NIKSUN WWSMC Princeton NJ 2014

WWSMC

The World Wide Security & Mobility Conference (WWSMC) brings together thought leaders and experts from different aspects of the security and mobile ecosystem to discuss and examine new approaches to address today's ever-growing cybersecurity threats. The conference includes global industry leaders, security and mobility experts, government officials, and academics.

World Wide Security and Mobility Conference speakers provide a "big picture" view of the cybersecurity and mobility challenges that lie ahead, while laying the groundwork for some serious problem solving -- crossing boundaries, eliminating silos, and "connecting the dots" across the cybersecurity spectrum.









WWSMC 2014 Keynote Speakers:

Dr. Parag Pruthi

Chairman & CEO, NIKSUN, bringing over twenty-five years of expertise in the network security, wireless and applications analysis industry. Dr. Pruthi is the founder of NIKSUN which he has built from a startup to a highly successful global company leading the way in the cyber security, wireless and network monitoring markets.

Learn More

 

Roger Hockenberry

Mr. Hockenberry joined the CIA first as Innovation Officer for the CTO shop, then as Chief, Cyber Solutions, for the Agency’s Cyber Solutions Center. Later, he became directorate CTO for the National Clandestine Service. Today, Mr. Hockenberry is CEO of Cognitio, a strategic consulting firm focused on go-to-market advisory services, innovation and tech infusion consulting, cloud transition, and cyber risk assessment and mitigation services.

Learn More

General James E. Cartwright

Served as Commander, U.S. Strategic Command, before being nominated and appointed as the 8th Vice Chairman of the Joint Chiefs of Staff, the nation’s second highest military officer. He became widely recognized for his technical acumen, vision of future national security concepts, and keen ability to integrate systems, organizations and people in ways that encouraged creativity and sparked innovation in the areas of strategic deterrence, nuclear proliferation, missile defense, cyber security, and adaptive acquisition processes.

Learn More





Past WWSMC Keynote Speakers:

Commissioner William Ralph Basham, Jr.

Former U.S. Commissioner of U.S. Customs & Border Protection (CBP), Director of the United States Secret Service (USSS), Department of Homeland Security (DHS) Senior Executive Presidential appointee in the Bill Clinton, George W. Bush and Barack Obama administrations.
The Honorable Michael Chertoff

Co-founder and Managing Principal of the Chertoff Group. He was also Secretary of the U.S. Department of Homeland Security from 2005 to 2009, Mr. Chertoff led the country in blocking would-be terrorists from crossing our borders or implementing their plans if they were already in the country. He also transformed FEMA into an effective organization following Hurricane Katrina.




View the 2013 Speakers | View Photos from WWSMC 2013



The Journal of Cyber Security and Mobility
Volume 3, Issue 1 - January 2014 - Updated Quarterly

The Journal of Cyber Security and Mobility aims to provide an in-depth and holistic view of security and solutions from practical to theoretical aspects. It covers topics that are equally valuable for practitioners as well as those new in the field.

This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT) and machine-to-machine technologies.

Visit riverpublishers.com to learn more.





The World Wide Security and Mobility Conference addresses these issues:

  • Cybersecurity problems are serious, and rapidly expanding in terms of sophistication, overall damage, and frequency of attack.

  • Current methods for detecting and preventing these attacks rely too heavily on signature files, blacklists, and other outdated methods that are constrained in their reliance on known problems – methods that are destined to be inadequate.

  • A new approach is needed, combining real time behavioral analysis with the ability to store incoming and outgoing packets for forensic analysis, in order to determine what happened, when it happened, where it happened, and how it happened, and quickly isolate the threat.



 



Copyright 2014 NIKSUN Incorporated. Trademarks are the property of their respective owners. All rights reserved.