Agenda Archive (1999-2013)

Previous AT&T Cyber Security Conferences

15th Annual AT&T Cyber Security Conference

September 10, 2013
New York, NY

The 2013 conference replay is available here.


Time

Event

Presenter

7:30 - 9:30 Registration  
9:30 - 9:45 Welcome / Introduction AT&T VP Sanjay Macwan
9:45 - 10:15 Security Services Keynote AT&T VP Andy Daudelin
10:15 - 11:00 Technology Keynote Cisco SVP Carlos Dominguez
11:00 - 11:15 BREAK  
11:15 - 12:15 Technology Talks Track I  
  Mobility Network Security for Today and the Future Ashutosh Dutta, AT&T
  Security Goes to the Machines: M2M Security Principles Jennifer Morovitz, AT&T
  Better Security Through the Cloud Don Levy, AT&T
  Tools and Tutorials Track II  
  Using Big Data Analytics to Thwart Cyber Threats Dr. Parag Pruthi, NIKSUN
  DDoS and Modern Threat Motives Dan Holden, Arbor Networks
  Tools and Tutorials Track III  
  Top 10 Security (Infrastructure, Applications, Management, Users) Trends John Maddison, Fortinet
  Rethinking DNS: New Threats, Attacks and Prevention Techniques Dr. Srinivas Mantripragada, Infoblox
12:15 - 1:00 Lunch  
1:00 - 3:00 Technology Talks Track I  
  Who Are You Now? IdM 3.0 Makes it Clear Johannes Jaskolski, AT&T
  The ASTRA Way to Virtualize Security Duncan Sparrell, AT&T
  Your Company Tomorrow: The Secure Virtual Enterprise Cristina Serban, Shaw Hiemstra, AT&T
  You are the Firewall: Security for the Rest of Us Nancy Grover, AT&T
  Security You Can See: Data Analytics and Visualization Research Stephen North, AT&T
  Fast Pitch: Short Security Research Talks CSO R&D Team, AT&T
  Tools and Tutorials Track II  
  Now It's Personal: A Look at the Future of Information Security Hugh Thompson, Blue Coat
  The Next Frontier of Mobile Threats: A Research Update Konstantin Yemelyanov, Juniper Networks
  Re-Invent and Simplify Your Network Security to Break the Cycle of Cyberattacks Nir Zuk, Palo Alto Networks
  Mobile User Perception in the Face of Mobile Malware and Botnets Steve McGregory, Ixia
  Tools and Tutorials Track III  
  A New Model for Security Martin Roesch, Sourcefire
  You’ve Got the Whole World in Your Hand (Now, How Do You Keep It Safe?) Steve Trilling, Symantec
  Getting Ahead of the Threat with Security Intelligence Brendan Hannigan, IBM
  Harnessing the Nexus of Forces with SDN Security Approaches Bret Hartman, Cisco
3:00 - 3:15 BREAK  
3:15 - 4:00 Security Vision Keynote AT&T SVP and CSO Edward Amoroso
4:00 - 4:15 Prize Drawing and Closing remarks  
4:15 - 5:15 NETWORKING RECEPTION  

Return to Top

14th Annual AT&T Cyber Security Conference

June 6, 2012
New York, NY

The 2012 conference replay is available here.


Time

Event

Presenter

9:30 - 9:40 Welcome/Introductions Gustavo de los Reyes, Executive Director, AT&T Security Research Center
9:40 - 10:45 AM Keynote Scott Snyder, Sr. Fellow, Wharton School of Business
10:45 - 11:00 BREAK  
11:00 - 12:00 Technology AM Session:  
  APT: You Can Sink a Ship with Lots of Small Leaks John Hogoboom, AT&T
  AT&T ForHealth(sm) Geeta Nayyar, Chief Medical Information Officer (CMIO), AT&T
  Mobile Wallet: Is It Time To Put Away Your Plastic? Tish DeVere, AT&T
  Research Session:  
  DNSSEC vs. DNS Security: Are We Solving the Right Problem? Anestis Karasaridis, AT&T
  How to Hide and Seek in a Digital Space Andrea Forte and Yevgeniy Vahlis, AT&T
  Touch Based Authentication on Mobile Devices Nasir Memon, NYU-Poly
  Tools and Tutorials AM Session:  
  The Path to Trusted Mobility Sanjay Beri, Vice President and General Manager, Junos Pulse Business Unit, Juniper
  Next Generation Firewalls and the Threat of Modern Malware Lee Klarich, Vice President, Product Management, Palo Alto Networks
12:00 - 1:00 LUNCH  
1:00 - 1:45 PM Keynote Edward Amoroso, AT&T Sr. VP and Chief Security Officer
1:45 - 2:30 Analyst Talk Jay Heiser, Research VP, Gartner
2:30 - 2:45 BREAK  
2:45 - 4:45 Technology PM Session:  
  Battlefield Application: From Code to Cloud Todd Waskelis, AT&T
  Is "The Cloud" Secure? It Depends Jeff Huegel, AT&T Mobile Malware Mitigation - Jeff Bickford, AT&T
  In the Year 2022: Attacks and Defenses in the Future Internet Tom Ritter, iSEC Partners
  Short Talks - Security Research Center, AT&T
  A Probabilistic Model for IP-address Reputation Suhas Mathur
  SMS Spam Analysis and Detection Ilona Murynets and Roger Piqueras Jover
  Mobile Trusted Transactions Yevgeniy Vahlis
  Multi-Layer Deception Wei Wang
  Hands-On Session:
  The State of Mobile Browser Security Chris Rohlf, Leaf Security Research
  Mobile Exploit Intelligence Project: Enterprise Edition Dan Guido, Co-Founder & CEO, Trail of Bits
  Firewalls, Trains and Automobiles: Automated Network & Security Management in a Multivendor Environment Jason Kirby, Sr. Product Manager, Infoblox
  Making Mobile Work in an Increasing Threat Environment Eric Chien, Technical Director, Security Technology and Response, Symantec
  Tools and Tutorials PM Session:
  Evolving DDoS Attack Tools: New Ways Cyber Criminals are Carrying Out Attacks Jose Nazario, Manager of Security Research, Office of the CTO, Arbor Networks
  The Great Security Opportunity: Trusted Clouds for VDI and BYOD Peder Jungck, Sr. VP,CTO, CloudShield
  A New Generation of Threats Requires a New Approach to IT Security William Gragido, RSA
  Securing Zero Day Threats in a Dynamic Threat Landscape Derek Manky, Sr. Security Strategist, Fortinet
4:45 - 5:00 BREAK  
5:00 - 5:30 Industry Panel: Wrapping Security around BYOD Daniel Hoffman (Juniper), Tim Wagner (Samsung), Rodney Dilts (AT&T)
5:30 - 5:45 Prize Drawing and Closing remarks Gustavo de los Reyes, Executive Director, AT&T Security Research Center

Return to Top

13th Annual AT&T Cyber Security Conference

May 18, 2011
Middletown, NJ

The 2011 conference replay is available here.


Time

Event

Presenter

9:30 - 9:40 Welcome/Introductions Gustavo de los Reyes, Executive Director, AT&T Security Research Center
9:40 - 10:45 AM Keynote Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft
10:45 - 11:00 BREAK  
11:00 - 12:00 AM Session:  
  Mobility Network Security Brian Rexroad, Principal Technical Security Architect, AT&T Security
  Machine-to-Machine (M2M) Solutions and Security David Kalb, Director, AT&T Mobility Applications
  Federated Identity Management:
How to Assert Your Digital Persona
Steve Krapes, Director, AT&T Security
12:00 - 1:00 LUNCH  
1:00 - 2:45 PM Session 1:  
  How Mobility's Scale has Redefined Service Assurance Peder Jungck - CTO, Sr. VP - Cyber and Information Solutions BU - SAIC, CTO, Director - CloudShield Technologies, Inc. - an SAIC Company
  From Mobile Workers to IPv6: How Unified Threat Management (UTM) Can Help Secure Your Network Randy Lee, Director of Systems Engineers - Fortinet, Inc.
  PM Keynote Dr. Edward Amoroso, AT&T Sr. VP and Chief Security Officer
2:45 - 3:00 BREAK  
3:00 - 4:00 PM Session 2:  
  Mobility Security Incidents and Trends Patrick McCanna, Lead Member of Technical Staff, AT&T Security
  SHORT TALKS Session:
  AT&T Security Operations Center (SOC) Steve Roderick, Director, AT&T Security
  Mobile Malware Detection Using Lightweight Agents Wei Wang, AT&T Security Research Center
  Advanced Persistent Threat (APT) Detection Framework Paul Giura, AT&T Security Research Center
  P2P Botnet Communities Baris Coskun and Suhas Mathur, AT&T Security Research Center
  Mobile Malware Mitigation Arati Baliga, AT&T Security Research Center
4:00 - 4:15 Closing Remarks Gustavo de los Reyes, Executive Director, AT&T Security Research Center

Return to Top

12th Annual AT&T Cyber Security Conference

October 13, 2010
Middletown, NJ

The 2010 conference replay is available here.

Time Topic Speaker
9:30 AM - 9:40 AM Welcome Gustavo de los Reyes, Executive Director, AT&T Security R&D
9:40 AM - 10:45 AM AM Keynote Dr. James A. Lewis, Senior Fellow, Center for Strategic and International Studies (CSIS)
10:45 AM - 11:00 AM BREAK  
11:00 AM - 11:30 AM Secure Navigation Through The Clouds (Protecting Access to Application Source and Execution State) Art Zaifman and John Mocenigo, AT&T Labs Research
11:30 AM - 12:00 PM What Security Risks Will the Future Bring? Khalid Kark, Vice President, Principal Analyst, Forrester Research
12:00 PM - 1:00 PM LUNCH  
1:00 PM - 2:00 PM PM Keynote Dr. Edward Amoroso, AT&T Sr. VP and Chief Security Officer
2:00 PM - 2:45 PM Panel Presentation: Rethinking Computing

Moderator: Gustavo de los Reyes, Executive Director, AT&T Security R&D

Panel:

  • Craig Labovitz, Chief Scientist, Arbor Networks
  • Neil Daswani, Co-Founder and Chief Technology Officer, Dasient, Inc.
  • Christopher Boyer, Assistant Vice President – Public Policy, AT&T Services Inc.
2:45 PM - 3:00 PM BREAK  
3:00 PM - 3:30 PM Smart Mobile Computing Joshua Knight, AT&T
3:30 PM - 4:00 PM AT&T Open Network:
New Ways to Develop Mobile Apps
Brad Mohs, AT&T VP - Platforms and Enablers
4:00 PM - 4:15 PM Closing Remarks Gustavo de los Reyes, Executive Director, AT&T Security R&D

Return to Top

11th Annual AT&T Cyber Security Conference

November 4, 2009
Middletown, NJ

The 2009 conference replay is available by clicking here.

Time Topic Speaker
9:30 AM – 9:40 AM Welcome Sanjay Macwan, AVP, AT&T Security R&D
9:40 AM – 10:45 AM AM Keynote Danny McPherson, VP and CSO, Arbor Networks
10:45 AM – 11:00 AM BREAK  
11:00 AM – 11:30 AM Project Saturn - Securing the Mobile Worker Bill Beckett and Deepak Chawla,AT&T
11:30 AM – 12:00 PM Cloud Computing and Security Toby Ford, AVP, AT&T
12:00 PM – 1:00 PM LUNCH  
1:00 PM – 2:00 PM PM Keynote Dr. Edward Amoroso, AT&T Sr. VP and CSO
2:00 PM – 2:45 PM Social Networking in the Enterprise

Panelists:

AT&T Communications:
Blair Klein, Director Emerging Communications, AT&T

Industry Strategist:
Brad Mays, Senior Vice President Digital Media Strategy, Fleishman Hillard Dallas

Industry Analyst:
Johna Till Johnson, President & Senior Founding Partner, Nemertes Research

Moderator: Sanjay Macwan, AVP, AT&T Security R&D

2:45 PM – 3:00 PM BREAK  
3:00 PM – 3:30 PM Rethinking Passwords Bill Cheswick, AT&T
3:30 PM – 4:00 PM Security Theater - Live
Jack-in-the-Bot
Presenter:
AT&T CSO Team
4:00 PM – 4:15 PM Closing Remarks Sanjay Macwan, AVP, AT&T Security R&D

Return to Top

10th Annual AT&T Cyber Security Conference

June 11, 2008
Middletown, NJ

Time Topic Speaker
9:00 - 9:10 Welcome / Introductions Sanjay Macwan, AT&T
9:10 - 10:30 AM Keynote Dr. Edward W. Felten,
Director of the Center for Information Technology Policy at Princeton University
10:30 - 10:45 Break  
10:45 - 11:30 IRSCP: Intelligent Route Service Control Point
Can your network provider's routing improve your applications? See how it is possible when routing becomes intelligent, easy to do, and optimized, enabling network based security and other services.
Alan Glasser,
AT&T Labs Research
11:30 - 12:00 Security in Our Mobile World
What are the "smart" security mechanisms to be considered and deployed for corporate use of smartphones within the enterprise?
Bruce Christofferson, AT&T
12:00 - 1:00 Lunch Break  
1:00 - 2:00 PM Keynote Dr. Edward Amoroso,
AT&T Sr. VP and Chief Security Officer
2:00 - 2:30 It's 10pm - do you know where your data is?
Is your sensitive data safe and sound, or is it leaking in unexpected and dangerous ways? Find out how you can protect your data and detect potential leaks.
Joe Bentfield, AT&T
2:30 - 2:45 Break  
2:45 - 3:30 Moderated Panel
Web 2.0 Security – What to expect

Panelists:

  • Chris Christiansen, Program Vice President for Security Products and Services, IDC
  • Brian Chess, Founder and Chief Scientist, Fortify Software
  • Grady Summers, CISO, General Electric

Moderator: Sanjay Macwan, AT&T

3:30 - 4:00 The Hacker Factor AT&T CSO Ethical Hacking Team
4:00 - 4:15 Closing Remarks Sanjay Macwan, AT&T
 

Return to Top

9th Annual Conference Agenda (2007)

May 17, 2007
Middletown, NJ

Time Topic Speaker
9:00 - 9:10 Welcome / Introductions Sanjay Macwan
AT&T
9:10 - 10:15 AM Keynote Whitfield Diffie
VP, Sun Fellow
Chief Security Officer, Sun Microsystems
10:15 - 10:30 Break  
10:30 - 11:15 Enterprise Security: A Communities of Interest (CoI) Approach
Do computers have communities? Yes. Find out how these Communities of Interest can help keep your intranet secure.
Chris Volinsky and Oliver Spatscheck
AT&T Labs Research
11:15 - 11:45 Intranet Security Analysis and Real-Time Monitoring
Do you know what is transported inside your VPNs - is it all "good traffic" or are there worms, viruses and attacks you are bringing into your corporate network? The AT&T Private Intranet Protect capability can give you the real-time insight.
Steve Hutnik
AT&T
11:45 - 1:00 Lunch Break  
1:00 - 2:00 PM Keynote Edward Amoroso
Sr VP
AT&T Chief Security Officer
2:00 - 2:30 The future -- Carrier-based clean pipes
Technological advances for "clean pipe" solutions.
Bill Beckett
AT&T
2:30 - 2:45 Break  
2:45 - 3:30 The Next 10 Years in Security

Moderated Panel

  • John Pescatore
    VP Distinguished Analyst
    Gartner Research
  • Ajit Sancheti
    Founder and CEO of Mu Security
  • Gareth Webley
    Chief Security Officer
    National City Corporation

Moderator: Bill O'Hern
AT&T

3:30 - 4:00 Malware / Botnets – "Catch me if you can"
Malicious botnets are recognized as sources of massive exploit activity, posing a growing threat to the Internet and enterprise networks. What makes them hard to eliminate? What can you do to protect yourself?
Dave Gross
AT&T
4:00 - 4:15 Closing Remarks Sanjay Macwan
AT&T

Return to Top

8th Annual Conference Agenda (2006)

May 11, 2006
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan, AT&T
AM Keynote
An in-depth look at application security, bugs and vulnerabilities - and how attack plans can teach us how to code.
Dr. Herbert Thompson
CTO Security Innovation Company
Break  
MPLS VPN Security
MPLS VPNs are the new wave. How is AT&T securing your MPLS VPNs?
Bill Jaeger
AT&T
Protecting Mobile Computing Devices
Security threats are aimed at PDAs, cell phones and other mobile devices. Find out about the latest security challenges and the best defenses.
Mitchell Manting
VP of Enterprise Information Security, Cingular
Lunch Break  
PM Keynote
The AT&T vision and strategy on security, particularly on network-based security solutions.
Dr. Ed Amoroso
AT&T Chief Security Officer
Quantum Cryptography
Can the laws of physics guarantee security? Come learn how quantum physics can be used to provide provable protection for cryptography key exchange.
Misha Brodsky
AT&T Labs Research
Break  
Security - Cost or Strategic Advantage?
Moderated Panel
Panelists:
  • Paul Stamp
    Forrester Research
  • George Kurtz
    Foundstone/McAfee
  • Mike Del Secolo
    ADP

Moderator:
Sanjay Macwan
AT&T

Battles of the Botnets
Today, the creation, care and feeding of zombies is a booming business. We can learn some interesting things about this business, and can protect our customers from some of their effects.
Henry Thorpe
AT&T
Closing Remarks Sanjay Macwan, AT&T

Return to Top

7th Annual Conference Agenda (2005)

May 12, 2005
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan
AT&T Labs
AM Keynote Amit Yoran
Security Advisor
Former Director of Cyber Security at the Department of Homeland Security (DHS)
Break  
Project Gunsmoke: Security Research on the Internet Frontier
New ideas on networks adaptively reacting against attacks
Albert Greenberg
AT&T Research
FUD up with VoIP Security - What can you do?
Fear-Uncertainty-Doubt about VoIP security are prevalent. Come find out what are the real concerns and how you can deal with them
Gustavo de los Reyes
AT&T Labs
Lunch Break  
PM Keynote
The Network as a Front Line Security Device: New network-based cyber defense approaches are achievable in the transformed environment based on mining high volumes of network data and new attack detection and mitigation functionalities
Ed Amoroso
AT&T Chief Information Security Officer
Project Gemini - Security in the Network
A carrier-class network-based platform that can offload specific aspects of your overall enterprise security requirements, without sacrificing control over your security policy
Rodney Dilts
AT&T Labs
Break  
MACdaddy: MAC-based Network Access Control
How to keep undesirable devices (virus infected or non-compliant patch level / software) off the network, then enable remediation before allowing access
Jerry Birkes and Chris Lewis
AT&T Managed Services
Phishing, Pharming and Phoolishness
How AT&T is moving much of the burden of phishing detection off of the end-user into our network
Henry Thorpe and Tony Hansen
AT&T Labs
Closing Remarks Sanjay Macwan, AT&T Labs

Return to Top

6th Annual Conference Agenda (2004)

November 17, 2004
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan, AT&T Labs
AM Keynote
The contents of the NSF Cyber Trust research program - and the future of security in the networked world at large
Dr.Carl Landwehr
Program Director
Cyber Trust Program
National Science Foundation (NSF)
Measurement and Security
Measuring your network can be an important step in securing it
Steve Bellovin
AT&T Research
Break  
Application-Aware Network - Securing the On-demand World
On-demand, Utility Computing, Grid Computing -- you name it, the benefits are compelling. But don't forget the security to protect against compelling attacks.
Gustavo de los Reyes
AT&T Labs
Got Spam. Got SPIT (Spam over IP Telephony)?
Spam, spam, spam, spam -- the nemesis of email. Find out how we can stay afloat when we get flooded by Spam over Internet Telephony (SPIT)
Kevin Kealy
AT&T Labs
Lunch Break  
PM Keynote
The latest security innovations from AT&T Labs - and how are they offered to our customers as part of our managed security service
Ed Amoroso
AT&T Chief Information Security Officer
Aurora - Real-time Security Threats Management
Attacks to the left of us, attacks to the right of us -- How we can protect your assets by turning diverse data into actionable information
Michael Singer
AT&T Labs
Break  
Internet Protect / DDoS Defense
Is your service on someone's DDoS list -- you may not know until it's too late. With this advanced protection you'll never need to know or even care
Steve Hutnik and Bill Beckett
AT&T Labs
Connections => Security Complexity
Pervasive Internet access has caused network, client, and device security to intrude into the lives of everyone. There are new and interesting ways to snarf, sniff, and phish from your computer, PDA, phone -- and our lives may never be the same again
Henry Thorpe
AT&T Labs
Closing Remarks Sanjay Macwan, AT&T Labs

Return to Top

5th Annual Conference Agenda (2003)

November 13, 2003
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan, AT&T Labs
Executive Address Harry Burns
VP, Consumer Service Delivery & Computing Center of Excellence
AT&T Labs
AM Keynote Jason Garms
Director of Security Eng and Architecture Assurance
Microsoft
Break  
FLOOD - Security Intelligence through IP Flow Analysis Brian Rexroad
AT&T Labs
Biometrics: Hype vs. Reality

Cristina Serban
AT&T Labs

S. Parthasarathy
AT&T Research

Lunch Break  
PM Keynote Ed Amoroso
VP, Security Center of Excellence
AT&T Labs
Address Authentication in Interdomain Routing Patrick McDaniel
AT&T Research
Break  
Ethical Hacking and Forensics Demo Cindy Cama
AT&T Labs
Fried Worms and Spam Henry Thorpe
AT&T Labs
Closing Remarks Sanjay Macwan
AT&T Labs

Return to Top

4th Annual Conference Agenda (2002)

October 29, 2002
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan, AT&T Labs
Executive Address

Hossein Eslambolchi
AT&T CTO & President, AT&T Labs

Harry Burns
VP, AT&T Labs

AM Keynote Bill Cheswick
Chief Scientist
Lumeta Corporation
Break  
Peer-to-Peer Application Security Dan Hurley
AT&T Labs
Cyclone: A Safe Dialect for C Trevor Jim
AT&T Research
Lunch Break  
PM Keynote Ed Amoroso
VP, AT&T Network Security
Cyber-Security & Public Policy Liz Gasster
Senior Attorney
AT&T Government Affairs
Break  
Internet Fraud and Abuse Randy Collins
Customer Care
AT&T Consumer Services
Twinkies & Cookies - Truth Decay in the Internet Age Henry Thorpe and Russ Sharples
AT&T Labs
Closing Remarks Sanjay Macwan, AT&T Labs

Return to Top

3rd Annual Conference Agenda (2001)

November 2, 2001
Middletown, NJ

Topic Speaker
Welcome / Introductions Sanjay Macwan
IP Security - A Business Perspective Harry Burns
Keynote Ed Amoroso
Break  
Security in Managed Services - Great (clients') Expectations Gideon Lidor
Wireless LAN Security Avi Rubin
Lunch  
IP Security in an ISP Sunil Maloo
Intrusion Detection in an ISP Gus de los Reyes
Break  
Distributed Denial of Service Attacks and Pushback Steve Bellovin
Webhost Security Henry Thorpe
Closing Remarks Sanjay Macwan

Return to Top

2nd Annual Conference Agenda (2000)

August 15, 2000
Lincroft, NJ

Topic Speaker
Keynote - IP Services Security, A Business Perspective Harry Burns
Moving Into a Bad Neighborhood - Client Side Security Issues Henry Thorpe
Network Security - An ISP Perspective John Craig
Broadband IP Security Gus de los Reyes
Personal Firewall Technology Cristina Serban and Gang Xu
Common Security Platform Clement Lo
Intrusion Detection - Survey of the Art Michah Lerner
Heuristic Approach to Intrusion Detection Ed Amoroso
Assessing 3rd Party Networks - Mergers and Acquisitions Cindy Cama

Return to Top

1st Annual Conference Agenda (1999)

May 19, 1999
Lincroft, NJ

Topic Speaker
Opening Remarks Harry Burns
Balancing IP Services Business Opportunities and Risks Harriett Goldman
Security Architecture: Framework and Process Gus de los Reyes
Performance Implications of Security Protocols V. Mainkar, P. Reeser
Lunch  
Security Issues for Always-on Devices Cristina Serban
Security in Electronic Commerce Paul Sherman
Break  
Security Considerations for AT&T WebMail Service Henry Thorpe
Fighting Spam Jonathan Clark
Security Scanning of IP Services John Greco
Closing Remarks Sanjay Macwan

Return to Top