The Sessions Catalog below is a listing of FOCUS breakout sessions.
Click on the red arrows to view sessions within each track.
ArcSight, BDNA, Cyber-Ark, Northrop Grumman and McAfee: SIA Partner Panel - Visibility and Velocity: The Power of Multi-Vendor Integrations
Threat vectors are constantly evolving and organizations must increasingly collaborate to secure their customers. Companies that use standalone products and consoles in today’s heterogeneous IT environment face higher risk and operational costs. McAfee is leading the way not just in integrating its own portfolio, but also integrating its management platform with over 100 partners in over a dozen security markets. Learn how McAfee works with partners to lower the cost of ownership and operation through smart integrations.
Integris Credit Union: Securing the Mid-Sized Business - A View from the Financial Services Segment
Mid-sized organizations may have a smaller IT staff, but they have many security needs in common with large enterprises: protecting sensitive data, their network, website, and systems. Find out how Integris Credit Union can manage every threat vector and protect customer data in only 15 minutes a day.
McAfee: From Prevent to Detect - A Practitioner's View of Security
How does McAfee protect its own information and assets? Which of our products do we use? How do we work with partners and integrate external products? Join McAfee’s Chief Security Officer Brett Wahlin for a practitioner’s perspective on security. Hear how McAfee leverages products like McAfee ePolicy Orchestrator and McAfee Risk Advisor to keep its enterprise secure. Learn best practices and evolving strategies for preventing, detecting and responding to threats.
McAfee: Is Security Strategic to your Business? A View from the Retail Perspective
Any business that processes credit card data must secure customer information as a PCI compliance requirement. Learn how a leading retailer takes a strategic approach to security - not only efficiently safeguarding POS data, but also keeping critical data within the perimeter of their protected network, protecting mobile systems connected to public networks, and preventing accidental introduction of viruses onto endpoints.
McAfee: Proving You Are Protected
Your enterprise is protected with state-of-the-art countermeasures. You have layers and layers of defenses, from anti-virus to application whitelisting, IPS to web gateways. All are designed to stop the worst zero-day attacks the world can throw at you. But are they really working? If a critical threat emerges, are you truly protected? This session illustrates how to dissect a threat and provide overlapping, complementary layers of protection to build trust in your critical defenses.
McAfee: Security Management Platform Strategy
Hear McAfee executives discuss strategic directions for security management. Find out more about where McAfee is heading with their platform strategy, who benefits, and how you can be part of the innovations taking place.
Monetary Authority of Singapore: Cloud Computing - A Long Tale of Fluff, Froth, and Risks
The amount of hype, confusion, and mystique surrounding cloud computing has been astounding and bewildering. Through definitional waywardness, information technology itself has become “the cloud." There is nothing tangible in the cloud. Computing facilities, resources, hardware, and software are all decidedly on terra firma. In the context of mission-critical applications, until the issues concerning security, integrity, reliability, and recoverability are properly resolved, cloud computing is just an oxymoronic misnomer full of vapors, abstraction, and distraction. Find out more about cloud computing in this informative session.
NSS Labs: Discussion of 2010 Network Intrusion Prevention Test Results
Join NSS Labs as they discuss their 2010 Network Intrusion Prevention System (IPS) test findings. Using over 1000 validated exploits, NSS Labs recently evaluated the industry’s leading Network IPS vendors on security effectiveness, real-world throughput, anti-evasion and other critical factors, allowing organizations to see just how effective (or ineffective) their Network IPS solutions really are. This session includes a detailed discussion of the overwhelmingly positive test results behind the ‘recommended’ rating assigned to McAfee Network Security Platform.
State of Idaho: McAfee Vulnerability Management, ePolicy Orchestrator, and IPS - Boxed Trifecta!
Learn best practices from the Stateof Idaho's approach to managing risks and vulnerabilities, using a central point of intelligence for network and desktop threats. This presentation will not be available for viewing.
Tyco Electronics and McAfee: Scripting ePO 4.6 Operations - Connecting Security to the Rest of Your Business
Get a preview of the new ePO 4.6 scripting capability and find out how it will help you extend workflows, automate tasks, and integrate with your enterprise systems. Learn how Tyco Electronics is implementing best practices, what they have learned, and how you can benefit.
Advance Auto Parts and McAfee Labs: The Threat Landscape of the Future
Fast forward three years and you are likely to hear the following: “Web 2.0 is so...yesterday.” “Isn’t it quaint? My grandmother still types with her fingers.” “What PC?” With big changes afoot across devices, applications, and the web, what will future threats look like and what will security professionals need to do to stay ahead of the game? Join Advance Auto Parts and McAfee for their vision of the threat landscape of the future and guidance on how to start preparing for it today. This presentation will not be available for viewing.
McAfee Labs: Cyber Security - Terrorism and "Hacktivism" on the Internet
Terrorism and political activism have been realities for years. For the last several years, the buzzwords "cyber-terrorism" and "hacktivism" (politically-motivated hacking) have been continually thrown around but with little substantial meaning, facts, or supporting data. Join experts from McAfee Labs for an in-depth, frank discussion of the realities and hype surrounding both cyber-terrorism and hactivism. The truth will astonish you. This presentation will not be available for viewing.
McAfee Labs: Reputation 2.0 - Evolving Global Threat Intelligence
Everybody talks about reputation, but what are the elements that go into creating a reputation engine that leads to more accurate and efficient protection. Join McAfee for a “Reputation 2.0” review. Delivered as a cybercrime mystery where our reputation engine helps unfold the story, this session defines what we mean by reputation and discusses the elements that go into calculating an entity’s reputation with confidence. Learn how correlated threat intelligence from a broad spectrum of telemetry data combined with the latest mathematical modeling leads to truly effective reputation scoring. This presentation will not be available for viewing.
McAfee Labs: Threat Trends Across All Threat Vectors
Join McAfee Labs for a technical overview of emerging threats, including malware, web, email, network, and applications. Hear the latest on each threat type from our front-line research team, and come away with McAfee Labs' predictions for the coming year based on our comprehensive view across all threat vectors. Learn how McAfee Labs' innovations address these threats and translate into a more predictive protection stance.
Qualcomm and McAfee Labs: Managing the Next Operation Aurora
Given the fundamentally changing nature of threats evidenced by Operation Aurora, a new approach to threat protection is needed. When the next Operation Aurora hits and your company is targeted, will you be prepared? What steps will you take to stop the damage, find the attack, and remediate? Join Qualcomm and McAfee Labs for advice and best practices for managing through these kinds of attacks. This presentation will not be available for viewing.
Apollo Group and McAfee: Security in the Age of Mobility
Learn the latest trends and protection for the mobile workforce, including addressing the needs of the mobile classroom and endpoint encryption.
BAE Systems, NJVC and McAfee: Securing Government 2.0 and Beyond
Learn how to upgrade to Security 2.0 to meet the next generation of technological advancements of the government.
Catholic Healthcare West, HiTrust Alliance, and Tenet Healthcare: The Future of our Nation's Health Information Network
Learn how securing our nation’s health information is a critical part of protecting citizens’ information and improving public health.
CMS, PG&E, Savannah River Site and McAfee: Moving from Compliance to Real-Time Risk Management
Learn the security configuration management experiences of the Department of Energy, PG&E and Centers for Medicare & Medicaid Services.
SAIC, Tiger's Lair, and McAfee: Critical Infrastructure in the Age of Cyber Warfare
Learn how to prepare for the impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications, and transportation networks.
Brocade: Networking and Security as a Strategic Competitive Advantage
Do the executives of your company consider Network Security a corporate money pit or a strategic competitive advantage? We certainly believe it's the latter. Come hear executives from Brocade and McAfee discuss how the right balance of security is not only an imperative for risk reduction, but can be turned into a differentiating advantage for your company. Learn how Telcos and ISPs are shaping a new generation of “clean pipes” utilizing McAfee Network Security Technology, and understand how these initiatives can have a large impact on your business and its ability to compete.
Cargill, Oracle, Northrop Grumman and McAfee CISO Panel: Network Security's Crystal Ball - A Look into the Future
An all-star CISO panel featuring Cargill, Oracle and others and moderated by McAfee’s CIO will debate the latest trends in network security, as well as their vision for the future of networks and security. Find out how McAfee is responding to these trends and how the company continues to evolve its next generation firewall, how it plans to deliver comprehensive protection against advanced malware, and how Global Threat Intelligence will enrich network technologies even more.
Computer Network Defence and McAfee: Network Intrusion Prevention Deep Dive - Alert Tuning Best Practices and More
This is where the rubber meets the contact patch of pavement for McAfee Network Security Platform (NSP) users. See a demo of best-in-class McAfee NSP alert tuning, and learn best practices from McAfee solution architects. This session concludes with an in-depth Q&A period.
McAfee: Deep Dive - Next-Generation Firewall - Application-ID, Global Threat Intelligence, Visualization Best Practices, and More
Where there is smoke there is fire, and where there are firewall best practices, there are firewall experts. This session is designed for both existing firewall customers and for those considering our next-generation McAfee Firewall Enterprise. Hear actual user stories and learn from a panel of solution architects about application and user ID best practices, granular controls, visualization, how a global threat feed impacts firewall security and more.
McAfee: Game Changer - Evaluation Criteria for Next-Generation Network Security
Especially appropriate for: firewall professionals, network security professionals, desktop security professionals, risk and compliance professionalsIt’s a brave new world. Next generation network security is on its way and it will impact the way you do business. If you are considering, buying or interacting with next generation technologies, like next generation firewalls, this is a must attend session. Our product managers and solution architects will walk you step by step through key requirements and criteria that you should use as you are selecting and implementing these technologies, no matter the vendor you are using. The team will help separate fact from fiction and discuss the next generation features that you will use on a daily, hourly basis, vs those you probably won’t.
McAfee: Hacking Exposed Network Edition - BotNets and Beyond
Botnets continue to be utilized in nearly every type of sophisticated cyber attack. They continue to evolve and threaten trade secrets and national security alike. This session takes off the gloves and shows you in exacting detail how botnets are being used right now and how they are merging with advanced threats. Find out what your organization should be doing to see and stop botnets today and prevent them in the future.
McAfee: Hacking Exposed Network Edition - Risk Inside the Network
This session showcases hacks and social engineering techniques that are both currently in use and those just on the horizon. This presentation also highlights countermeasures against risk inside the network. Find out about scenarios and countermeasures in rapid succession including: advanced reconnaissance, identifying anomalous behavior, targeted malware, and more. This presentation will not be available for viewing.
McAfee: Three Steps to Achieve Network-wide Visibility Leveraging Threat Behavior Analysis
Global Threat Intelligence (GTI) may sound like the next Ridley Scott film, but in reality it's a pillar of McAfee network security solutions that is increasingly becoming a game changer for securing networks of all sizes and sophistication. Hear real-life GTI stories from a McAfee customer, as well as GTI-related best practices from the McAfee solution architect team. Be sure to bring your iPad to this informative session, because you’ll want to email the information you learn to your network and security operations teams directly from the show floor.
PAETEC: More with Less - Achieving Exceptional Network Security by Partnering with MSSPs/ISPs
Are you constrained by time, budget, and personnel, but you want to achieve network security excellence? Perhaps partnering with an experienced Managed Security Services Provider (MSSP) could help offload some of the burden. Hear McAfee customer and partner PAETEC and others discuss the evolution of Managed Network Security (IPS, firewalls, behavioral analysis, network access control, etc.). Find out how PAETEC has used McAfee products to help break into the MSSP world and achieve security excellence.
Riverside Health and McAfee: One Box, One Day to Achieve Control Over Network Access
McAfee has made Network Access Control (NAC) much easier and more effective than ever. Our third generation of host-based and network-based NAC solutions are as close to “plug and go” as you can get. This session features a McAfee NAC user case study, and illustrates just how easy it is to take control of network access using recommended best practices to wrangle things like guest access, network segmentation, segregation of duties, and more.
Aberdeen Group: Advantages of Hybrid Email Security
Hybrid email security combines the benefits of an in-the-cloud solution with the strengths of an on-premise appliance. Many enterprises are now filtering inbound email in the cloud while using appliances to filter sensitive outbound content and encrypt on-premise. Learn how hybrid email security can help you reduce costs and increase security. This presentation will be available in the coming weeks. Check back after November 4.
KPMG, Verizon, and McAfee: Separating Fact from Fiction - The Real Security Issues Surrounding Cloud Computing
Unlike before, we now have the opportunity to address security risks and issues before the cloud becomes ubiquitous. But with all the hype, confusion, and misinformation surrounding the cloud, it’s difficult to separate security fact from fiction. This technical panel discussion with leading cloud and security experts addresses the bona fide risks facing the cloud, and what is being done—or not yet being done—to address them as an industry.
McAfee: Best Practices - Reporting on Web Traffic in the Enterprise
Understanding web traffic is critical to creating an effective Internet use policy. Learn how reporting can turn gigabytes of data into actionable information both to enhance productivity and enforce security. Hear Web reporting experts share tips and tricks to help McAfee Web customers—from McAfee Web Gateway and McAfee SmartFilter to McAfee SaaS and McAfee SiteAdvisor—get the most out of reporting.
McAfee: Enabling Social Networking in the Enterprise - Safely and Productively
Social Networking is no longer just “social.” It has evolved to business essential and many enterprises are hesitant to open access, not knowing what problems or risks these tools will introduce to their network. Learn how to enable safe, productive access to social networking with tips from McAfee web experts. Find out more about McAfee Web Gateway rules, SmartFilter/URL filtering policy options, and reports you can use. This session is highly technical.
McAfee: Hacking Exposed - Lifecycle of a Blended Attack
While today's blended attacks use various avenues to deliver malicious payload, they often follow a similar pattern. This session analyzes the stages of a typical blended attack that hackers often follow, including 1) Reconnaissance of target web servers; 2) Mass SQL injection; 3) Mass spam campaign; 4) Zero-Day vulnerability; and 5) Transparent and non-transparent attacks. See a demo that simulates the injection of a website with malicious scripts and the resulting infection of an unprotected machine. This session also explores effective countermeasures you can deploy including McAfee Web Gateway. Access Hacking Exposed Webinar here.
McAfee: Threat Protection in Action - Web Security Layered Defense Revealed
Zero-day and targeted attacks are on the rise. How do you detect and stop these ever-increasing web threats? Join us to learn more about today’s web threats and the layered defenses required to stop them.
Qualcomm: Analyzing Web Gateway Threat Detections
Need to understand why some web traffic was blocked by McAfee Web Gateway? Hear from a Web Gateway expert from Qualcomm and learn about basic reverse engineering tools and techniques to determine why a site was blocked as malicious.
The Boeing Company: Strategic Web Protection for the Large Enterprise - Securing Both Fixed Internal Endpoints and Mobile Endpoints
With more than 150,000 users, over half of which are mobile laptops, improving web filtering and web security throughout large enterprise environments is a challenging task. Hear Boeing share their experiences securing the corporate gateway. Join other McAfee Web Gateway and McAfee Site Advisor customers for an interactive discussion on web security in the enterprise. Topics will range from authentication and environment diversity challenges to roaming users and the threats they must negotiate.
Adobe, HP, and McAfee: Data Protection Trends and Best Practices
Learn about the current data protection threat landscape. Gain actionable insights, guidance, and how-to’s on trends and best practices to keep your company's data secure—both today and in the future.
Apollo Group, FedEx, and McAfee: Endpoint Encryption Demystified
Confidential data resides on a variety of endpoint types — PCs, laptops, USB drives, shared file servers, and more. To protect data from unauthorized access, learn the why, what, and how of a layered approach to endpoint encryption. Find out how this approach can ensure that continuous security is applied to confidential data assets wherever they go.
Bank of America: Insider Threats - Using Data Loss Prevention to Raise Awareness and Reduce Risk
Like all financial institutions, Bank of America handles huge amounts of highly sensitive data in the course of a day’s business. Ensuring the safe handling of this data at all times is fundamental to the customer’s trust in the banking process, where there is zero-tolerance for any data loss. Learn how Bank of America uses McAfee Data Loss Prevention to ensure that the highest standards of data protection are consistently enforced across its entire operation.
Ciphent, Forrester Research, and McAfee: Simple Yet Effective Data Loss Prevention
Data Loss Prevention technology can provide an organization with the capacity for rapid assessment and identification of data security issues not available with any other technology. Learn from an industry expert about the steps you can take to obtain immediate value and significant security gains without impacting productivity or wasting resources.
Devon Energy and McAfee: Getting Value from Data Loss Prevention
Hear firsthand from McAfee customers how McAfee Data Loss Prevention is safeguarding business-critical information. Learn what factors guided their approach to deployment, how corporate governance is supported, and what changes and additions were made to business processes. This presentation will not be available for viewing.
Ernst & Young: Preparing for and Executing your Data Loss Prevention Deployment
Data Loss Prevention (DLP) deployment doesn't have to be complex. Using best practices to drive cost-effective, tangible progress during a DLP deployment is critical. Join us in a detailed discussion on how to plan for and execute against an effective DLP deployment from a McAfee and customer point of view.
Fallon Clinic, Gateway/Hampton Roads BankShares, and McAfee: Securing Data in 15 Minutes or Less Customer Panel
Cyberthreats are increasing, while IT budgets are steady or decreasing. Mid-sized companies want to know how to protect data without making it a full-time job. Learn how McAfee customers have used comprehensive, integrated, and centrally managed data protection solutions to manage data movement, reduce complexity, streamline operations, and increase effectiveness.
Government of South Carolina and McAfee: McAfee Total Protection for Data - Deploying More of What You Already Own
McAfee Total Protection for Data is a comprehensive solution that integrates strong full disk and file/folder encryption, authentication, data loss prevention, policy-driven security controls, and centralized management to prevent unauthorized access and transfer of your sensitive information—anywhere, anytime. Learn how to gain more value from your investment by maximizing and leveraging each element of this powerful data protection solution.
McAfee: Enabling Enterprise Mobility 2.0
There is a wave of change taking place within the enterprise. Smart mobile devices like the Apple iPhone, Android, and Apple iPad are no longer simply being used as consumer devices. The new challenge and opportunity for IT is how to enable mobile productivity while securing the different types of corporate data and applications that are accessible on these devices. Learn how McAfee can help you address the challenge of “Enterprise Mobility 2.0”.
MXI Security, RingCube, and McAfee: Empower Mobility with Desktop Virtualization on Encrypted USB Drives
With secure desktop virtualization, workers can securely carry their virtualized PC desktop on an encrypted USB storage device. Mobile workers can now access and use applications, processes, programs, and data from their PC on a small, highly mobile device connected to a nearby PC. Learn about business drivers and challenges, proven solutions, securing virtualized information, suggested next steps, and real world implementations.
Citrix: Securing the New Desktop Frontier
Find out how to combine virtualization-optimized and hypervisor-native endpoint security to shift the odds in favor of virtual desktops. What is needed to deliver an open yet secure protection framework for the next-generation desktop? This session discusses an emerging architecture for an open, standards-based, hypervisor-agnostic virtual desktop security capability set featuring open APIs for EPS ISVs that facilitate optimal EPS implementation in virtualized desktops of all kinds — hosted and mobile. Learn how open and optimized virtual desktop protection makes desktop virtualization robust, scalable, and enterprise-ready for the most demanding organizations. Hear Citrix discuss innovation in and integration of security in three key areas: 1) virtual desktop security on any device through integration with Citrix Receivero; 2) optimized virtual desktop security on any hypervisor via Citrix XenDesktopo; and 3) an industry-first: Hypervisor-native endpoint security through integration in Citrix XenClient and XenServer. Learn how this architecture gives customers the most comprehensive protection for application and desktop delivery of any solution in the industry.
McAfee ePolicy Orchestrator 4.6 Uncovered - Tips and Tricks
Learn about important tips to help you get the most out of McAfee ePolicy Orchestrator 4.6. This session explores policy optimization and scripting techniques, how to tweak performance of clients, how to create custom reports, and how to leverage automation to streamline processes and time spent on security management.
McAfee: Enable the Cloud to Secure the Endpoint
Learn how you can enable cloud computing to eliminate capital and operational costs to manage endpoints. Get a technical demonstration of how McAfee's Security-as-a-Service solutions and online console provide remote management and continuous protection to all business endpoints, regardless of location or connection to the network.
McAfee: End-Node Threat Model
With today's ever changing threat landscape, a multi-layered protection environment is more important than ever. But how do you make decisions concerning what levels of protection to deploy and where? This session explores best practices for defense in-depth protection. This presentation also examines the role of endpoint products including: McAfee Host IPS, McAfee VirusScan Enterprise, McAfee Desktop Firewall, and McAfee Application Control. Find out how you can optimize your endpoint protection environment.
McAfee: McAfee Endpoint Security - The Road Ahead
Hear the McAfee endpoint security product management team address strategic and product direction. Learn about security coverage relating to endpoints, servers, and virtual environments. This presentation will not be available for viewing.
McAfee: New Approaches to Securing Servers
Servers are a key target for hackers, so organizations need a way to ensure optimal security without impacting performance. Unfortunately, traditional server security solutions can introduce latency and hamper critical server operations. In this session, hear about McAfee Total Protection for Server, which redefines server security through the unique combination of whitelisting, change control, policy auditing, and anti-virus.
McAFee: Securing Virtualized Environments
Learn how to leverage the full power and benefits of desktop virtualization while ensuring you do not put the organization at risk. Learn about McAfee’s unified physical-virtual security management and purpose-built virtualization security tools that are optimized for Citrix and others. Hear how other organizations have securely deployed McAfee Management for Optimized Virtual Environments platform and achieved significant cost savings with higher virtual machine density on each hypervisor.
McAfee: Security Beyond Windows
Today’s security threats are designed to steal confidential data no matter where that data is stored: a Windows desktop, a Mac Book, or a Linux file server. Learn from the McAfee product team how to optimize and ensure that your security goes beyond your Windows endpoints.
Qualcomm, The Boeing Company, and McAfee: Host Intrusion Prevention - Life After Deployment and Real-World Best Practices
2010 has seen outrageous volumes of targeted malware but as budgets remain flat, companies must find cost-effective ways to increase security. McAfee Host Intrusion Prevention meets that goal and the latest release features the industry's most intelligent host firewall. Hear best practices from our panel of experts so you can maximize on its powerful zero-day protection. This presentation will not be available for viewing.
AT&T and McAfee: Database Security Best Practices
Our most valuable information is stored somewhere in a database. You know it and so do hackers. Databases are often overlooked when it comes to security, providing a rich target for those looking to monetize your information. Learn best practices for scanning databases for vulnerabilities and ensuring proper safeguards are in place to keep the information they contain from prying eyes. This presentation will not be available for viewing.
Express and McAfee: Proactive Risk Management for Decision Making
Increasingly companies are looking to risk metrics as the means to effectively manage security and enable compliance. This is especially true as IT and security operations are called upon to do more with less. This session showcases real-world use cases of how companies use risk dashboards and metrics for decision making to focus their security efforts. Learn how McAfee products work together to assess and manage risk to deliver a secure and compliant environment.
Kaiser Permanente and McAfee: Fact or Fiction - Security Metrics Boost Compliance Efforts
Metrics are those key security indicators—representing people, process, and technology—that track IT controls. Recently, there has been a lot of hype and promise about the role of metrics in the quest for IT compliance. Surveys show that security metrics are a desired functionality within IT government, risk, and compliance solutions. But are there actual cases that prove metrics have demonstrated added value? This session explores the use of security metrics in compliance efforts.
McAfee: Building a Governance, Risk, and Compliance Portal - A McAfee Implementation of Compliance and Policy Management
Are you responsible for your company’s IT compliance or security policies? If so, McAfee Global Security Services has wrestled with the same challenges you have. Come listen to them explain the journey they took that resulted in the implementation of a governance, risk, and compliance (GRC) portal that integrates Agiliance with McAfee products. Find out how compliance audits for PCI and SOX have been automated using the company-wide GRC portal. Learn best practices on how to manage corporate security policies and procedures, update them continuously with a real workflow, and map them to corporate business initiatives.
McAfee: Deep Dive into Web Application Scanning
Web applications have exploded to become the point of entry for hackers wanting to do harm. Knowing how and where web applications are vulnerable is key to sustaining goodwill and ensuring a positive experience for those who rely on those applications. Learn tips and techniques for effectively scanning web applications to keep them safe and secure. Hear about best practices from other McAfee customers for web application scanning.
McAfee: Hacking Exposed - Techniques for Using Whitelisting as an Effective Countermeasure
Learn how McAfee Application Control can be implemented as an effective countermeasure for a variety of attack vectors including those demonstrated by Stuart McClure and George Kurtz in the main Hacking Exposed session.
McAfee: Hacking Exposed - Techniques for Using Whitelisting as an Effective Countermeasure *Repeat Session*
**REPEAT SESSION** Learn how McAfee Application Control can be implemented as an effective countermeasure for a variety of attack vectors including those demonstrated by Stuart McClure and George Kurtz in the main Hacking Exposed session.
McAfee: McAfee Trust and Safety Initiative
Join McAfee leadership for an overview of the newly-launched McAfee Trust and Safety Initiative, a company-wide effort to set new standards in the areas of quality assurance, technical innovation, support and services, and community awareness. Hear from McAfee executives about the programs and activities that focus on building quality best practices into our QA processes and technical innovation, such as our new McAfee Customer Excellence Test Lab and enhancements to our industry-leading McAfee Global Threat Intelligence. Learn about the support, services, and community awareness activities that support quality in cybersecurity, such as our Cyber Crisis Working Group and Annual Cyber Crisis Drill.
McAfee: Protecting Against the New Threat Vectors - Virtualization and Mobile
Virtualization and mobile technologies have taken center stage as the attack vector of choice for today's contemporary hacker. Knowing how these technologies are vulnerable and how they impact risk is the difference between having an optimized security posture and being tomorrow's news headline. In this session, learn how to use McAfee Vulnerability Manager to scan for vulnerabilities in hypervisor and mobile devices. Find out how to leverage McAfee Risk Advisor to see how these devices impact the risk of other systems that are connected to them. This presentation will not be available for viewing.
McAfee: Tips and Tricks for Continuous Compliance
Compliance always comes with a cost, from external assessments to daily management. Learn how to reduce the daily operational burden. Hear from security assessors how having the right auditable compliance in place will actually save overall engagement cost in the future.
Tyco International and McAfee: Putting Audits on Auto-Pilot So You Can Focus on Work that Matters
Let's face it: No one is jumping up and down in anticipation of the next audit. If we could eliminate them completely, couldn't we all get back to what we're supposed to be focused on? Hear how Tyco International has been able to drastically reduce external auditing costs by automating internal audits and reporting. Learn how you can automate the process as much as Tyco has and get back to focusing on strategic projects.
Bam! A Firewall Cooking Demo
(This session repeats at 11:00 am.) Come sit in on a quick class to help you cook up the perfect policy rule in your Next Generation Firewall. Whether it’s a pinch, a dollop, a dash, or a spoonful, we’re here to help you bake more security into your network. Learn how to chop, slice, and trim out the threatening, malicious, non-productive, and rogue traffic traversing your network. 1) Ensure your employees can utilize the power of Yahoo! Messenger, but block the potential attack vector of file sharing; 2) Discover the current usage of video applications like YouTube; 3) Eliminate the liability and risk of peer-to-peer sharing, like BitTorrent; 4) Limit the usage of social media sites based on user name or user groups; 5) Block outbound connections to any country, or simply the ones you don’t conduct business with. Remember: With granular security tools at your disposal, there’s more than one way to boil an egg! We’re holding two hour-long, deep dive policy cooking classes, so step into our network kitchen for a chance to envision your network at its best. Bon Appétit! Contact Dana Torgersen to sign up. (Available to the first 50 registrants)
Bam! A Firewall Cooking Demo (Repeat Session)
(This session is also held at 10:00 am.) Come sit in on a quick class to help you cook up the perfect policy rule in your Next Generation Firewall. Whether it’s a pinch, a dollop, a dash, or a spoonful, we’re here to help you bake more security into your network. Learn how to chop, slice, and trim out the threatening, malicious, non-productive, and rogue traffic traversing your network. 1) Ensure your employees can utilize the power of Yahoo! Messenger, but block the potential attack vector of file sharing; 2) Discover the current usage of video applications like YouTube; 3) Eliminate the liability and risk of peer-to-peer sharing, like BitTorrent; 4) Limit the usage of social media sites based on user name or user groups; 5) Block outbound connections to any country, or simply the ones you don’t conduct business with. Remember: With granular security tools at your disposal, there’s more than one way to boil an egg! We’re holding two hour-long, deep dive policy cooking classes, so step into our network kitchen for a chance to envision your network at its best. Bon Appétit! Contact Dana Torgersen to sign up. (Available to the first 50 registrants)
Best Practices for a Successful McAfee Web Gateway v7 Deployment
Join McAfee experts from product development, product management, sales engineering, and services to learn about best practices for a successful McAfee Web Gateway 7 deployment. McAfee Web Gateway 7 is setting the industry standard for best-in-class web security, coupled with the deployment and policy flexibility that today’s enterprises demand to provide safe, secure access to Web 2.0 applications and websites. Find out more about the McAfee Web Gateway 7 architecture and rules engine, and learn about authentication flexibility and new options. Hear about additional deployment methods and receive best practice tips. Learn best practices for creating policy and developing rules in McAfee Web Gateway 7, and find out how to construct rules for optimum performance. Learn how to troubleshoot rules, and understand how to plan for a successful migration to v7. Register for this session.
Clean Pipes - Can your ISP Really Deliver?
In today's environment, network attacks are becoming so frequent and complex that it is virtually impossible to stay ahead of the bad guys and still support the needs of the corporation. Network providers are now embedding best-of-breed security services, including email filtering, data leakage protection, and encryption, into their network infrastructure which is often referred to as "clean pipes." Join McAfee and our global strategic partner, AT&T, for an interactive and informative session that explains how companies can migrate on-premises security solutions to a service provider. The session discusses how security controls are enabled and managed, and how to prepare for and plan your migration. Find out about the pros and cons of this approach.
Consumer / Small Business Partner Summit
This exclusive event is dedicated solely to the exchange of ideas, needs, and strategies for McAfee’s consumer and small business partners. All speakers and topics will explore how McAfee’s consumer technologies and strategic plans can help our partners achieve their business goals and keep their customers secure.
Endpoint Protection - McAfee Product Interlock and Real World Protection Discussion
(Open to all FOCUS attendees; Seating is limited.) Join members of the McAfee Product Management team and Ciphent to learn how McAfee is strategically building tight integration between previously disparate products and threat intelligence systems to deliver near real-time protection for McAfee customers.
Endpoint Protection - Tips and Tricks
(Available to all FOCUS attendees; Seating is limited) Come learn the tips, tricks, and best practices necessary to more effectively manage your McAfee endpoint security products. This session is led by members of the McAfee product management team responsible for each of our endpoint security offerings. Learn how to configure McAfee endpoint products for optimum performance and protection within your environments through an in-depth discussion on real-world use cases and deployment scenarios.
Firewall Product Management Office Hours
The Firewall Enterprise Product Management team will be holding “office hours” on Tuesday, October 12. Swing by Titian 2301 between 12:00 pm and 4:00 pm to meet with a member of the Firewall Enterprise Product Management team. Feel free to discuss product strategy and roadmaps, and get answers to your Next Generation Firewall questions. The team will be at FOCUS all week, so after Tuesday you can simply arrange a meeting with Product Management staff that fits your schedule.
Global Partner Day
(Mon. & Tue., Oct. 11-12; No fee for fully paid FOCUS 10 partner attendees) Calling all McAfee Partners around the world! Join the McAfee Executive leadership team along with the Theater Channel Leadership teams for our second annual Global Partner Day @ FOCUS 2010. Learn about how you can leverage the McAfee channel, product, marketing, regional, and segment strategy to drive business opportunities to your company. Come to two days of market updates, panel discussions, and sessions leading up to a global general session led by McAfee President and CEO Dave DeWalt and our Worldwide Channel Chief Alex Thurber.
Hacking Exposed with Stuart McClure and George Kurtz
(Open to all FOCUS attendees) Hackers have been working tirelessly to breach your digital boarders to compromise and expose your sensitive information. You only have to think back to Operation Aurora to know just how coordinated, complex, and effective attacks can be. This three-hour Hacking Exposed session with Stuart McClure and George Kurtz will demonstrate contemporary hacks being used today. By learning about the techniques hackers use, you'll be able to thwart attacks and properly defend your digital assets. Bring your laptop to participate in this interactive session. Immediately following this session will be a book signing with the co-authors. Register for this session. Throughout the remainder of FOCUS, attend Hacking Exposed Countermeasure sessions moderated by Stuart McClure that will demonstrate how countermeasures can be deployed to protect your vital digital assets from being compromised. Hacking Exposed participants can also enter to win an iPad!
McAfee "Secure in 15" Practice: An IT Workshop for Small and Mid-Sized Organizations
As part of a small IT team within a mid-sized organization, you have to juggle priorities every day. Sometimes basic security tasks fall to the bottom of your “to do” list, and to the top of the “what keeps you up at night” list. Join McAfee product experts, McAfee Labs gurus, and customers who face the same challenges but have found a way to streamline security management within their work week using the "Secure in 15" practice. This three-hour workshop will answer the following questions: 1) What are the top threats that are unique to a mid-sized organization? Let Dave Marcus, from McAfee Labs, share what his research team is seeing and which threat vectors target companies like yours. 2) How do other IT leaders prioritize security management, and what do they leave to chance? Participate in a practical discussion with McAfee customer panelists who make tradeoffs every day. Find out how they justify spending, quantify value, and make the most out of everything they do each day to secure their organization. 3) What is the McAfee “Secure in 15” practice and does it make sense for you? This is not a marketing ploy. You will leave with a custom list of tasks that take the pain out of managing security so you can focus on other business needs. Register for this session.
McAfee Data Loss Prevention Fast and Furious - A Day of Demos
(Open to all FOCUS attendees; Seating is limited) Come and see how easy it is to deploy and get immediate value from McAfee Date Loss Prevention 9 (DLP). Other DLP solutions can take months of heavy lifting with expensive consultants. McAfee has a very different approach that allows you to start seeing real benefits from the solution in minutes, not months. Join the product team to see how you can start solving your data problems today.
McAfee Labs: Malware Experience (1:00 pm - 2:30 pm)
(By appointment only; Available to 12 registrants per time slot) Back by popular demand, the McAfee Labs Malware Experience gives FOCUS attendees an opportunity to understand malware from the perspective of a cybercriminal. Join the experts from McAfee Labs and have a chance to work with a Trojan horse, command a botnet, install a rootkit, and experience first-hand how a cybercriminal would use a website to serve up malware. Join the security industry’s leading anti-malware researchers in a safe and closed environment, and partake in one of the most unique workshops available in the security industry today — only available from McAfee Labs. Register for this session. (Sessions are also held at 10:00 am - 11:30 am and 3:00 pm - 4:30 pm.)
McAfee Labs: Malware Experience (10:00 am - 11:30 am)
(By appointment only; Available to 12 registrants per time slot) Back by popular demand, the McAfee Labs Malware Experience gives FOCUS attendees an opportunity to understand malware from the perspective of a cybercriminal. Join the experts from McAfee Labs and have a chance to work with a Trojan horse, command a botnet, install a rootkit, and experience first-hand how a cybercriminal would use a website to serve up malware. Join the security industry’s leading anti-malware researchers in a safe and closed environment, and partake in one of the most unique workshops available in the security industry today — only available from McAfee Labs. Register for this session. (Sessions are also held at 1:00 pm - 2:30 pm and 3:00 pm - 4:30 pm.)
McAfee Labs: Malware Experience (3:00 pm - 4:30 pm)
(By appointment only; Available to 12 registrants per time slot) Back by popular demand, the McAfee Labs Malware Experience gives FOCUS attendees an opportunity to understand malware from the perspective of a cybercriminal. Join the experts from McAfee Labs and have a chance to work with a Trojan horse, command a botnet, install a rootkit, and experience first-hand how a cybercriminal would use a website to serve up malware. Join the security industry’s leading anti-malware researchers in a safe and closed environment, and partake in one of the most unique workshops available in the security industry today — only available from McAfee Labs. Register for this session. (Sessions are also held at 10:00 am - 11:30 am and 1:00 pm - 2:30 pm.)
The Global Threat Intelligence Difference
Created and refined by McAfee Labs, McAfee Global Threat Intelligence is the most comprehensive cloud-based threat intelligence in the market and serves as the next generation of threat protection. Mike Gallagher will explain why Global Threat Intelligence makes all the difference and describe what's next when it comes to providing the security everyone needs to stay ahead of the bad guys. Note: The video file is extremely large, so it may take several minutes to download.
The McAfee Vision for Securing the Digital Future
The digital security challenge is dynamic and ever changing. George Kurtz will give an update on the key trends that McAfee sees impacting the security world today and over the coming years. He will provide a few hands-on examples on how IT organizations can tackle challenges such as consumerization of technology, virtualization, and the cloud. Note: The video file is extremely large, so it may take several minutes to download.
The Top 10 Things You Didn't Know About McAfee ePolicy Orchestrator
Only available to first 50 registrants. IT organizations face an ever-increasing barrage of internal and external requirements, forcing organizations to take a strategic approach to security. McAfee ePolicy Orchestrator (ePO) is the foundation of the optimized security solution, providing McAfee’s centrally managed, industry-leading architecture for system, network, data, and compliance solutions. McAfee ePO eliminates boundaries between security, processes, and people to drive down the costs of managing security while also strengthening protection. This session on McAfee ePO covers the top ten things you need to know about ePO but were afraid to ask. Come learn the best tips, tricks, and traps with McAfee ePO and integration of ePO with other products in the McAfee family, such as McAfee Vulnerability Manager and McAfee Network Security Platform. Register now for this session.
Thank you for joining us
at FOCUS 10.
Knowledge: Keynotes from President Bill Clinton and McAfee CEO Dave DeWalt; 70+ informative breakout sessions.
Networking: Dedicated time with partners at the Sponsor
Expo, numerous targeted networking activities, unforgettable
special events, and much more.
View a detailed schedule of FOCUS sessions.
Copyright © 2003-2010 McAfee, Inc.
All Rights Reserved.