Tuesday, October 18 Wednesday, October 19 Thursday, October 20


Session Schedule

Thursday, October 20, 2011

Time Track 8 - Best Practices in Security Management Track 9 - Data Protection: Safeguarding Data Everywhere Track 10 - The Changing Threat Landscape Track 11 - Protecting the Next-Gen Data Center: Optimizing Physical, Virtual, and Cloud Architectures Track 12 - Securing the Cloud Ecosystem Track 13 - Technology Tips and Tricks Track 14 - Bringing SIEM into the Security Mix
7:00 AM
-
8:00 PM
Breakfast
8:00 AM
-
9:30 AM
McAfee: Deep Dive — Being Aware of the Big Bad Wolf: A Security Management Deep DiveInternational Rectifier and McAfee: Deep Dive — Experience McAfee Data ProtectionMcAfee: Deep Dive — McAfee Quality InitiativeLockheed Martin and McAfee: Deep Dive — Unknown Data Center Breaches: A Layered Defense Strategy Against Targeted and Persistent AttacksMcAfee: Deep Dive — Protecting your Assets in the CloudMcAfee: Deep Dive — McAfee ePolicy Orchestrator 4.6 Web API DemoNitroSecurity and McAfee: Deep Dive – Security Risk Management and SIEM
9:30 AM
-
9:45 AM
Break
9:45 AM
-
10:45 AM
Kaiser Permanente and McAfee: Operational Risk ManagementMcAfee: Simplifying Encryption Software UpdatesMcAfee: McAfee Labs Capabilities and ProcessesMcAfee: Don't Let Security Undermine your Data Center Build OutsApollo Group: Case Study — Building a Unified Security Model across Cloud TrafficAvecto: The "Least Risk" Windows 7 MigrationNitroSecurity: Information Management with McAfee ePolicy Orchestrator and SIEM
10:45 AM
-
11:00 AM
Break
11:00 AM
-
12:30 PM
General Session: "Hacking Exposed" with McAfee; "In Search of the Silver Bullet" with Accuvant; "Implementing 'True' Secure Clouds" with CloudShield
12:30 PM
-
2:30 PM
Lunch (Sponsor Expo Open)
2:30 PM
-
3:30 PM
Accuvant: Unpublished Secrets to Managing your McAfee Security InfrastructureMcAfee: The Anatomy of Today’s Threat Vectors and How to Stop Them: an Architectural Review of McAfee Security ProductsMcAfee: Beyond Signature-Based Protection — Next-Generation Anti-MalwareIntel and McAfee: Do I Really Need to Build a Private Cloud? Stop Thinking About Them, Learn What We Can Do for You, and Understand the Business AdvantagesIntel: Building and Protecting Identity and Trust in the CloudLockheed Martin and McAfee: Migrating to McAfee ePolicy Orchestrator 4.6 in a Global EnterpriseNitroSecurity: Content Aware SIEM – Beyond Logs and Events
3:30 PM
-
3:45 PM
Break
3:45 PM
-
4:45 PM
Hospital Corporation of America and McAfee: The Business Need for Continuous Vulnerability Monitoring and Risk ManagementMcAfee: Accelerate Data ClassificationMcAfee: Targeted Attacks — Reality or Myth?Crossbeam and McAfee: Solutions for 10, 40, and 100 Gigabit Data Center NetworksBloor Research: Choosing a Secure Cloud ProviderMcAfee: A Network with a View — Advanced Tips for Increasing Visibility of Behavior and Threats on your NetworkNitroSecurity: Information Management with McAfee ePolicy Orchestrator and SIEM
4:45 PM
-
5:00 PM
Break
5:00 PM
-
6:00 PM
McAfee: McAfee Application Control — Delivering ROI by Utilizing Best Practices Deployment MethodologyErnst & Young, Saviynt, and McAfee: Protecting Sensitive Information with Dynamic Data Loss Prevention (DLP) Policies and User Behavior AnalysisMcAfee: Emerging Threat LandscapeMcAfee: Sharing is Caring — How McAfee IT Addresses Data Center SecurityIntel: Securely Managing your APIs in the CloudAccuvant and McAfee: Optimize Network Security Using Best-in-Class Risk ManagementNitroSecurity: Content Aware SIEM – Beyond Logs and Events
6:00 PM
-
7:30 PM
Sponsor Expo Reception
8:00 PM
-
11:00 PM
Final Evening Special Event at the Hard Rock Hotel: Featuring Third Eye Blind

Copyright © 2003-2011 McAfee, Inc.
All Rights Reserved.