Consider Adam Meyers the Tim Taylor of SC World Congress.
Last year, Meyers, director of cybersecurity intelligence at SRA International, an IT services and solutions consulting firm, hosted one of the conference's most popular talks. It focused on the different tools organizations can use to reverse engineer malware and provide other computer defenses.
"Not everyone's got a giant budget for security tools," Meyers told SCMagazineUS.com. "Part of the presentation was aimed at how we help level the playing field and give people options for what their price range is."
His presentation this year, titled "Tool time revisited," scheduled for 3:30 to 4:20 p.m. on Nov. 11, will address the same idea of exposing attendees to technologies that they may not have otherwise known about, but with a slight twist.
"I'm looking to take what we did last year and update it with some newer tools that I've found over the last year, and change focus from reverse engineering to more proactive intelligence around network issues," Meyers said. "People tend to rely on the same [tool] vendors for everything. Fortunately, I'm able to go out and meet a wide variety of vendors with different solutions and compare them to each other."
Meyers said his talk is especially critical considering this year's malware outbreaks, which began with the Google Aurora attacks and is ending with the Stuxnet worm, which targets critical infrastructure systems.
No longer can organizations solely rely on traditional defenses, he said. Now, more than ever, security executives must arm their staff with lesser-known tools to fight off emerging, sophisticated threats.
"People who tend to attend SC World Congress are the high-level people doing the decision-making," Meyers said. "Part of my secret, covert goal is to put the tools that the technical guys definitely want into these guys' ears, so they think about it."