PHD 2011 Business Section Topics

Compliance: Help or Threat to Your Business?

Moderator: Alexey Lukatskiy, Business Development Manager, Cisco Systems

Topics: Information security regulation in Russia has already exceeded all conceivable and inconceivable bounds. This subject has become proverbial for many companies. The federal law 152, the law on state services, the law on national payment system, PCI DSS, new orders by FSB (Federal Security Service of Russia), FSO (Federal Protective Service) and Ministry of Communications… All these rules gather like a snowball and fall to unsuspecting customers. What standard acts have just been adopted and what acts will be adopted in the near future? What consequences will it entail for Russian companies? How can one optimize efforts to adjust an organization in accordance with the mentioned regulatory system? All these questions will be discussed by the leading experts.

Cyberwar: Who will Win?

Moderator: Yuri Maximov, President of Positive Technologies

The cyberwar has already come from fantastic novels into the real world. What can we expect today and tomorrow? How will cyberwars develop? What the cyber weapon presents, is it just a storm in social networks or a weapon of mass destruction? What are the cyber military capabilities of various countries? Who will win?

From Cyber Reality into the Physical World: SCADA Protection

Moderator: Boris Simis, Business Development Director, Positive Technologies

After the Stuxnet worm appeared and widely distributed, the security of process control and SCADA systems has become the favourite bogeyman story for journalists and a nightmare for everyone who works in the industry or national security.

What is the security level of process control systems (PCSs) in Russia and worldwide? Protection of PCSs, is it a tribute to fashion or an urgent need? How difficult is it to detect a SCADA system vulnerability? Which attack vectors are the most dangerous for these systems? Regulation in the field of PCS security. A myth or reality?

VOIP - Reduce Your Expenses, Increase Your Income! Or Vice Versa?

Moderator: Sergey Sazhin, Head of Information Security Development Service, VimpelCom Ltd.

Integrated services by telecom operators and Unified Communications technology promise a quick payback and great convenience. However, it was discovered from practice that VOIP and IPPBX services can cause many problems, first of all relating to information security and fraud. What information security issues can arise for a company if Unified Communications are used? VOIP/PBX/MGW broken in 60 seconds - is it possible? Effective methods and practicalities of Unified Communications security will be discussed.

Security in the Clouds

Moderator: Yevgeny Klimov, RISSPA, CSA Russian Chapter

Advantages offered by cloud and virtual infrastructures are obvious, and so are the additional risks. What are the problems relating to virtualization infrastructure security? What is more important, economy or security? What limitations do the tools of virtual infrastructure protection have? Breaking a cloud and breaking from a cloud.

Remote Banking Systems Security

Moderator: Artyom Mikhaylovich Sytchev, Deputy Director of the Security Department, Head of Information Security Management, OJSC Russian Argicultural Bank

Within the scope of the Remote Banking section, the problems of Remote Banking Systems (RBSs) security will be discussed. We will try to answer the eternal questions "who is guilty?" and "what is to be done?" to prevent the events of stealing money from the accounts of commercial bank clients, which has recently become rather frequent. Does everything depend on banks? What is the importance of cryptomaterial for RBSs? Will the ubiquity of functional secure key media (eTokens etc.) improve the situation in the RBS field? How to organize cooperation with law-enforcement agencies? This is the list of the main issues that are planning to be discussed at the section. Representatives of information security departments from the principal banks will make the basic reports.

Cybercrimes: Yesterday, Today, and Tomorrow

Moderator: Alexander Gostev, Chief Antivirus Expert, Kaspersky Lab

Virus industry trends. Corporate espionage: fantasy or business? How much does it cost to hack your company? Hackers: fun or profit?

Access Denied

Moderator: Mikhail Savelyev, Head of the Kaspersky DDoS Prevention project, Kaspersky Lab

Denial of Service: is it a weapon of mass destruction? Is it worth powder and shot? How much does DDoS protection cost? Investigation of DDoS attacks. Theory and experience.

Why did WikiLeaks Arise?

Moderator: Andrey Valeryevich Fedichev, FSTEC of Russia (Federal Service for Technical and Export Control)

WikiLeaks publications caused quite a stir in the society. However, past experience suggests, that a leak of sensitive information on the Internet is not something out of line. Bulk of interesting information is available on open (or relatively open) access. Often, it is not due to the activity of mysterious hackers, but the result of a total change of technologies and society, mistakes of IT systems maintenance, carelessness of personnel, dereliction of duties. What is the scope of the problem? What are possible solutions?

Information Society: Prospects and Challenges

Moderator: Ilya Trifalenkov, Deputy Head of the Information Security Department, the Information Society project, Rostelecom OJSC

Modern society is bound up with information technologies. Rapid growth of the latter for the past few years has lead to the fact that many urgent problems can be solved on the Internet.

This trend did not skirt the public sector. In 2009, the President of the Russian Federation Dmitry Medvedev voiced the long-term strategy for the informatization of the society, which implied the realization of an extensive program on turning public services into electronic format. As practice has shown, people need such actions, and for the past year we have witnessed active growth of Internet interaction between the citizens and the state.

__________________________________ __________________________________ __________________________________ __________________________________
Copyright © 2011
Positive Technologies