February 24 - 28, 2014 | Moscone Center, San Francisco, CA
Use code SC4TENAB when checking out
Come see us in Booth #3631. We'll be giving demos, doing giveaways, and showing what it takes to protect your network in today's environment.
See how Tenable Network Security’s line of products can be tailored to meet your complex security needs.
Tuesday, February 25, 2014
12:00 p.m. – 12:15 p.m.
Expo Briefing Center
South Expo Hall
These days, Big Data is everywhere: you have it in your physical and virtual datacenter, on mobile devices, and from your public cloud. But to use this data and leverage it to gain actionable insights you have to know how to analyze it appropriately.
Attend this session to learn how businesses and governments can find hidden security intelligence buried in their Big Data. Ron Gula, CEO and Co-founder of Tenable Network Security, discusses what advanced threats, hidden attack paths and other sophisticated threats look like when you analyze billions of data points correctly, and how to secure your organization against these threats.
Tuesday, February 25, 2014
1:20 p.m. – 2:20 p.m.
Room 3009
West Moscone
Years ago, Saltzer and Schroeder identified a set of security principles meant to guide security design. Today, with computer security more important than ever, the question at hand is how these principles align with the real world (or don’t). This panel pits academia (Matt Bishop) and security gurus (Marcus Ranum) against the real world CISOs from Aetna and Visa in a knockdown drag out fight.
Monday, February 24
6:00 p.m. – 8:00 p.m.
Tenable Booth: 3631,
North Expo Hall
Author: Steve Piper, CISSP
Forward By: Ron Gula, Co-founder, CTO and CEO of Tenable Network Security, Inc.
Ron Gula will be signing copies of Tenable’s Definitive Guide to Next-Generation Vulnerability Management.”
This guide will help you discover how next-generation vulnerability management (NGVM) solutions equipped with continuous monitoring can improve your security posture and simplify compliance.
Tuesday, February 25, 2014
11:30 a.m. – 11:45 a.m.
Wednesday, February 26, 2014
11:30 a.m. – 11:45 a.m.
Tenable Booth: 3631, North Expo Hall
Join Tenable’s newest luminary for an informative and frank discussion about the state of the information security industry, and how companies must be able to continuously monitor their enterprise in order protect against today’s persistent threats. Learn how to not only collect information about your network, but how to process, track, report, and act upon it.
Tuesday, February 25, 2014
1:00 p.m. – 1:45 p.m.
Tenable Booth: 3631,
North Expo Hall
Stuart McClure will be signing copies of his Hacking Exposed 7th Edition.
Stuart leads Cylance as its CEO and visionary for a new approach to threat detection, protection and response. His leadership sets the strategic direction, operational execution, and fiscal investments of the company. Stuart is one of the leading experts and practical thinkers in the computer security industry today. With a highly regarded 25-year history in the security industry, Stuart has led some of the most notable companies in the space.
Tuesday, February 25, 2014
12:15 p.m. – 12:30 p.m.
Wednesday, February 26, 2014
12:15 p.m. – 12:30 p.m.
Tenable Booth: 3631, North Expo Hall
Server virtualization and private cloud services offer compelling benefits, including hardware consolidation, rapid provisioning and reduced infrastructure complexity. But they also introduce security and compliance challenges that are not addressed with traditional security and vulnerability management tools. Find out how continuous monitoring helps identify dangerous threats and vulnerabilities looming in these environments.
Tuesday, February 25, 2014
2:15 p.m. – 2:30 p.m.
Wednesday, February 26, 2014
2:15 p.m. – 2:30 p.m.
Tenable Booth: 3631, North Expo Hall
IT security professionals see malware, botnets, malicious software, unknown processes and viruses every day despite the billions they have spent on anti-virus and anti-malware products. This session describes how to ensure that you find all the relevant assets, see the behavior occurring on them and catch every risk in your environment using a combination of techniques that do not rely on AV and signatures alone.
Tuesday, February 25, 2014
3:15 p.m. – 3:30 p.m.
Wednesday, February 26, 2014
3:15 p.m. – 3:30 p.m.
Tenable Booth: 3631, North Expo Hall
There are few organizations whose IT departments do not have to deal with smartphones and tablets. The technology is ubiquitous, and here to stay. With adoption comes threats, and more than ever attackers are exploiting the mobile platform for fun and profit. Learn how to get a handle on the situation and begin discovering the mobile vulnerabilities hidden deep within your network.
Tuesday, February 25, 2014
4:00 p.m. – 6:00 p.m.
Tenable Booth: 3631, North Expo Hall
Unwind from a long day of sessions and exploring the exhibit halls with a cold one, compliments of Tenable. Stick around and learn from our experts how our solutions can help you across 100% of your IT assets, including mobile, cloud, and virtual, all in real-time.