Art Coviello is responsible for RSA's strategy as it delivers EMC's global vision of information-centric security. Coviello was Chief Executive Officer of RSA Security, Inc. prior to its acquisition by EMC in 2006. He joined the company in 1995 and has been a driving force in its rapid growth, increasing revenue from $25 million in 1995 to revenues of over $700 million in 2010. His expertise and influence have made him a recognized leader in the industry, where he plays a key role in several national cyber security initiatives. He has spoken at numerous conferences and forums around the world.
Coviello has more than 30 years of strategic, operating and financial management experience in high technology companies. In addition, he currently serves on the Board of Directors at EnerNOC (a leader in Demand Response Systems for energy conservation). He graduated magna cum laude from the University of Massachusetts.
Title: Sustaining Trust in a Hyperconnected World
Abstract: Through a constant and growing flow of digital information, we are living in a hyperconnected world–not just as consumers, or friends on social networking sites, but through our corporate supply chains, the cloud and as trading partners in interconnected global markets. The challenge for us all is that the resulting openness and hyperconnection of our enterprises in an increasingly–digital universe has introduced new vulnerabilities that attackers have learned to exploit. Over the past 18 months, organizations throughout the world have been under attack by nation states, hacktivists and various cyber criminals. What our industry has demonstrated time and time again is an enormous resiliency and ability to innovate that has accelerated the growth and unlimited potential of the digital universe. In his remarks, Art Coviello discusses our roles and responsibilities at an enterprise, industry and geopolitical level to secure the promise of a trusted digital world.
Scott Charney serves as Microsoft's Corporate Vice President for Trustworthy Computing, Engineering Excellence, and Environmental Sustainability. Trustworthy Computing is Microsoft's effort to help ensure secure, private and reliable computing experiences for everyone. As part of this effort, the Trustworthy Computing team works with business groups throughout the company to ensure their products and services adhere to Microsoft's security and privacy policies. It also engages with governments, industry partners, and computer users on important security and privacy issues such as critical infrastructure protection, software assurance, and identity management.
Title: TwC for our Computing–centric Society
Abstract: In the ten years since Microsoft announced the creation of its Trustworthy Computing (TwC) initiative, much has changed: society has become far more dependent on information systems; those attacking networks have become more persistent and determined; and new concerns about supply chain and cyber warfare are now frequently discussed in national capitols. Additionally, users are moving to the cloud, ushering in the era of big data. Scott Charney will talk about how these factors are affecting the future of TwC.
Enrique Salem is president and CEO of Symantec, a leader in protecting the world's identities and information. Salem was previously CEO of Brightmail, the leading anti–spam software company. With over 21 years in security technology, he has a deep and unique perspective and is focused on delivering security, backup, and availability solutions in an evolving digitally connected world.
Title: The Digital Native: Shaping Tomorrow's Security Today
Abstract: The workforce of tomorrow doesn't know a world without social networking, smart devices or the Internet. Always on and always connected, their behaviors will transform our workplace. President and CEO Enrique Salem will discuss how security too must transform to protect critical information that will be accessed by a myriad of devices, and is stored and shared between the data center and the cloud.
Joe Sullivan is the Chief Security Officer at Facebook, where he manages the company’s teams responsible for information security, physical security, internal and external investigations, and law enforcement relations. In addition to spending most of his time promoting safety and security for Facebook users, Joe also works on other regulatory and privacy-related legal issues.
Marc Benioff is chairman and CEO of salesforce.com. He founded the company in 1999 with a vision to create an on-demand information management service that would replace traditional enterprise software technology. Under Marc’s direction, salesforce.com has grown from a groundbreaking idea into a publicly traded company that is the leader in enterprise cloud computing.
He was appointed by former President George W. Bush as the co-chairman of the Information Technology Advisory Committee and served from 2003 to 2005, overseeing the publishing of critical reports on healthcare information technology, cybersecurity, and computational sciences. Marc is also the author of three books, most recently the national best seller Behind the Cloud.
Title: The Cryptographers' Panel
Panelists: Whitfield Diffie, Vice President for Information Security, ICANN; and Chief Cryptographer, Revere Security; Ronald Rivest, Viterbi Professor of Electrical Engineering and Computer Science, MIT; Stefan Savage, Professor, Department of Computer Science & Engineering, University of California, San Diego; Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel
Abstract: Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2012 and practical insights that continue to be drawn from lessons learned over the last three decades.
Previously, Dr. Carter served as Under Secretary of Defense for Acquisition, Technology and Logistics from April 2009 until October 2011. As Under Secretary, Dr. Carter led the Department's efforts to accelerate the fulfillment of urgent operational needs; increase the Department's buying power; and strengthen the nation's defenses against weapons of mass destruction and other emerging threats.
Over the course of his career in public service, Dr. Carter has three times been awarded the Department of Defense Distinguished Service Medal. For his contributions to intelligence, Dr. Carter was awarded the Defense Intelligence Medal.
Dr. Carter earned bachelor's degrees in physics and in medieval history from Yale University, summa cum laude, Phi Beta Kappa, and was awarded his doctorate in theoretical physics from Oxford University, where he was a Rhodes Scholar.
Prior to his most recent government service, Dr. Carter was chair of the International and Global Affairs faculty at Harvard University's John F. Kennedy School of Government and Co-Director of the Preventive Defense Project. Dr. Carter was also Senior Partner at Global Technology Partners, a member of the Aspen Strategy Group, a member of the Board of Trustees of the MITRE Corporation and the Advisory Boards of MIT's Lincoln Laboratories and the Draper Laboratory, and an advisor to Goldman Sachs.
During the Clinton Administration, Dr. Carter was Assistant Secretary of Defense for International Security Policy. From 1990 until 1993, Dr. Carter was Director of the Center for Science and International Affairs at Harvard University's John F. Kennedy School of Government, and Chairman of the Editorial Board of International Security. Previously, he held positions at the Massachusetts Institute of Technology, the Congressional Office of Technology Assessment, and Rockefeller University.
Dr. Carter has served on the Defense Science Board, the Defense Policy Board, the Secretary of State's International Security Advisory Board, and the Congressional Commission on the Strategic Posture of the United States. He is a member of President Obama's Government Accountability and Transparency Board. Dr. Carter is a Fellow of the American Academy of Arts and Sciences and the American Academy of Diplomacy and is a member of the Council on Foreign Relations and the American Physical Society.
In addition to authoring articles, scientific publications, government studies, and Congressional testimonies, Dr. Carter has co-edited and co-authored eleven books.
Dr. Carter is married to Stephanie Carter and has two grown children.
Title: Stronger Networks: Enhancing Cybersecurity Through Public-Private Partnership
Abstract: We are a nation at risk in cyberspace—cybercriminals and nation-states steal our intellectual capital and regularly probe our critical infrastructure networks. To meet these challenges, we must develop innovative solutions and bring together the special capabilities of the U.S. government and the private sector. Pending congressional legislation offers promising avenues to improve information sharing and enhance the private sector's ability to protect U.S. networks. In his address, Deputy Secretary of Defense Ashton Carter will offer insights into DoD's role in providing cybersecurity and describe how and why the government and private sector can partner closely to meet our shared security needs.
Title: The Rise of Hacktivism
Panelists: Misha Glenny, Author & Journalist; Eric Strom, Unit Chief, Cyber Initiative and Resource Fusion Unit Cyber Division, Federal Bureau of Investigation; Grady Summers, Vice President, MANDIANT
Abstract: Hacktivism has reached a tipping point. The use of computers and computer networks as a means of protest to promote a political/ideological end requires a change in the way we approach enterprise security. It intertwines Public Relations and IT Security in a fascinating way: unpopular company positions can now put the IT infrastructure at risk. Hacktivist attacks range from defacement, redirects, and DDoS to information theft and sabotage. Pre-packaged tools built or modified by hacktivists allow users with little technical knowledge to wreak havoc, often anonymously. Using the power of social media, groups like Anonymous have been successful at rallying supporters at flash mob speeds. This panel of experts examine hacktivists – Who are they and what to do if you become subject of attack?
As Senior Vice President of the Security and Government Group at Cisco, Chris Young is responsible for Cisco´s overall security vision and the integration of Cisco´s product and cyber security into one platform. With security as one of Cisco´s top engineering priorities, Young is tasked with the development of industry–leading security products and solutions as well as managing a cross–portfolio security strategy and architecture. He oversees a team of more than 2000 employees combining the security technologies group, the global government security solutions group, and Cisco´s own security operations team into a single entity.
He joined Cisco from VMware, where he served as Senior Vice President and General Manager, responsible for strategy, products, engineering, and delivery across all of VMware´s end–user computing solutions. Previously, he served as Senior Vice President at RSA, the security division of EMC, where he was responsible for strategy, product management, product marketing, engineering, and delivery of products across all of RSA's identity and access assurance, security information and event management, governance risk and compliance and data security solutions. He built the company's identity protection and verification business, which today protects more than 200 million online accounts.
He has served as Vice President of safety and security premium services for America Online, Inc. (AOL) and prior to that, he founded and served as president of Cyveillance, a technology provider leveraging search technologies to help companies manage business risk.
As an expert in topics related to information–centric security, he is a regular speaker at security industry events. He has testified in front of the United States Senate Judiciary Committee on the subject of cyber–squatting. Outside of Cisco, Young serves on the board of Rapid7, a privately held company in Boston, Massachusetts, and has served on Princeton University´s Board of Trustees.
He holds a Bachelor of Arts degree, cum laude, from Princeton University and a Master´s degree in Business Administration, with distinction, from the Harvard Business School.
Title: Lock it Down or Free it Up?
Abstract: With companies moving rapidly toward the cloud, BYOD as the new normal, and stricter policy enforcement demands, every CIO and administrator needs more transparent and efficient networks. The answer is intelligent networks that integrate security technologies and context awareness allowing control over who, what, where, when, and how company data is accessed. Christopher Young will show how enterprises can increase overall network visibility and application control while maintaining secure access for both devices and applications.
Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As CEO of Qualys, Courtot has worked with thousands of companies to improve their IT security and compliance postures. He received the SC Magazine Editor's Award in 2004 for bringing On Demand technology to the network security industry and co–founding the CSO Interchange to share information in the security industry. He was named 2011 CEO of the Year by SC Magazine Awards Europe, and is on the board of directors for StopBadware.org and TechAmerica. Before Qualys, he was Chairman and CEO of Signio, Chairman and CEO of Verity and Chairman and CEO of cc:Mail. He has a Masters Degree in Physics from the University of Paris.
Title: The Urgent Need for a More Effective Approach to Security
Abstract: There is plenty of evidence that our current approach to security doesn't work anymore, despite the large investments we all have made in securing our infrastructures. This talk exposes groundbreaking research highlighting the fast evolving threat landscape and introduces the blueprint for a new security architecture that can scale with the business realities of the modern enterprise and help keep us protected.
Stuart McClure is chief technology officer for McAfee. He joined McAfee in 2004 through the acquisition of Foundstone, which he co–founded, and where he served as president, and CTO. Additional executive and technical leadership positions include Kaiser Permanente, Ernst & Young, and IDG. He is one of the industry's leading authorities, and his best–selling book, “Hacking Exposed: Network Security Secrets & Solutions” has been translated into more than 30 languages.
Title: Securing the Unsecurable
Abstract: The threat environment has changed rapidly, and what we once thought of as theoretical is now a reality. Things we thought couldn't be secured, or didn't need to be secured, are now essential to a secure environment. We've seen a rise in Advanced Persistent Threats, which have been effective in targeting organizations worldwide. Critical infrastructures were not a major concern for most – until Stuxnet hit and left organizations scrambling. Now, with the explosion of embedded devices, we're seeing an explosion of threat vectors. We must secure all of these, while the bad guys only need to find one way in.
McAfee Chief Technology Officer Stuart McClure breaks the myth that certain things don't need to be secured, and that certain things aren't securable. He will discuss a new approach, which encompasses going into the hardware, ensuring real–time updates and strong, clear metrics for success.
David Brooks is a New York Times Op–Ed columnist. He has been a senior editor at The Weekly Standard, a contributing editor at Newsweek and the Atlantic Monthly, and is current a commentator on "The Newshour with Jim Lehrer." He is author of "Bobos In Paradise" and "On Paradise Drive". His most recent book is "The Social Animal" published in March 2011.
Title: The Social Animal
Abstract: David Brooks, noted bi–weekly Op–Ed columnist for The New York Times and regular analyst on NewsHour with Jim Lehrer, has a gift for bringing audiences face to face with the spirit of our times with humor, insight and quiet passion. He is a keen observer of the American way of life and a savvy analyst of present–day politics and foreign affairs. Putting aside politics, David will discuss his finding from four years of research resulting in his latest book The Social Animal, a landmark sociological explanation of how we make decisions, how the subconscious mind drives our lives and why some succeed and others don't.
Robert S. Mueller, III is the sixth Director of the FBI, nominated by President George W. Bush. He was sworn in as Director on September 4, 2001. His ten–year term as Director was recently extended for an additional two years.
After receiving his undergraduate degree at Princeton University and his Master's Degree in International Relations from New York University, Director Mueller joined the U.S. Marine Corps. He served as a Marine officer for three years. After attending Army Ranger and Jump Schools, he led a rifle platoon of the Third Marine Division in Vietnam for one year. For his service, he received the Bronze Star, two Navy Commendation Medals, the Purple Heart, and the Vietnamese Cross of Gallantry.
Following his career in the Marine Corps, Director Mueller went on to earn his law degree from the University of Virginia Law School. Director Mueller has served as a litigator, a U.S. Attorney , and Acting Deputy Attorney General for the Department of Justice.
Title: Combating Threats in the Cyber World: Outsmarting Terrorists, Hackers, and Spies
Abstract: We depend on the Internet every day – to communicate, to shop, to grow ideas and to build businesses. But the technology we use for innovation and convenience is employed by criminals and nation–states to steal research and personal data. Terrorists use it to recruit and train operatives, and to plan and execute attacks. We cannot merely react to these threats. Hackers and spies will continue to exploit every vulnerability; terrorists will continue to use the Internet to nefarious ends. FBI Director Mueller will discuss the cyber threat to our nation's security and economic prosperity, what the FBI is doing to combat this threat, and why it is imperative that law enforcement and the private sector work together to protect the safety and security of our citizens.
Mike Denning leads the Identity and Access Management business at CA Technologies. Denning is responsible for ensuring the company's products, services and partnerships help customers minimize risk, boost compliance and confidently adopt virtualization technologies and cloud services by controlling users, their access and what they can do with information.
He joined CA Technologies in November 2010 from VeriSign where he spent 11 years leading several organizations, most recently as vice president and general manager, Enterprise Security Services.
Dr. Carrie Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, she was recognized for her work with a Women of Influence award from CSO magazine.
Title: Protecting Business in the New World Order
Abstract: The IT Security landscape is undergoing an accelerated rate of change, with an increasing impact on the business. But, how can Security Managers ensure that security supports and enhances, rather than limits, business growth. Mike Denning, Security GM, CA Technologies, will explore the key security capabilities and technologies that are critical for success in this dynamic environment.
Tom Reilly is vice president and general manager of Enterprise Security at HP. In this role, Reilly is responsible for the strategy, development and delivery of a portfolio of market–leading products including ArcSight, an HP company; Fortify, an HP company; and HP TippingPoint, which are designed to protect today's applications and IT infrastructures from sophisticated cyber threats.
Previously he served as president and chief executive officer of ArcSight Inc. He also served as chief operations officer for ArcSight.
Prior to ArcSight, he was vice president of Business Information Services for IBM, following the acquisition of Trigo Technologies Inc., a product information management software company. Reilly also served as chief executive officer of Trigo Technologies.
Hugh S. Njemanze is chief technology officer and vice president of worldwide research and development for Enterprise Security at HP. In this role, Njemanze serves as the chief technologist, responsible for overseeing product strategy, development and support for HP Enterprise Security Products.
Njemanze previously cofounded and served as chief technology officer and executive vice president of research and development for ArcSight, an HP company. Prior to ArcSight, Njemanze was chief technology officer of Verity Inc., a provider of knowledge retrieval software products.
Njemanze is a Certified Information Systems Security Professional (CISSP) and holds a bachelor's degree in computer science from Purdue University.
Title: Security Bushido: The Way of the Cyber-warrior
Abstract: In 12th century Japan, warlords and their samurai transitioned from defending their own estates to band together and form the first shogunate, soon after successfully defending their country from Mongol invasion. Today, security professionals must do the same to defeat ever more complex and dangerous cyber threats. A new era of collaboration and correlation between security tools, researchers, and organizations is required to defend modern enterprises.
Pranav Mehta is a Sr. Principal Engineer and CTO for the Intelligent Systems Group (ISG) within Intel's Intel Architecture Group. His team focuses on optimizing the Intel Architecture (IA) silicon, software, and system building blocks for the Intelligent Systems Group market segments. This involves understanding performance bottlenecks in IA CPU and system architectures for these application segments; developing solutions to remove those bottlenecks; and modeling these solutions to ensure proper ROI before incorporating them into IA platforms. He also sponsors internal and external research and technology development pipelines for ISG.
Title: Security from Client to the Cloud – An Architectural Approach for the Infrastructure
Abstract : Increasing user demand for video and rich content and subsequent desire by network operators to grow service revenue in the face of increased capital and operational expenditure to provision such demand creates significant challenges. Securing rich media traffic while mining it for valuable services increases the level of complexity and sophistication of the network infrastructure especially given the constantly evolving standards and protocols. Add to this the emerging paradigm of “Internet of Things,” where billions of context aware devices will connect to the internet infrastructure and generate traffic to achieve autonomous operations, creating a different set of security challenges for such application scenarios. This keynote will present an architectural approach that achieves optimized performance/watt efficiency along with software and performance scalability, and enables development of agile platforms that maximize the Return on Investment (ROI).
What started as a way of tutoring his cousins from a distance has turned into a world–changing project that is upending the way that people learn—and the way we currently think about education. Sal Khan, an MIT and Harvard–educated hedge fund manager, created online videos for his cousins to tutor them through math and science. With over 2,200 tutorials and over 100,000 people viewing his lessons each day, the Khan Academy was born. Harvard Business Review recently stated that Khan will successfully educate more people in math and science over the next decade than Harvard has over its entire history.
Title: Focus on Innovation: Putting Breakthrough Thinking into Action
Abstract : Sal Khan started the Khan Academy with a simple but innovative idea: to provide world-class education to anyone, anywhere. His work helped build the Academy from a small start–up to a much talked–about venture attracting the attention of major donors, including Google and the Gates Foundation. While building Khan Academy provided one set of challenges, keeping a focus on disruptively innovating the way we learn provides a whole new set of obstacles. Khan shares the keys that leaders must keep in mind when managing innovation.
Hugh Thompson is Program Committee Chairman of RSA Conference, Chief Security Strategist at People Security and a world–renowned expert on application security. He has co–authored several books on the topic and has written more than 80 academic and industrial publications on security. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and was featured in "Hacking Democracy", the Emmy–nominated HBO documentary on e–voting vulnerabilities. He is also an adjunct professor at Columbia University in New York where he teaches courses on computer security.
Dr. Frank Luntz is one of the most honored communication professionals in America today. Luntz has written, supervised and conducted more than 2,000 surveys, focus groups, ad tests and dial sessions in over two dozen countries and four continents over the past decade.
The “Instant Response” focus group technique pioneered by Luntz has been profiled on 60 Minutes, Good Morning America (Election Day 2008) and on the award-winning PBS show Frontline.
In his latest book Future Babble, Dan Gardner delves deep into psychology to explain why people continue to put so much stock in expert predictions despite the repeated—and sometimes catastrophic failure of efforts to forecast the future.
Gardner is a columnist and senior writer with the Ottawa Citizen. His journalism has won many awards, including a National Newspaper Award, a Michener Citation of Merit and Amnesty International's Media Award.
Title: The Hugh Thompson Show
Abstract : Internet security guru and bestselling author Dr. Herbert "Hugh" Thompson has seen it all –– hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the sixth year running, Thompson brings a lifetime of security expertise and a wide–eyed enthusiasm to "The Hugh Thompson Show" at this year's RSA Conference. Become part of the action as Thompson takes center stage in one of the most popular sessions of the conference, interviewing some very special guests.
As Prime Minister of Great Britain and Northern Ireland, and leader of Britain's Labour Party, Tony Blair has been a strong advocate of a values–based, activist and multilateralist foreign policy—an agenda that combined tackling terrorism in Iraq, Afghanistan, Kosovo and Sierra Leone, with action on issues like climate change, global poverty, Africa and the Middle East Peace Process. Mr. Blair is also credited for assisting the Northern Ireland Peace Process by helping to negotiate the Good Friday Agreement. Tony Blair's memoir, A Journey: My Political Life was released in September 2010 and made The New York Times Bestseller List within a week. Learn more at www.tonyblairoffice.org
Remarks from Tony Blair
The economic crisis of recent years has highlighted the consequences of globalization with dramatic effect and means we now live in an unprecedented era of low predictability. With his wealth of knowledge about global affairs, trade and international relations, Former Prime Minister Blair will share his perspective on the economic and security challenges we face today. Don't miss what promises to be a valuable and provocative session.