Why You Should Attend HPE Protect 2016
HPE Protect takes place September 13 – 16 in National Harbor, MD. As HPE’s largest security event of the year, it will have over 2,000 security professionals attending. The conference will explore approaches to security and risk management, while highlighting the future of cybersecurity at HPE.
Benefits of attending:
While attending HPE Protect, Data Security users will gain numerous benefits including:
Hearing from industry experts on how to balance security and risk in protecting sensitive data.
- Learning new technologies in a number of sessions, as well as learning how to integrate data protection into existing systems.
- Attend discussions with e-commerce providers about data security.
- Experience data-centric security firsthand.
Alex Tapscott, co-author of Blockchain Revolution will headline the speaking sessions at the conference. Tapscott believes that the emerging blockchain platform will bring about significant opportunities for enterprises. His keynote will focus on the expansion and impact of blockchain on the security industry.
Blockchain also gets attention from Data Security with a special session titled, Blockchain mechanics. The session will be given by HPE Distinguished Technologist Terence Spies, once for the general session, and once for the Public Sector.
Data Security Speaking Sessions
HPE Protect will also feature a number of Data Security speaking sessions, a technical turbo talk, and a customer panel. The highlight will be a Track Keynote from Vice President & General Manager of HPE Security – Data Security, Albert Biketi. See the session catalog to view all the Data Security sessions, and every session offered at HPE Protect.
Let the journey begin – building a modern data security program
Speaker: Albert Biketi
Session ID: TK10341
Time & location: Thursday, September 15 – 11:15 am
To build a data security program, organizations need to identify sensitive data, where it flows and who has appropriate access to it. This sets the table for a comprehensive, well-designed, modern data security program. Hear what our customers learned implementing high-performance encryption, tokenization and key management techniques for use with production data, payments, big data and more that “de-identify” data, rendering it useless to attackers while maintaining referential integrity for data processes.
Data Security Balance point – innovation, security, risk
Speakers: Kevin Goode, Robert Loeb, Bruno Motta Rego, Albert Biketi
Session ID: PNL10207
Time & location: Wednesday, September 14 – 2:30 pm
Competition and the pace of innovation propel your enterprise into cutting-edge IT in the race to develop new products. But enabling the business while balancing risk with security can be a major problem. Will the need to address data privacy hold you back? Can you risk new, expanded or unknown cyber-security gaps? This panel of enterprise practitioners speaks from deep experience successfully launching new business initiatives using Apache Hadoop, connected devices, Big Data and ecommerce. Gain guidance on finding the balance point.
Marketing data on the move – making sure your fist-party data is safe
Speakers: Don Vilen, IIS and Joel Rubinson, Rubinson Partners, Inc.
Session ID: B10042
Time & location: Friday, September 16 – 9:00 a.m.
Your first-party consumer data is constantly moving, being matched to other databases to be used by you and your partners for advertising targeting and analytics. On-premise data has its security challenges, but with the world moving to the cloud, there are even more challenges to keeping your data safe. We discuss several issues with safeguarding PII and other marketing data, and many of the security processes needed in a constantly evolving data-driven marketing age. Many of these issues apply to other areas where you move or analyze data.
Speaker: Terence Spies
Session ID: B10273
Time & location: Wednesday, September 14 – 1:15 p.m.
Bitcoin and blockchain architectures promise a new, disruptive applications in the financial industry and beyond. While there is no shortage of breathless claims about blockchain, making strategic decisions about its impact requires understanding what it can and cannot do at a technical level. Hear the nuts and bolts of these systems and separate fact from hype.
Encryption and public policy – protecting data and sovereignty
Speaker: Terence Spies and Matt Green, Johns Hopkins Information Security Institute
Session ID: B10291
Time & location: Thursday, September 15 – 4:15 p.m.
To address the huge amounts of data breaches, enterprises have begun to use encryption to protect data and to reduce liability. However, this has raised many questions including government concerns about law enforcement access to encrypted customer data; legal liability; and new challenges about data sovereignty across jurisdictions when using cloud services. This talk will provide an overview of the debate around the deployment of encryption, and will present several case studies to illustrate how these questions can affect your business.
A demo of HPE SecureData for end-to-end encryption and policy control
Speaker: Dan Nall and Robert Moore
Session ID: B10423
Time & location: Thursday, September 15 – 3:00 p.m.
The US government has a mandate to encrypt or otherwise make indecipherable all sensitive or mission-critical information by December 2016. The quickest and most effective way to do this is using a NIST-approved encryption platform that protects data end-to-end, from mobile to cloud. Learn about format-preserving encryption and see a demo of how to integrate the most robust encryption into your applications without having to modify your database architecture, modify downstream systems or manually manage encryption keys.
Planning for post-quantum cryptography
Speaker: Terence Spies
Session ID: B9750
Time & location: Thursday, September 15 – 10:00 a.m. and 1:45 p.m.
The NSA, NIST and other government agencies have signaled that organizations using cryptography to protect data should start planning the transition to algorithms that are resistant to attack by quantum computers. This session will frame how quantum computers accelerate cryptographic attacks and what algorithms are being contemplated in the technical community to resist these future threats. We’ll also discuss how to prepare for these upcoming changes.
Speaker: Luther Martin
Session ID: B9843
Time & location: Thursday, September 15 – 10:00 a.m.
Encryption can change the format of data, which can cause problems in legacy IT environments where some applications can only handle data that has a particular format. An approach that works well in many cases is to adapt the data to the environment instead of adapting the environment to the data by implementing encryption in such a way that encrypted data has the same format as the unencrypted data. The FF1 encryption algorithm, as recently standardized by NIST and implemented in HPE SecureData, makes doing this easy.
Adding trust to your apps – with a modern code signing infrastructure
Speaker: Chris Griffith and Matt Landrock, Cryptomathic
Session ID: B9928
Time & location: Wednesday, September 14 – 3:45 p.m.
With enterprise application delivery increasingly agile, dynamic and distributed among mobile, cloud and IoT environments, it is critical to ensure that apps are not only secure, but also execute from a solid root of trust. Cryptographic code signing is a best practice to ensure software authenticity and integrity; however, it has been complex to implement. This session will introduce a modern crypto signing architecture, backed by hardware-level assurance, enabling enterprise code signing via a highly secure, scalable and manageable framework.
Integrating data protection into legacy systems – methods and practices
Speaker: Jason Paul Kazarian
Session ID: TT9784
Time & location: Wednesday, September 14 – 2:00 p.m.
Legacy systems are critical to global enterprises. Recent cyber-attacks suggest these systems are under-protected, especially considering the assets at stake. Mitigating threats via point solutions has been minimally successful at best, completely ineffective at worst. The NIST data protection standard provides publicly auditable data protection algorithms that honor an application’s underlying data structure and storage semantics. Using data protection at the application level allows operations to continue while protecting an organization from the consequences of a data breach. Explore best practices and the application of data protection in a typical legacy system.
Achieve data sovereignty via enterprise-managed encryption keys
Speaker: Nathan Turajski and Roshan Kumar
Session ID: B10428
Time & location: Thursday, September 15 – 11:15 a.m.
Maintaining privacy over data-at-rest is a critical part of an organization’s data security strategy. While businesses have embraced the cloud for many IT needs, a high level of security assurance is expected for privacy of backup data in these higher risk, co-located environments. Learn how HPE Connected MX and HPE Enterprise Secure Key Manager offer high assurance security for endpoint devices by protecting the keys used for encrypting backup data.
Don’t forget to stop by the booth to visit the Data Security team. While there, check out our demos for payments, compliance and email as well as data de-identification and privacy.
Follow HPE Security – Data Security on Twitter at @hpe_voltage and Tweet us with #HPEProtect.