Enterprise Services
Showing results for 
Search instead for 
Do you mean 

Protecting your enterprise against “Adversaries ‘R’ Us”

Nadhan on ‎09-16-2013 11:37 AM

A federal indictment from the United States Attorney's Office charges five men with conspiring in a worldwide hacking and data breach scheme to steal more than 160 million credit card numbers (a scheme akin to a global enterprise) with a strategy to fraudulently get to the most valued asset — information. Legitimate enterprises must stay up-to-date on various concepts, techniques and tools required to proactively safeguard their enterprises against such schemes, which can be loosely labeled as “Adversaries ‘R’ Us.” The sessions at HP Protect 2013 offer a diverse array of topics to that end. Here are some of my picks in the context of this security breach — the largest such scheme ever prosecuted in the United States.

Adversary HP Protect.png


HP Protect 2013 offers nearly 150 technical sessions – 100+ hours of content with 8 hours of networking with 1,000+ security professionals and 16+ hours of one-on-one access to HP security experts. There are various tracks that span Software, Data and Network security among others. Here is a list of sessions that highlight concepts and techniques that enterprises can use to prevent and combat the next attack from “Adversaries R Us.”I have also highlighted my own thoughts on each session in italics.


1.       1447 - Software security touch point: architectural risk analysis. Beginning with the development of a forest-level view of your code, a simple three-step process can be used to find both well-understood flaws and absolutely new flaws.

There is a lot more to software security than malicious code through SQL injection and cross-site scripting.


2.       1342 - Big security arrives just in time to protect your Big Data. Financial transactions include sensitive information that must be protected under strict mandates and controls.

Securing Big Data includes securing distributed server storage with strong security and continual compliance.


3.       1343 - When network security fails: shield your sensitive information assets where they live. Network security is vital but not adequate.

Sensitive information must still be protected where it actually lives using latest storage technologies.


4.       1299 - Application visibility and control from HP TippingPoint's next-generation firewall. Live demonstration ofnext-generation firewall allows enterprises to improve visibility and control of applications running on the network.

The five defendants penetrated the computer networks to get to the credit card information.


5.       1300 - Reverse engineering exploits. DV Labs team reverse engineers exploits to get in front of upcoming threats and vulnerabilities.

If the first exploit has already happened, use that incident to learn more and get ahead of the game.


Have you taken a look at the vast array of sessions at HP Discover 2013? Are there other sessions that would apply better to your environment from an enterprise security perspective? Please let me know.


“Adversaries R Us” representatives do not call ahead to get an appointment before setting foot in your enterprise.


Team up with HP Technology Expert, E.G.Nadhan


Connect with Nadhan on: Twitter, Facebook, Linkedin and Journey Blog.




0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all