Strategic Security Solutions Summit
November 28-29, 2012   •   Washington Convention Center   •   Washington, DC   •

Register Now
Threats Are Constantly Evolving. So Should Your Response.

The Strategic Security Response Summit will survey threat detection and countermeasures, in various realms—from our computer networks, to our critical national infrastructure. Threats are constantly emerging, as attackers continue to innovate and develop new exploits at a breakneck pace. It is imperative that we not only keep abreast of the threat landscape, but also that we prepare ourselves with protective measures.

Sessions will cover specific technical issues such as computer and network intrusion prevention, all the way through to detection and prevention in broader realms, such as intelligence and counterintelligence tools to prevent cyberintrusion at a national level. This event explores the effect of threats on our communications networks, and threats to our physical facilities, along with access control techniques to stop them. It looks at how surveillance technologies such as IP video can help to level the playing field.

Conference Agenda

Wednesday, November 28
Registration, Coffee
Keynote, Marc Noble, CISSP-ISSAP, CISM, CGEIT, MBCI, Director of Government Affairs, (ISC)2
Organizational Preparedness, Chris Krebs, Principal, Obsidian Analysis
Networking Break in Exhibits (Exhibits Open)
Panel Discussion: Identifying Emerging Threats Panelists: Joe Gottleib, CEO, Sensage; Lori Gibson, Principal Cyber Threat Analyst, Neustar
Lunch in Exhibits
When All Else Fails, Lori Gibson, Principal Cyber Threat Analyst, Neustar
No organization can stop all network security breaches. How can you respond when your security solutions have failed?
The Emerging Metrics-Minded Security Team, Joe Gottleib, CEO, Sensage
This presentation explores research that pinpoints which security management processes are in need of improvement and how proactive security practitioners can rapidly adopt a metrics mentality to improve risk management operations, reduce risks and better advise their security decisions.
Break in Exhibits
Protecting Critical National Infrastructure
Birds of a Feather: A chance for special interest groups to meet and mingle in the exhibition space.
Reception in the Exhibits (through 7:00)
Thursday, November 29
Coffee in Exhibits
Project Enlightenment: An Analysis of a Chinese Cyber Campaign, Richard Barger, Chief Intelligence Officer, Cyber Squared
This presentation will describe how the report of a single incident uncovered adversaries who, using unwitting, intermediate hosts, conducted a sustained espionage campaign against dozens of private sector targets.
Winning the Countermeasure Game: Playing to Not Lose, TK Keanini, Chief Research Officer, nCircle
With the rapid changes in the threat landscape, what strategies and tactics can agencies employ to protect their networks?
Break in Exhibits
Panel Discussion: Securing the Cloud: Evolving from a ‘Benefits’ Mindset to a ‘Security’ Various Panelists from (ISC)2
There is a widespread concern that administering FedRAMP security controls for cloud migration will be a significant challenge. How are IT security managers addressing these challenges?
Resolving Federal Agency Security Challenges with Predictive Risk Analytics, Chris Runde, VP, Transportation and Government Solutions, AlertEnterprise
Learn about how behavioral analytics engines can correlate extensive sets of data across multiple systems to identify anomalies, and do so in real time in order to detect real threats.
Lunch in Exhibits (Exhibits Close at 1:30)
1:30 Legal Policies Surrounding Countermeasures and Protection, Jody Westby, CEO, Global Cyber Risk
This presentation will address the array of legal issues that must be considered in the responding to cybercriminal activities, including responses and countermeasures during or after an incident and contact with law enforcement.
Panel Discussion: Securing the Cloud: Evolving from a ‘Benefits’ Mindset to a ‘Security’, Various Panelists from (ISC)2
There is a widespread concern that administering FedRAMP security controls for cloud migration will be a significant challenge. How are IT security managers addressing these challenges?
Behavioral Analysis on Public Transportation Systems, Presentation by BRS
The presentation will show how & why behavioral recognition technology works when traditional video analytics solutions have failed so completely. It will also include video footage of actual behavioral recognition system “alerts” from major public transportation systems and other high-value/high-security infrastructure locations.
Ask the Experts: Q&A with Selected Technology Providers
Pre-Awards Reception
GSN Homeland Security Awards Dinner (Separate Registration Required)
20% Discounts Apply Through November 8

Regular Registration: $470.
Government Registration: $230
(.gov email address required for gov rate)

Attendees to Strategic Security Response Summit will have access to the Gov.Smart ID Showcase Exhibition with over 45 leading vendors in Government Identity and Security Technology.
Held in Conjunction With

Smart Card Alliance

11th Annual Government Conference
Smart Strategies for Secure Identity
November 28-29

The leading annual event for ID security features comprehensive coverage of efforts toward strong authentication technology in government identity programs, including Personal Identity Verification (PIV) credentials, developments in National Strategy for Trusted Identities in Cyberspace (NSTIC), and more.

GSN Homeland Security Awards Dinner

GSN Homeland Security Awards Dinner

Thursday, November 29
6:30-10:00 PM
The gala awards dinner presentation will conclude with the 2012 GSN/Raytheon Award for Distinguished Leadership and Innovation in Public Security and Safety

Exhibit and Sponsorship Opportunities Are Available

Download the Complete Prospectus

Exhibit Prospectus

For More Information Call:
Bill Rutledge, 212-866-2169

Presented by Connected Events: Cnxtd Inc. Event Media Services, 310 Riverside Drive #1414, New York, NY 10025  +1-212-866-2169