made it into the market. If you’ve ever asked yourself that, wondered why the “good” seems to be the enemy of the “best,” or thought you might be able to do it better than the current players, this may be a talk for you. This talk will cover the things that have to happen in order to successfully bring a security product to the market, who is arrayed against it from day 1 (you may not have heard of some of them), and what it takes for a consultant to be in 100,000 places at once. Warning: thin-skinned consultants, bloviating product vendors, and ethereal marketing people may find some aspects of this talk objectionable. Professional discretion is advised.

Register now


Gold Sponsor Feature: Slait Consulting

Slait Consulting

@slaitconsulting

http://www.slaitconsulting.com/

 

slait-logo_400x400.jpg (400×400)

SLAIT Consulting is an Information Technology consulting services company that specializes in delivering customized, creative IT solutions for customers in the commercial and public sector.  SLAIT is headquartered in Virginia Beach, VA, with regional branch offices in Richmond, VA; Greenbelt, MD; Raleigh, NC; and New York, NY.

 

Register now

 


Speaker Feature: Boris Sverdlik

Boris Sverdlik

@jadedsecurity

 

Oscar Insurance

Jaded Security Guy

You’re HIPAA certified and Bob just killed someone from the parking lot

My friend Bob is undergoing Chemo and his wife asked him to get a copy of his medical records for a second opinion. Bob being an obedient husband had to jump through hoops to get copies of HIS records thanks to the monotony that we know as HIPAA.

So one day while Bob is waiting for his treatment he notices that the facility has several blatant physical security issues which could allow someone of a more shady nature to obtain his health records without jumping through hoops. Follow Bob in his adventures..

 

Register now


Speaker Feature: Chris Eng

Chris Eng

@chriseng

 

Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies.

Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.

Security Speed Debates

Match wits in a fast-paced debate covering a handful of topical security issues and customer-revelant subjects. Two teams of volunteers will face off, and the audience will determine which side made the most convincing (or entertaining) arguments. Topics will not be announced in advance, so participants will have to think on their feet!

 

Register now


Gold Sponsor Feature: Trend Micro

Trend Micro

@trendmicro

http://www.trendmicro.com/

 

trend-micro-logo.png (1000×400)

As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security.

Register now


Speaker Feature: Kizz MyAnthia

Kizz MyAnthia

@kizzmyanthia

http://kizzmyanthia.com/

 

200x200_kizz.png (200×200)Infosec specialist whose qualifications include an indepth understanding of security principals and practices; C|EH, MCSE+Security designations; and detailed knowledge of security tools, technologies and development. Seven years of security experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations, with over 10 years overall in the industry.

 

Into The Worm Hole: Metasploit For Web PenTesting

Metasploit is most commonly known for its epic pwnage of network and service level vulnerabilities. What you may not know is that same epic pwnage can be leveraged exploiting web application vulnerabilities. By leveraging the ability to custom build Metasploit modules or tools using the framework the power of Metasploit is only limited by the imagination of the user. “Into The Worm Hole: Metasploit For Web PenTesting” will build on prior knowledge of Metasploit and help elevate the tester’s skills and abilities by working hands-on building a custom scanner, using Metasploit to exploit Web Vulnerabilities, and learn to use Metasploit for phishing, XSS, and other web application vulnerabilities.

 

Register now

 


Platinum Sponsor Feature: Sunera

Sunera LLC

@sunerallc

http://sunera.com/

 

Sunera_Logo_Color.png (300×63)

Sunera is a leading provider of risk-based consulting including Internal Audit, IT Audit, Information Security, Corporate Governance, and Regulatory Compliance.