Designing a Safe, Intelligent, Security Architecture
- Richard Devera
- Tuesday, February 24th, 12:45pm - 2:00pm
Check Point will highlight major security events and current malware trend found during security assessments. The data included in this presentation is based on recent case studies and collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations of various industries.
In order to protect against today's evolving threat landscape, while supporting high-demanding network infrastructures, security professionals are asking for best practices in designing security architecture. Check Point will introduce trends in security technologies and best practices, which provides operational resilience and real-time, proactive protection for today‚s critical network infrastructure.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
|Advanced CRPA/C2M2 Workshop||—||Sunday, February 22nd, 8:30am - 4:30pm||Special Events|
|ES-ISAC Briefing||—||Sunday, February 22nd, 5:00pm - 6:00pm||SANS@Night|
|Welcome Reception||—||Sunday, February 22nd, 5:00pm - 7:00pm||SANS@Night|
|Exposure to Closure: 2015||—||Sunday, February 22nd, 7:00pm - 10:00pm||SANS@Night|
|Vendor Showcase||—||Monday, February 23rd, 10:30am - 11:00am||Vendor Event|
|Emerging Best Practice for ICS Perimeter Cyber Security||Michael Piccalo, Director of Industrial Security||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Just how easy is it to hack a DCS?||Dr. Alex Tarter, Technical Director, Cyber Security Group||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|High Value ICS Network Monitoring and Anomaly Detection - Table Talk||—||Monday, February 23rd, 12:30pm - 1:45pm||Lunch and Learn|
|Vendor Showcase||—||Monday, February 23rd, 3:45pm - 4:15pm||Vendor Event|
|WOPR: Shall we play a game?||—||Monday, February 23rd, 7:00pm - 10:00pm||SANS@Night|
|KIPS, Kaspersky Industrial Protection Simulation||—||Monday, February 23rd, 7:00pm - 9:00pm||SANS@Night|
|Vendor Showcase||—||Tuesday, February 24th, 10:30am - 11:00am||Vendor Event|
|Developing an Industrial Controls Security Framework for balanced and targeted investment||Ernie Hayden CISSP CEH GICSP||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Attacker Behavior & Incident Response||Pat Haley||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Designing a Safe, Intelligent, Security Architecture||Richard Devera||Tuesday, February 24th, 12:45pm - 2:00pm||Lunch and Learn|
|Vendor Showcase||—||Tuesday, February 24th, 3:30pm - 4:00pm||Vendor Event|