12-13 December, 2013 | SF, CA

Big ideas from the intersection of
Security, Mobility and the Internet of Things.

The Amphion Forum brings together technology leaders from business, academia, and
government to discuss the enormous opportunities — and sobering threats — presented by
the runaway proliferation of mobile devices. Join us and over 300 of the best and brightest as
we explore the most compelling new ideas in mobile security to realize the potential of the
extended enterprise.


Event Details

Dates

Thursday, December 12, 2013 & Friday, December 13, 2013

Time

December 12, 8:00 AM to December 13, 5:00 PM (PST)

Location

Grand Hyatt San Francisco
345 Stockton St
San Francisco, CA 94108

ABOUT THE AMPHION FORUM

The Amphion Forum is an exclusive, interdisciplinary, and intense event which brings together thought leaders from academia, business, government and technology to discuss the threats and opportunities presented by the unprecedented proliferation of connected devices.

WHY ATTEND?

Amphion Forum is different because of its interdisciplinary nature. The "Internet of Things" consists of industries that, up until now, haven't interacted much. Grid companies didn't confer with medical equipment makers. Consumer electronics companies didn't share ideas with industrial automation companies. Only at Amphion do device security experts from different industries mix to share solutions and best practices they've discovered. We all have different pieces of the puzzle.

Current and previous participants

WHO ATTENDS?

Titles: C- Level and VP Level Executives, Directors, Managers.
Functional Group: IT or Information Security, R & D, Engineering, Product and Project Management.
Responsibilities: Security, Network, System Developer, Technical, Management, Consultant, Product and Project Management.
Primary Industry: IT and Communications, Manufacturing, Healthcare/Pharma, Utilities, Government, Consumer Electronics, Software, Medical Devices.

WHO WAS AMPHION?

In Greek mythology, Amphion was the son of Zeus & Antiope. When the city of Thebes needed protection, Amphion's brother Zethus started hauling rocks to build a wall. Amphion had a better idea. Amphion had a magical lyre, and with it he charmed the rocks and stones around him with his music, and made them "smart". Thereafter the stones did his bidding, assembling themselves into the massive fortifications that protected the kingdom and treasures of ancient Thebes.

KEYNOTE SPEAKERS

James IsaacsCEOMocana

Senthil KrishnapillaiGlobal VP, Head of Mobile Secure GroupSAP

Tony VargasTechnical Leader, EngineeringCisco

AJ ShipleySenior Director, Security SolutionsWind River

Tyler ShieldsSenior AnalystForrester



FEATURED SPEAKERS

Felix MatenaarSr. EngineerBluebox

Computer science guy who closes the gap between theory and practice. He's particularly good at rapid prototyping.

Nitesh DhanjaniIndependent Researcher

Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is the author of "Hacking: The Next Generation" (O'Reilly), "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O'Reilly) and "HackNotes: Linux and Unix Security" (Osborne McGraw-Hill). He is also a contributing author to "Hacking Exposed 4" (Osborne McGraw-Hill) and "HackNotes: Network Security". Dhanjani has been invited to talk at various information security events such as the Black Hat Briefings, RSA, Hack in the Box, Microsoft Blue Hat, and OSCON.

Michael ShaulovCEOLacoon

Adrian TurnerCo-FounderMocana

Alan PanezicVP, ProductsMocana

Matt CarrierSenior Director, Mobile Product ManagementSAP

Erik PetersonPrincipal EngineerMocana

Sanjay KalyanasundaramDirector, Developer RelationsMocana

Simon CrosbyCo-Founder & CTOBromium

Simon Crosby is Co–founder and CTO at Bromium. He was founder and CTO of XenSource prior to the acquisition of XenSource by Citrix , and then served as CTO of the Virtualization & Management Division at Citrix. Previously, Simon was a Principal Engineer at Intel where he led strategic research in distributed autonomic computing, platform security and trust. He was also the Founder of CPlane Inc., a network optimization software vendor. Prior to CPlane, Simon was a tenured faculty member at the University of Cambridge, UK, where he led research on network performance and control, and multimedia operating systems. In 2007, Simon was awarded a coveted spot as one of InfoWorld's Top 25 CTOs.

Eric DullTechnical DirectorYarcData

Eric Dull is a Technical Director at YarcData, guiding large-scale data science and cyber applications for various government and commercial customers. He is a recognized expert with demonstrated analytic successes in applied graph theory, data mining, anomaly detection, and data quality algorithms. His work includes machine learning, anomaly detection, computer network analysis, data mining, graph algorithm research and application. He has received a BA in CS from Carleton College and a MS in CS from Johns Hopkins University.

Joe WeissManaging PartnerApplied Control Solutions

Kevin WatkinsCTOAppthority

Shawn MerdingerSecurity ResearcherUniversity of Florida

Dr. S.P.T. KrishnanSecurity Researcher

Kaivan KarimiExecutive Director of Global Strategy and Business Development for the Microcontroller GroupFreescale Semiconductors

Didier SerraEVP, Global PartnershipsSecureKey Technologies Inc.

Didier has two decades of experience including semiconductor design, project management, partner solution development, along with sales, sales leadership, and marketing. Prior to joining SecureKey, Serra was general manager and executive vice president of sales for North America at INSIDE Secure, a company he had co-founded in 1995. Serra earned a technical degree in physical measures from Technical Institute St. Jerome in Marseille, France and a master's degree in engineering and microelectronics and transmission of information from the Institute of Industrial Physics and Chemical in Lyon, France.

Shuman TalukdarHead of Business DevelopmentMojave Networks

Tim SkuttSenior Solution ArchitectWind River

David SnyderPresident42 TEK Inc.

Christine SublettPresidentSublett Consulting

Ben AyedCEOSecure Access Techonologies

Donald SchleedeSenior Information Security EngineerDigi International

Giri SreenivasVP and General Manager for MobileRapid 7

Michael PoitnerGlobal Segment Marketing Director AuthenticationNXP Semiconductors

Joe SchumacherSecurity Consultant, CISSP, QSANeohapsis

Maribel LopezLopez Research

Milja GillespieDirector of Product Marketing, Mobile SecuritySAP

Dale NordenbergExecutive Director and Co-FounderMDISS

Ralph BroomPrincipal Infosec EngineerNoblis

Benjamin RobbinsPrincipalPalador

Kevin MorganCTO and VP of EngineeringArxan

Henrik StahlVP, Product ManagementOracle

Francisco CorellaCTOPomcor

Tony MagallanezSr. Solutions ArchitectMcAfee

Neil BlechermanIoT Gateway Ecosystem StrategistIntel

Schedule

Subject to change.


Wed Dec 11
DAY 0 - PM

Grand Hyatt: 36th floor

5:00 PM -
7:00 PM

Welcome Cocktails

Thu Dec 12
DAY 1 - AM

Morning Sessions: Grand Ballroom

8:00 AM -
9:00 AM

Registration & Breakfast

9:00 AM -
9:30 AM

Security And Sharing In The Internet of Things
James Isaacs, Mocana

9:30 AM -
10:00 AM

Legal Offensive Security
Tony Vargas, Cisco

10:00 AM -
10:40 PM

Shaping the Security of the Internet of Things
Moderator: Benjamin Robbins, Palador
Panel: Maribel Lopez, Lopez Research; Dale Nordenberg, MDISS; Ralph Broom, Noblis

10:40 AM -
11:00 AM

Break

11:00 AM -
11:30 AM

IOT Security: Evolution Not Revolution
AJ Shipley, Wind River

11:30 AM -
12:00 PM

Mobile Security & the Modern Multinational: What's Ahead
Senthil Krishnapillai, SAP

12:00 PM -
12:30 PM

Security In a New Paradigm
Tyler Shields, Forrester Research

12:30 PM -
2:00 PM

Lunch

Thu Dec 12
DAY 1 - PM

A - Mobile
Hack Track

B - Mobile
Developer Track

C - Mobile Meets
the IoT Track

D - Mobile
Business Track

2:00 PM -
2:45 PM

The real concerns for critical infrastructure protection – loss of control and loss of viewIn the IT environment a denial-of-service is one of the worst case scenarios. In this case, data can no longer move and the system comes to a stop. In the Industrial Control System (ICS) environment, the worst case scenario is loss of control (LOC) and/or loss of view (LOV). That is, data continues to flow and the system continues to operate but no longer as it was designed or meant to do or as the operator thinks is happening. LOV and LOC can create conditions that can lead to physical destruction of equipment and personal impacts and can occur either maliciously or unintentionally. LOV and LOC affect the end devices and are generally not issues that can addressed by the IT organization. Stuxnet exploited both LOC and LOV to damage the equipment and "blind" the operator from knowing what was actually happening. Unintentionally, a refinery had LOC with valves opening and closing. One of the causes of the 2003 North East Outage was the SCADA system software problem at First Energy that preventing alarms from displaying resulting in the operator not taking immediate actions that potentially could have prevented the cascading failures. From what I have been able to gather, there have been more than 300 actual ICS cyber incidents of which at least 25 were LOC and/or LOV incidents. Moreover, in many of these incidents the control system supplier was not able to identify the problem.Joe Weiss, Applied Control Solutions

2:45 PM -
3:00 PM

Break

3:00 PM -
3:45 PM

Rise of the Machines: Terminating Inherent Android Insecurity?Android's domination in the mobile ecosystem is just the tip of the iceberg for the platform's expansion. With embedded devices drastically outnumbering mobile devices by several orders of magnitude, they present the next frontier for Android penetration. According to EE Times, outside of custom in-house solutions, Android is the most popular operating system platform for embedded systems development. In this session, Rapid7's VP/GM of Mobile, Giri Sreenivas, will outline the embedded systems ecosystem, how Android is poised to expand, past issues Rapid7 has uncovered with various embedded systems and what the expansion of Android means for security risks. Growing computational capabilities and rapidly shrinking costs and power needs for embedded SoCs are laying the groundwork to increase demand for more capable and rapidly evolving operating systems than prior reliable yet simple operating systems. Similarly, advancements in user experiences driven by the boom of iOS and Android phones and tablets is driving the need for comparable advanced in other classes of computing that rely on embedded systems like telematics, home appliances, etc. This is creating the perfect storm for Android's rise in the embedded systems space and this will correspondingly create security challenges. The challenges discussed will include balancing acute security needs of embedded systems with the rate of evolution for the Android platform. Adding to the complexity will be the need to scale down and scale up areas of Android's capabilities to meet the needs of a broad variety of embedded systems. Rapid7's prior experiences in unearthing critical security issues in VxWorks and uPnP will be highlighted as example of risks from scaling Android's platform capabilities. The corresponding need to update deployments of Android resulting from the rapid rate of evolution will be driven not only by enhanced capabilities but security fixes. Parallels will be drawn between this situation for embedded devices and Rapid7's experiences with mobile risk management, mobile device firmware updates and endpoint patching. This will be a unique session that leverages two sets of interesting and relevant experiences: historical security issues uncovered with embedded systems and current challenges with security, platform evolution and patching in the Android ecosystem.Giri Sreenivas, Rapid7

3:45 PM -
4:15 PM

Break

4:15 PM -
5:00 PM

5:00 PM -
5:15 PM

Break

5:15 PM -
6:00 PM

6:00 PM -
7:30 PM

Cocktail Reception Sponsored by FireEye

Fri Dec 13
DAY 2

A - Mobile
Hack Track

B - Mobile
Developer Track

C - Mobile Meets
the IoT Track

D - Mobile
Business Track

8:00 AM -
9:00 AM

Continental Breakfast

9:00 AM -
9:45 AM

Practical Attacks Against Popular MDM SolutionsSpyphones are surveillance tools surreptitiously planted on a user's handheld device. While malicious mobile applications– mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings.   How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.  This talk starts out by surveying common spyphone software and their capabilities. The talk continues and presents stats on the distribution of spyphones in the wild based on real-life monitoring of mobile network traffic.  We present an overview of MDM and containerization solutions as well as their underlying security assumptions. We then demonstrate and provide a step-by-step explanation how spyphone software bypasses traditional mobile detection measures.   Through the usage of  a popular MDM solution with an email encryption offering, we show how the spyphone effectively renders the encryption features useless. This demonstration includes a spyphone software version which directly accesses the MDM's memory storage, retrieves the plain-text emails and sends them on to a remote server. For demonstration purposes, we present this attack technique both on Android and iOS-based devices.  Finally, our summary includes practical mitigation measures for organizations looking to defend against spyphone attacks.Michael Shaulov, Lacoon

Use BYOD to Increase Your Security:Moderator: David Snyder, 42 TEK Inc.
Panel: Dr Francisco Corella, Pomcor; Christine Sublett, Sublett Consulting; Ben Ayed, Secure Access Technologies Inc.

Securing the Internet of ThingsModerator: Milja Gillespie, SAP
Panel: Neil Blecherman, Intel; Tony Magallanez, McAfee; AJ Shipley, Wind River

9:45 AM -
10:00 AM

Break

10:00 AM -
10:45 AM

How graphs enable better, faster data analysisMobility and IOT have made big data into MASSIVE data, and all of that data serves as noise and inertia which makes it harder to impossible to analyze the data to find the large moments in the data (Is my supply chain operating as expected?) as well as masks the small moments in the data (Why is something connecting to that site in the middle of the night?). We need to bring new groups of analytic techniques to bear on this sea of data to enable analysts to overcome the inertia of the data and find the small, interesting signals in the midst of all of the noise. In order to answer security questions of this roiling, ever-changing, ever-growing mass of data, we need to be able to analyze it. Graphs and graph analytics are one of these groups of techniques that allow us to perform better, faster analysis. This talk will define graphs, define how to transform computer network data into a graphs, and define some core graph algorithms. I will then discuss how the graph algorithms can be applied to the problems of computer network security analysis. I'll follow by discussing how the same algorithms can be applied to various problems in the IOT / mobility space, such as identifying groups of related devices in mobile and IOT data, representing and processing geographic information, showing change over time, and identifying unusual or interesting anomalies within the data. I will then finish with a few examples of successful (and not-so-successful) applications of these graphs algorithms to real-world data and problems. This talk ties together the two main themes of the forum, Security and IOT, with a third topic, graph analysis. We've successfully used graph analysis to security and computer network data to great success, and I'd like share these successes and the extension of these successful approaches and techniques to IOT / mobility security problems.Eric Dull, YarcData

iPad Giveaway

10:45 AM -
11:00 AM

Break

11:00 AM -
11:45 AM

App Developer Community-Building Around SecuritySanjay Kalyanasundaram, Mocana

iPad Giveaway

11:45 AM

End of Conference

Register Now


Sell Tickets Online through Eventbrite