Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

HP Protect--Which security sessions will you attend?

‎07-24-2014 09:15 AM - edited ‎06-09-2015 10:39 AM

Indeed, Summer is coming to a close. Before you know it, September will be here, the kids will be heading back to school (pause for the voices of rejoicing parents), and the largest security conference of the year will begin: HP Protect. This year’s conference will take place September 8-11, once again, in beautiful Washington, D.C.


As in past years, HP has created an incredible lineup of speakers, technology-focused presentations, and open discussions that include topics in application security, network security, security intelligence, and more! Here’s a sampling of what is offered:

  • Threat modeling: Kill chains, diamond models, and the 50-yard line
    Some technology concepts grow slowly and steadily, while others seem to proliferate and mutate as if they feed on air. Gain a bird’s-eye view of current threat-modeling theories, hear a survey of the landscape, and learn to assess which approaches work best for your business in session BB3173.

  • Security gaps in the "neglected 90%" of your applications
    Software applications need to be delivered faster and across more platforms than ever. To build high-quality software in short order, there has been a dramatic shift from source code to component-based development, with open-source and third-party components providing the innovation and efficiency that developers need. Unfortunately, the dependence on components is growing faster than the ability to secure them. Often, shared components are not top-of-mind when considering application risk. Worse yet, components are increasingly the preferred attack surface in today’s applications. The combination of growing component usage, coupled with lack of security, requires urgent re-evaluation of traditional application security approaches and identification of practical actions for closing this security gap. So what’s the “neglected 90%,” why is it attractive to adversaries, and what can you do about it? Join session BB3168 for a discussion on the actions you can take now.

  • Security education for the new generation: A panel discussion on developing the talent pipeline
    Even with continuous advances in security technologies and solutions, people remain a critical component in creating and maintaining a strong security posture. How will we educate a new generation of computer scientists on security? This panel will discuss what is being done to create and develop security analysts to meet the evolving needs of the security discipline within enterprises and educational institutions. It will also cover the importance of integrating security concepts into non-security classes. Learn best practices for teaching security concepts to ways industry, academia, and government can collaborate most effectively in this session, PN3315.


These three are just a small sample of the many sessions we have available to from which to choose. See the session catalog here, and be sure to check back often—as new sessions are frequently added!


Once you register, you will be able to access the session scheduler and book your seat in the sessions of your choice.


We’re looking forward to seeing you at HP Protect!

0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all