Final Week for OnDemand Special Offer: iPad mini, Surface Go 2, or Take $300 Off thru 9/30

Security West 2016

San Diego, CA | Fri, Apr 29, 2016 - Fri, May 6, 2016
This event is over,
but there are more training opportunities.

How to Build a Cybersecurity Platform the Easy Way

  • Keith Palmgren
  • Tuesday, May 3rd, 7:15pm - 8:15pm

Building a cybersecurity program is easy. Building a cybersecurity program that is effective is seriously hard! When faced with a seemingly insurmountable task, prioritization is vital. Investing time and money in the right place at the right time is the difference between success and being the next cyberbreach headline.

Whether you are new to cybersecurity or an old hand, you may feel lost in the storm. If so, this talk is for you. Cybersecurity's five (5) historic & current pitfalls that prevent organizations from building an effective IT Security platform will be discussed: Poor Passwords, Vulnerabilities, Malware/Crimeware, Insider Threat, and Mismanagement.

To build that effective cybersecurity platform in today's ever-changing information technology environment, organizations must prioritize and focus on five key principles that address those pitfalls. We must look at those critical security principles in new and different ways. 'The Principle of Least Privilege'; Authentication, Authorization, & Accountability (AAA); Confidentiality, Integrity, & Availability (CIA); Policy, Procedure, & Training (PPT); Hardening, Patching, & Monitoring (HPM); and Protect, Detect, & Respond (PDR).

Every organization needs a cybersecurity strategy. An effective strategy requires that you understand the problems as well as the solutions to those problems. Only then can you prioritize your limited cybersecurity resources. Managers and technicians alike will gain valuable insight in this non-technical talk.

Bonus Sessions

The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:

  • SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
  • Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
  • Vendor: Events hosted by external vendor exhibitors.
  • Lunch & Learn: Short presentations given during the lunch break.
  • Master's Degree Presentation: Presentations given by SANS Technology Institute's Master's Degree candidates.
Sunday, May 1
Session Speaker Time Type
General Session - Welcome to SANS Bryan Simon Sunday, May 1st, 8:15am - 8:45am Special Events
CISO Hot Topic Series: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid John Pescatore Sunday, May 1st, 7:15pm - 9:15pm Keynote
Monday, May 2
Session Speaker Time Type
The Game has Changed...Ready or Not! Toni Buhrke , Systems Engineer Monday, May 2nd, 12:30pm - 1:15pm Lunch and Learn
Intelligently Applying Security Intelligence for Advanced Threat Hunting & Analysis Jennifer Glenn, Sr. Product Marketing Manager, Advanced Threats Monday, May 2nd, 12:30pm - 1:15pm Lunch and Learn
Think Like An Attacker: Hacker Simulation Challenge Monday, May 2nd, 6:00pm - 8:00pm Vendor Event
GIAC Program Presentation Seth Misenar Monday, May 2nd, 6:15pm - 7:15pm SANS@Night
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats... Bryce Galbraith Monday, May 2nd, 7:15pm - 8:15pm SANS@Night
Emerging Trends in DFIR- Lightning Talks Rob Lee and SANS DFIR Staff Monday, May 2nd, 7:15pm - 9:15pm SANS@Night
Using an Open Source Threat Model for Prioritized Defense James Tarala Monday, May 2nd, 7:15pm - 8:15pm SANS@Night
IoT Summer of Hacking (the month Josh was forced to wear pants) Josh Wright Monday, May 2nd, 8:15pm - 9:15pm SANS@Night
The Critical Controls That Might Have Prevented the Target Breach Teri Radichel - Master's Degree Candidate Monday, May 2nd, 8:15pm - 8:55pm Master's Degree Presentation
Tuesday, May 3
Session Speaker Time Type
Vendor Showcase Tuesday, May 3rd, 12:00pm - 1:30pm Vendor Event
Vendor Showcase Tuesday, May 3rd, 5:30pm - 7:30pm Vendor Event
Women's CONNECT Event Hosted by SANS COINS program and ISSA WIS SIG Tuesday, May 3rd, 6:00pm - 7:00pm Special Events
Pen Testing & Hacking Trends Panel Moderator: Ed Skoudis; Panelists: Bryce Galbraith, Jeff McJunkin, Stephen Sims, Joshua Wright Tuesday, May 3rd, 7:15pm - 9:15pm SANS@Night
How to Build a Cybersecurity Platform the Easy Way Keith Palmgren Tuesday, May 3rd, 7:15pm - 8:15pm SANS@Night
The Tap House Phil Hagen Tuesday, May 3rd, 7:15pm - 8:15pm SANS@Night
Quality not Quantity: Continuous Monitoring's Deadliest Events Eric Conrad & Seth Misenar Tuesday, May 3rd, 8:15pm - 9:15pm SANS@Night
The Dangerous Shifting of Trust Sandra Dunn - Master's Degree Candidate Tuesday, May 3rd, 8:15pm - 8:55pm Master's Degree Presentation
Wednesday, May 4
Session Speaker Time Type
Rising to the Challenge of Web Application Security Dave Ferguson, Application Security Solution Architect Wednesday, May 4th, 12:30pm - 1:15pm Lunch and Learn
Tackling Endpoint Security With Nuix Insight Quoc Ly, Solutions Architect Wednesday, May 4th, 12:30pm - 1:15pm Lunch and Learn
The New Cyber Battleground: Inside Your Network Bradley Brown, Manager, Solutions Engineering Wednesday, May 4th, 12:30pm - 1:15pm Lunch and Learn
The NEW CISSP exam was implemented on April 15, 2015. Are you ready for the new exam? David Miller Wednesday, May 4th, 7:15pm - 9:15pm SANS@Night
BitTorrent & Digital Contraband Kenneth Hartman - Master's Degree Candidate Wednesday, May 4th, 8:15pm - 8:55pm Master's Degree Presentation
Thursday, May 5
Session Speaker Time Type
STI Lunch and Learn STI Staff Thursday, May 5th, 12:30pm - 1:15pm Lunch and Learn