Win the New Cybersecurity War with the New Rock Stars of Cybersecurity

Cybercrime is no longer a matter of credit card breaches. Cybercriminals are now trying to take down countries as well as top companies. Keep your organization safe. Come to the premier, one-day, high-level event designed to give real, actionable solutions to these cybersecurity threats.

Learn from and collaborate with the experts --

Oct. 27, 2015 - San Jose, California

 


 

Your Risk of a Major Cybersecurity Breach in 2015 is Huge

Cybersecurity Badge

You know the old joke, just because you’re paranoid doesn’t mean they’re NOT out to get you? In today’s security world, it’s not funny. The reality has shifted – from occasional breaches to daily warfare that reaches deep into the fabric of our lives. The enormity of the threat is incalculable – no matter what size your company or what business sector you occupy.

 

New Threats Require New Thinking
Rock Stars of Cybersecurity 2015 brings you a this year’s top experts who can help you get ready to take on real-world problems and give you to viable solutions you can put into action tomorrow. Rock Stars of Cybersecurity delivers the latest, most viable ideas in the field on questions like these  and more–

  • Is your budget keeping up with your security threat?
  • What is the real threat in your business sector?
  • Do you need breach insurance?
  • Does your mobile strategy need revamping in the face of threats?
  • Advanced persistent threat tools will become the norm in 2015. How can you prepare?
  • How much information is it safe to share?
  • As threats get worse, what happens to anonymity, freedom of speech, and privacy?
  • Is there really such a thing as secure architecture?
  • And much more

Rock Stars of Cybersecurity gives you a chance to ask questions, collaborate, network, and get down to the realities of security issues.


Lunch and cocktails are served as part of the event.


Rock Stars events are “high value” and even more so while early pricing is in effect. Don’t miss your chance. Register NOW because what you don’t know can definitely hurt you.

speakers


Justine Bone
Bone
Jim Anderson
Anderson
 
Jamil Farshchi
Farshchi
Chris Calvert
Calvert
 
Dr. Spencer Soohoo
Soohoo
Marcus H. Sachs
Sachs
 
Hank Thomas
Thomas
 

Jim Anderson

President
BAE Systems America

Jim Anderson, president of the Americas of BAE Systems Applied Intelligence, brings over 25 years of experience of sales and consulting in the high-tech industry. He is an energetic leader who innovates on the edge. Anderson holds a bachelor of science in electrical engineering and computer science from Princeton University and an MBA from the Wharton School.

Justine Bone

Chief Information Security and Solutions Officer
Hoyos Labs

As Chief Information Security and Solutions Officer at Hoyos Labs, Justine Bone assures the alignment of secure solutions for enterprise and consumer customers globally. She joined Hoyos Labs from Dow Jones, where she was CISO. There she was accountable for steering the company’s information security strategies. She and her team helped define and deliver News Corp.-wide products and solutions, ensuring quality implementation and regulatory compliance while helping to increase revenue, profitability, and overall business value. She also managed Dow Jones’ Identity department, founded the DevOps group, and helped drive various cloud migration initiatives.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Chris leads the team that supports the HP Enterprise Security Products suite–ArcSight, Tipping Point, Fortify, and Atalla. Chris has over 24 years’ experience in information security. He brings extensive international experience in Europe and Asia. From 2007 to 2013, Chris was the CEO of Laconic Security, an ArcSight SIOC partner, where he personally led the design and build of many global multinational Security Operations Centers including; Walmart, Vodafone (Germany), Shell Oil (The Netherlands), Sony Network Entertainment, and Apple. Chris was previously director of professional services for Cybertrust, and manager of security intelligence and operations at IBM Global Services. Before joining IBM, Chris worked in the National Defense and Intelligence community in the field of Information Operations. He supported such agencies as the DOD Joint Staff, the Land Information Warfare Activity, and the Space Warfare Center. Chris served for 10 years in the US Army in Military Intelligence and Special Forces.

Jamil Farshchi

Chief Information Security Officer
Time Warner

Named one of the top 10 most influential Chief Information Security Officers by Sys-Con, Jamil has successfully protected some of the world’s most sensitive information assets, including nuclear weapons, financial systems and networks, and complex technologies such as the space shuttle, Hubble Telescope, and Mars Rover. As CISO at Time Warner, Jamil is charged with the unique challenge of securing and enabling some of the most engaging, valuable and widely consumed content. Jamil has a BBA from the University of Oklahoma, a MS from the Wharton School/GSE and a PLD from Harvard Business School.

Marcus H. Sachs

Vice President, National Security Policy
Verizon

Marcus Sachs is Verizon’s Vice President for National Security Policy, and is active in several public/private partnership groups in Washington, including the Communications Sector Coordinating Council and the President’s National Security Telecommunications Advisory Committee. He holds degrees in civil engineering, computer science, and science and technology commercialization, and is pursuing a PhD in public policy.

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

Dr. SooHoo has been with Cedars-Sinai for over 36 years, starting first as a biomedical engineer, then a research scientist in pulmonary medicine before moving into IT to manage a research computing facility at Cedars-Sinai before it was merged with the enterprise IT organization. His roles include managing data networking, security, servers, e-mail, storage, and a data center. Dr. SooHoo earned a BS in Electrical Engineering from the University of Rochester, a MS in Electrical Engineering from George Washington University, and MS and PhD degrees in Biomedical Engineering from the University of Southern California.

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Hank Thomas is a Principal/Director at Booz Allen Hamilton and a founding member and a Executive Director for its Cyber4Sight threat intelligence service. Since joining the firm in late 2004, Hank has grown his business from a niche four person, government focused, cyber intelligence team to a 100+ person worldwide effort. Prior to joining the firm, Hank served as a military intelligence officer in a variety of tactical, operational, and strategic positions, including at the National Security Agency.

agenda


Cybersecurity Badge

Morning Session: 9:00 a.m. – Noon

Lunch & Pitchathon: Noon -1:30 p.m.

Panel Discussion: 1:30 p.m. – 2:15 p.m.

Justine Bone

Chief Information Security and Solutions Officer
Hoyos Labs

Security in the Participation Age

Technology is moving faster than Information Security best practices. New platforms, communication methods, and threats evolve faster than our ability to react. Defensive and group thinking is a part of the problem. If security gives us accountability, how do we tie in accountability from the start, and what are the implications of this on anonymity, freedom of speech, and privacy? Justine will present some new and somewhat radical technologies that help us address this challenge, most of which would completely overhaul existing digital business models and the way we manage information risk. This includes the evolution of cryptographic solutions, identity management, and digital property protection.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Topic coming soon!

Abstract coming soon!

 

Jamil Farshchi

Chief Information Security Officer
Time Warner

Topic coming soon!

Abstract coming soon!

Marcus H. Sachs

Vice President, National Security Policy
Verizon

Managing the Security Unknowns

Donald Rumsfeld once said that there are things we know, and things we don't know; and there are things we don't know that we don't know. In this presentation we'll look at how to quantify "unknown" security problems, why they are important, and how they relate to protecting against online malicious activity. This presentation will describe a model of risk management based on knowns vs unknowns and show how it can apply to different risk management processes.

 

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

Topic coming soon!

Abstract coming soon!

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Topic coming soon!

Abstract coming soon!
 

sponsorships


 
 

Reach the Decision-makers in Cybersecurity – Present and Future

Cybersecurity is one of the Fastest-growing Markets in the World! Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Technology.

When you sponsor Rock Stars of Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decisions, and a lineup of experts unequaled at other cybersecurity events, Rock Stars of Cybersecurity is an obvious investment for any organization interested in influencing the future of cybersecurity technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment

Sponsors at Rock Stars of Cybersecurity are integral parts of both the content and success of the event. Take advantage of these unique sponsorship opportunities –

Platinum Sponsor – Command the stage as a keynote speaker and help drive the future

  • 45-minute keynote
  • Attendee registration list
  • Table top
  • Logo on attendee bags
  • Conference bag insert
  • Demo Showcase
  • 7 complimentary registrations
  • Full-page ad in the official program

 

Gold Sponsor

  • Attendee registration list
  • Table top
  • Logo on attendee bags
  • Conference bag insert
  • Demo Showcase
  • 5 complimentary registrations
  • Full-page ad in the official program

 

Silver Sponsor

  • Table top
  • Logo on attendee bags
  • Conference bag insert
  • Demo Showcase
  • 3 complimentary registrations
  • Full-page ad in the official program

 

Panel Speaker Slot

Bundle this opportunity with any sponsorship package for maximum impact. Contact us for custom prices.

Demo Showcase Salon

  • Separate area to showcase your products, services or technologies
  • Logo signage
  • Table top
  • Half-page ad in the official program
  • Conference bag insert
  • 2 complimentary registrations

 

Registration Sponsor

  • Logo on attendee badges
  • Logo display near registration
  • Table top
  • Conference bag insert
  • Half-page ad in the official program

 

Luncheon Sponsor

  • Logo signage by food/drink stations
  • Table top
  • 3 complimentary registrations
  • Full-page ad in the official program

 

Cocktail Reception Sponsor

  • Logo signage by food/drink stations
  • Table top
  • Full-page ad in the official program
  • 3 complimentary registrations

 

Lunch Roundtable Sponsor – Bring a current customer and share your company’s story with a captive audience during lunch.

  • Roundtable attendee list
  • Roundtable promotion
  • Logo signage
  • Table top
  • 3 complimentary registrations
  • Full-page ad in the official program

 

Table Top

  • 8-foot draped table with 2 chairs, electrical outlet, carpet, and WiFi
  • 2 complimentary FULL conference registrations for exhibitor personnel
  • Conference bag insert
  • Lead retrieval

 

Official Program Advertising

  • Full-page
  • Half-page
  • Cover 4
  • Cover 2
  • Cover 3
  • Bellyband

 

Conference Bag Insert
Get the attention of every delegate by placing your company’s literature in the conference attendee bag.

Few promotional opportunities reach as highly qualified an audience with such excellent opportunities for both visibility and credibility. Rock Stars events help define the future of the industry and your presence is needed to hit the mark.

Sponsorship Contact

For more information and to secure your Rock Stars of Cybersecurity sponsorship and/or exhibit space, please contact:
Sandy Brown
sbrown@computer.org
714-816-2144

venue


Hotel and Transportation

Information coming soon.

 

Attend the Rock Stars of Cybersecurity Conference

The Rock Stars of Cybersecurity Conference will be held on October 27 at the Fourth Street Summit CenterThe Fourth Street Summit Center, located three blocks from the Fairmont San Jose, features a 6,800-square-foot ballroom with more than 3,000 square feet of adjoining foyer space. Two open-air balconies and floor-to-ceiling windows provide spectacular views of Silicon Valley

 

88 South 4th Street
7th floor
San Jose CA 95192

Maps & Directions
http://www.fairmont.com/san-jose/map/map-and-directions/

TEL + 408 998 1900 
FAX + 408 287 1648

International Numbers
http://www.fairmont.com/contact-us/morenumbers/

 

 

register


Cybersecurity Badge

Register Now for Rock Stars of Cybersecurity 2015

 

27 Oct 2015 San Jose, CA

Early-Registration Pricing
$399
IEEE/IEEE Computer Society Member: $329
Teams: $199 each for groups of three or more
Students: $165
Discounts also available for multiple events.

Computing Now
.