Agenda

  • Wed 17th Oct 08:30 - 10:00
  • HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization Add to Schedule Kevin Mitnick  |   Mitnick Security  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 08:30 to 10:00

    HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization

    It takes one to know one.

    People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

    Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure.  Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. 

    Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

    Speaker

    Photo Speaker Name Profile
    Kevin Mitnick Kevin Mitnick View Profile
  • Wed 17th Oct 10:10 - 10:40
  • A New Approach to Managing Digital Risk Add to Schedule Rohit Ghai  |   RSA (a Dell Technologies Business)  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 10:10 to 10:40

    A New Approach to Managing Digital Risk

    Technology continues to propel entire industries through digital transformations, escalating digital risk, and prompting questions from the C-suite, the BOD, regulators and policy makers. Cyber-risk is the largest facet of digital risk we face going forward. Since cybersecurity is now squarely a business issue; it needs to be managed as such. A business-driven approach to managing digital risk entails taking a risk orientation to designing and operating your security operations. This approach is the only way to ensure that technologies like machine learning and data continue to propel us to our digital future.
     

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses Add to Schedule Sam Elliott  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 10:10 to 10:40

    Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses

    Today's world of cyber warfare is one of continuous zero-day attacks, targeted phishing scams and malicious insiders. Anyone trying to deal with these threats manually has already lost the game. You can't stop cyberattacks from occurring. But, you can limit the damage when these inevitable attacks strike. When you're under attack, blocking intrusions with automated identity management makes a huge difference in keeping your organization's name out of the data breach headlines. Based on my years of experience I'll cover how to redesign and automate your identity management (especially privileged identities) to achieve acceptable losses, even while under constant cyberattack.

    Speaker

    Photo Speaker Name Profile
    Sam Elliott Sam Elliott View Profile
  • How integrating Coverity Static Analysis IDE empowers developers and helps strengthen DevSecOps teams Add to Schedule Tim Mackey  |   Black Duck by Synopsys  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 10:10 to 10:40

    How integrating Coverity Static Analysis IDE empowers developers and helps strengthen DevSecOps teams

    Software development teams use DevOps to accelerate software delivery. A common misconception is that security can slow this process—which is no longer the case. By integrating and automating security solutions early in the DevOps pipeline, teams can scan every build for security weaknesses and vulnerabilities without affecting velocity. This DevSecOps practice stands in sharp contrast to traditional software security methods where dynamic application security testing takes place later in the SDLC. Easily integrated within IDEs, Coverity provides accurate and comprehensive static analysis that finds critical security weaknesses in code with efficiency and agility. This presentation will illustrate just how that works to support DevSecOps.

    Speaker

    Photo Speaker Name Profile
    Tim Mackey Tim Mackey View Profile
  • Wed 17th Oct 10:30 - 11:20
  • How to Build Effective Defensive Strategies Against Privileged Attacks Add to Schedule Rod Simmons  |   BeyondTrust   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 10:30 to 11:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them

    Speaker

    Photo Speaker Name Profile
    Rod Simmons Rod Simmons View Profile
  • Wed 17th Oct 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Add to Schedule Sean Blenkhorn  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
  • IoT: Internet of Things, or Internet of Threats? Add to Schedule Paul Willard  |   Cisco Security   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 10:50 to 11:20

    IoT: Internet of Things, or Internet of Threats?

    With the global IoT opportunity predicted to reach nearly $9T by 2020, organizations are under extreme pressure to evaluate IoT and digitation initiatives that can deliver unprecedented customer outcomes and efficiencies.  Move too slow, and be left behind.  Move too fast, neglecting the unique cybersecurity risks IoT devices introduce, and be hit with a crippling security breach.  In this session, Paul will explore how the exponential increase in cyberattacks on IoT and digital assets is forcing the entire cybersecurity industry to evolve, and how this evolution will reshape the way organizations defend against large-scale, coordinated attacks on digital and IoT assets.

    Speaker

    Photo Speaker Name Profile
    Paul Willard Paul Willard View Profile
  • Wed 17th Oct 11:30 - 12:00
  • AI-Based Autonomous Response: Are Humans Ready? Add to Schedule Nicole Eagan  |   Darktrace  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 11:30 to 12:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Brought to you by Mimecast Add to Schedule

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 11:30 to 12:00

  • Adopting an Automation-First Strategy for Identity and Access Management Add to Schedule Bruce Macdonald  |   Hitachi ID   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 11:30 to 12:00

    Adopting an Automation-First Strategy for Identity and Access Management

    Process automation within an IAM environment can be challenging. Many systems that excel at governance and certification tasks are simply not well suited for automation. Many organizations believe their requirements are simply too unique to be automated and/or their existing home grown solutions will suffice. A thorough data cleanup is often advocated for before automation technologies are deployed however this is the wrong approach as such technologies can actually help with the data cleansing effort. In this session we will explore many aspects of IAM automation and deliver concrete recommendations towards achieving the goal of identity management automation.

    Speaker

    Photo Speaker Name Profile
    Bruce Macdonald Bruce Macdonald View Profile
  • Brought to you by Twistlock Add to Schedule

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 11:30 to 12:00

  • Putting the Human Back Into Network Security Add to Schedule Michael Knapp  |   Forcepoint   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 11:30 to 12:10

    Putting the Human Back Into Network Security

    Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tablets, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.

    Speaker

    Photo Speaker Name Profile
    Michael Knapp Michael Knapp View Profile
  • Wed 17th Oct 01:00 - 01:30
  • Cloud Security: Adopt Zero Trust by Putting Asset-Level Safeguards in Place Add to Schedule John Summers   |   Akamai   |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 01:00 to 01:30

    Cloud Security: Adopt Zero Trust by Putting Asset-Level Safeguards in Place

    Information systems security is intended to protect assets that matter – infrastructure, data, applications, and users. But network perimeters are permeable, and assets are increasingly distributed in the cloud. Today's challenge is to implement security policies and controls that are effective, consistent, and portable to wherever the assets are. John Summers will discuss how to take security to the next level with zero trust approaches that raise visibility, protect key assets, simplify network and infrastructure management, and enable fast-paced digital business.

    Speaker

    Photo Speaker Name Profile
    John Summers John Summers View Profile
  • Defense in depth: Achieving Detection and Response Everywhere Add to Schedule David Gold  |   ProtectWise   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 01:00 to 01:30

    Defense in depth: Achieving Detection and Response Everywhere

    Past and current breaches have proven that a prevention-only strategy can’t ensure 100% protection. EDR has changed the game on the endpoint to provide complete visibility and forensics to find threats sooner, investigate their impact, and prevent them from happening again. Network Detection and Response (NDR) allows organizations to benefit from full packet forensics, threat detection and incident response workflows across the entire network - from traditional enterprise, to cloud, to industrial environments. By bringing together EDR and NDR we can enable the next generation of SOC analysts to gain complete visibility, detection and response from endpoint to network.

    Speaker

    Photo Speaker Name Profile
    David Gold David Gold View Profile
  • Develop an Overarching Holistic Risk Management Program: Data Privacy, Data Security and Cyber Insurance Add to Schedule Greg Sparrow  |   CompliancePoint  |   IoT Security

    IoT Security Theatre

    Wed 17th Oct 01:00 to 01:30

  • A Token Walks Into a SPA... Add to Schedule Ado Kukic  |   Auth0  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 01:00 to 01:30

    A Token Walks Into a SPA...

    Between Angular, React, & Vue it can be hard NOT to build SPAs these days. But having to deal with cookies, tokens, auth, & resource access - you may even feel like you need a second page (gasp!) for security! Fear not, for the technology to create truly secure SPAs is there and I’ll show you how.

    Speaker

    Photo Speaker Name Profile
    Ado Kukic Ado Kukic View Profile
  • The Cyber Hack with SentinelOne Add to Schedule Ryan Merrick  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 01:00 to 01:50

    The Cyber Hack with SentinelOne

    Ransomware attacks continue to be popular among cyber criminals looking to compromise unsuspecting corporate networks. And it all happens at the endpoint. In a recent Enterprise Risk Index, fileless attacks rose 94% in the first half of the year, including exponential growth in PowerShell attacks.
    Learn how to defend your businesses where traditional AVs could not. SentinelOne's next-generation AV behavioral engines will help you understand and respond if there is ever a threat.

    Speaker

    Photo Speaker Name Profile
    Ryan Merrick Ryan Merrick View Profile
  • Wed 17th Oct 01:40 - 02:10
  • Brain Wars: Simple Cyber Terrorism Life Hacks for Everyday People Add to Schedule Diana Candela  |   Protiviti  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 01:40 to 02:10

    Brain Wars: Simple Cyber Terrorism Life Hacks for Everyday People

    Explicitly designing cyberterrorist attacks that bypass physical harm to individuals and focus on their psychological aspects are here to stay. These types of cyberattacks are deemed as less harmful types of cyberattacks or cybercrime as opposed to non-lethal cyberterrorism. The perception of disruption associated with these types of cyberattacks is much lower than cyberterrorism attacks resulting in actual physical damage. Exploiting human vulnerabilities is easier than exploiting system vulnerabilities and the potential outcome of such cyberattacks is grossly underestimated. Humans are the critical infrastructure of society and the effects of phycological disruption can outweigh the effects of physical harm.

    Speaker

    Photo Speaker Name Profile
    Diana Candela Diana Candela View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Austin Eppstein  |   Darktrace   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 01:40 to 02:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

    Speaker

    Photo Speaker Name Profile
    Austin Eppstein Austin Eppstein View Profile
  • The GDPR Effect on North America and the Land Mines Currently Being Planted Add to Schedule Tony Perri  |   Perri Marketing, Inc.  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 01:40 to 02:10

    The GDPR Effect on North America and the Land Mines Currently Being Planted

    The current national data privacy law was enacted in 1974, long before we had the world wide web. The current General Data Protection Regulation from the European Union is an update to the Data Protection Directive of 1995, another statute made obsolete by the explosion of accessible data from the Internet.

    The GDPR is a monumental piece of legislation out of the EU that is creating a domino effect of state’s legislation in the US. This session will review the GDPR’s affect here in the U.S., what’s on the radar for U.S. legislation and a use case of a breach that spans pre- and post-GDPR, where the fine could be $640k or $22 million. With this new E.U. legislation, data security compliance and auditing will never be the same.

    Speaker

    Photo Speaker Name Profile
    Tony Perri Tony Perri View Profile
  • Wed 17th Oct 02:20 - 02:50
  • Shifting the Human Factors Paradigm in Cybersecurity Add to Schedule Dr. Calvin Nobles  |     |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 02:20 to 02:50

    Shifting the Human Factors Paradigm in Cybersecurity

    This presentation emphasizes the need to break the inertia regarding human factors in cybersecurity by leveraging organizational platforms to educate and address human-centric problems in cybersecurity. Shifting the paradigm on human factors in cybersecurity centers on developing an executive-led platform to address (a) human-centered cybersecurity approaches, (b) the need for human factors assessments, (c) increased appreciation for humans factors as a science, and (d) human derailments in information security. Cybersecurity leaders and practitioners continue to admire the human factors problem without exploring the root-level causes of human-enabled mistakes. One way to address human factors is through an organizational platform. 

    Speaker

    Photo Speaker Name Profile
    Dr. Calvin Nobles Dr. Calvin Nobles View Profile
  • Make Compliance Management a Competitive Advantage Add to Schedule Ryan Spelman  |   Center for Internet Security  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 02:20 to 02:50

    Make Compliance Management a Competitive Advantage

    Often we fall back on examples of penalties to explain our security justifications. But what if we could talk about it as a market mover? What if we could explain how customers are looking for security, and that if we show them that we may get their business? Equally, when we tackle a compliance requirement, we fail to see how it touches on others. By using a central guidance document such as the free critical security controls, we can both see how the work we are doing is improving our security posture and also how it can satisfy other requirements. 

    Speaker

    Photo Speaker Name Profile
    Ryan Spelman Ryan Spelman View Profile
  • Left of Boom Add to Schedule Brian Contos   |   Verodin  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 02:20 to 02:50

    Left of Boom

    The term “Left of Boom” was made popular in 2007 in reference to the U.S. military combating improvised explosive devices (IEDs) used by insurgents in Afghanistan and Iraq. The U.S. military spent billions of dollars developing technology and tactics to prevent and detect IEDs before detonation, with a goal of disrupting the bomb chain. This is an analog to cybersecurity as we strive to increase the incident prevention capabilities of our security tools and where we can’t prevent attacks, augment prevention with incident detection and response tools. This presentation is all about getting cybersecurity evidence to know, empirically, what’s working, what’s not, how to fix it, how to keep it working, and most importantly, stay left of boom.

    Speaker

    Photo Speaker Name Profile
    Brian Contos Brian Contos View Profile
  • Serverless security: the untold story. Add to Schedule Tal Melamed   |   Protego Labs  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 02:20 to 02:50

    Serverless security: the untold story.

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security challenges. Some of these security threats are equal to those we know from traditional application development and some take a new form. For better and for worse.

    In this talk I will describe how these threats are different from the traditional attacks we all know so well, aiming at shedding light upon the security risks under this rather new technology.

    Speaker

    Photo Speaker Name Profile
    Tal Melamed Tal Melamed View Profile
  • Wed 17th Oct 03:00 - 03:50
  • Providing Access as well as Protection in a Hyper-Connected World Add to Schedule Ryan Loy  |   EBSCO  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 03:00 to 03:50

    Providing Access as well as Protection in a Hyper-Connected World

    As employees and customers demand improved connectivity, mobile solutions and instant access to information, IT leaders face the issue of privacy in an increasingly connected world. How should CIOs think differently to better protect valuable corporate assets while providing access and service? In this session, Ryan Loy surveys the current digital landscape, offering an overview of behavioral risks to security, mitigation strategies and key questions to benchmark yourself and your organization. Learn how to break away from traditional methods and embrace the societal shift toward a digital generation.

    Speaker

    Photo Speaker Name Profile
    Ryan Loy Ryan Loy View Profile
  • IoT Cybersecurity: Litigation Risks and Realities Add to Schedule IJay Palansky  |   Armstrong Teasdale, LLP  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 03:00 to 03:50

    IoT Cybersecurity: Litigation Risks and Realities

     A tidal wave of litigation over defective IoT cybersecurity is just over the horizon. Everyone involved in any aspect of the supply chain for a defective IoT device is potentially in the cross-hairs. Drawing on his experience as lead counsel in the federal class action lawsuit stemming from Charlie Miller and Chris Valasek’s famous hack of a Jeep Grand Cherokee in 2015, the presentation will explore the legal rules, litigation realities, and exceptional risks associated with IoT litigation, and will provide concrete guidance regarding steps organizations can take now to minimize legal exposure, and what organizations should do if they’re sued.

    Speaker

    Photo Speaker Name Profile
    IJay Palansky IJay Palansky View Profile
  • Thu 18th Oct 08:30 - 09:20
  • What happened Atlanta? Add to Schedule Elizabeth Wharton  |   Prevailion, Inc.   |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 08:30 to 09:20

    Speaker

    Photo Speaker Name Profile
    Elizabeth Wharton Elizabeth Wharton View Profile
  • Thu 18th Oct 09:30 - 10:00
  • The Most Stressful CIO job in the World – being CIO of the Clinton White House Add to Schedule Mark Gelhardt  |   Gelhardt Group, LLC   |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 09:30 to 10:00

    The Most Stressful CIO job in the World – being CIO of the Clinton White House

    Colonel Mark Gelhardt is the Former CIO of The White House during President Clinton's administration. He will talk about what it takes to handle the most stressful CIO job in the world. Working so closely with President Clinton, Colonel Gelhardt has a rare insight to the inner working of the White House, and the outstanding military support provided to the Commander-in-Chief. He has some great stories that he will share from his book “My Time at the Clinton White House”.

    Speaker

    Photo Speaker Name Profile
    Mark Gelhardt Mark Gelhardt View Profile
  • How to Protect Next Generation Technology from Modern Threats Add to Schedule Rod Simmons  |   BeyondTrust   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Rod Simmons Rod Simmons View Profile
  • The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense Add to Schedule Andrew Tsonchev  |   Darktrace   |   IoT Security

    IoT Security Theatre

    Thu 18th Oct 09:30 to 10:00

    The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense

    There is an urgent need for a new approach to combat the next generation of cyber-threats, across both OT and IT environments. While total prevention of compromise is untenable, utilizing automated self-learning technologies to detect and respond to emerging threats within a network is an achievable cyber security goal, irrespective of whether the suspicious behavior originated on the corporate network or ICS.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Microsoft Office 365 – Make it a Secure Journey for Digital Transformation Add to Schedule Todd Bursch  |   Forcepoint   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 18th Oct 09:30 to 10:00

    Microsoft Office 365 – Make it a Secure Journey for Digital Transformation

    Office 365 adoption is continuing at a strong pace, and is often the corner stone for a company’s digital transformation journey.  The decision to implement Office 365 is often a top-down decision, resulting in lack of awareness in terms of security and capabilities when the platform is initially rolled out.  However, this rapid change puts pressure on departments to adapt, exposes weaknesses, and creates new security challenges as IT remodels its security posture to protect the new ecosystem.

    This session will provide insights into how only Forcepoint can secure Office 365 and all your other SaaS applications.

    Speaker

    Photo Speaker Name Profile
    Todd Bursch Todd Bursch View Profile
  • How to Stop Fake News, Phishing, Spam and All Sorts of Internet Evil Using Analogue Network Security Add to Schedule Winn Schwartu  |   The Security Awareness Company’  |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 09:30 to 10:20

  • Thu 18th Oct 10:10 - 10:40
  • Brought to you by Darktrace Add to Schedule

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 10:10 to 10:40

  • IoT: Internet of Things, or Internet of Threats? Add to Schedule Paul Willard  |   Cisco Security   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 18th Oct 10:10 to 10:40

    IoT: Internet of Things, or Internet of Threats?

    With the global IoT opportunity predicted to reach nearly $9T by 2020, organizations are under extreme pressure to evaluate IoT and digitation initiatives that can deliver unprecedented customer outcomes and efficiencies.  Move too slow, and be left behind.  Move too fast, neglecting the unique cybersecurity risks IoT devices introduce, and be hit with a crippling security breach.  In this session, Paul will explore how the exponential increase in cyberattacks on IoT and digital assets is forcing the entire cybersecurity industry to evolve, and how this evolution will reshape the way organizations defend against large-scale, coordinated attacks on digital and IoT assets.

    Speaker

    Photo Speaker Name Profile
    Paul Willard Paul Willard View Profile
  • Thu 18th Oct 10:50 - 11:20
  • Cybersecurity and Data Breaches from a Business Lawyer’s Perspective Add to Schedule Kathy Winger  |   Law Offices of Kathy Delaney Winger  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 10:50 to 11:20

    Cybersecurity and Data Breaches from a Business Lawyer’s Perspective

    The session covers recent data breach cases, the significant change to the legal landscape that is occurring in the cybersecurity and data breach arena and the fact that no company, whether small, medium or large, is immune from liability. It  discusses current and future cybersecurity/data breach legislation and the FTC’s role in regulatory and enforcement actions related to cybersecurity and data breaches. It covers steps that businesses can take to protect themselves before, during and after a data breach and the legal significance of cybersecurity best practices. Finally, it discusses liability for third party vendor breaches and the ins and outs of cyber insurance.  

    Speaker

    Photo Speaker Name Profile
    Kathy Winger Kathy Winger View Profile
  • Minimizing the detection to recovery timeframe Add to Schedule Sean Blenkhorn  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
  • Cyber Risk Insurance: get it, before they get you Add to Schedule Adrejia L. A. Boutté Swafford   |   Christovich & Kearney, LLP   |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 10:50 to 11:20

    Cyber Risk Insurance: get it, before they get you

    This presentation will address what cyber threat and cyber risk are; cyber risk insurance policies versus standard homeowners and commercial policies; the role of agents/brokers and legal counsel here; and sample litigation on cybercrime related claims. This presentation will also cover the role of organizational compliance on an entity's degree of risk.

    Speaker

    Photo Speaker Name Profile
    Adrejia L. A. Boutté Swafford Adrejia L. A. Boutté Swafford View Profile
  • Thu 18th Oct 11:30 - 12:00
  • Machine Learning: Another Tool in Your Arsenal Add to Schedule Dr. Gordon Skelton  |   Security and Analytics, LLC  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 11:30 to 12:00

    Machine Learning: Another Tool in Your Arsenal

    Artificial Intelligence is a hot topic today.  Machine Learning and Deep Learning are two different fields in AI.  These fields have the potential to aid in the ongoing fight for cyber security.  Before beginning to employee these in your toolkit, you have to have a good understanding of their strengths and weaknesses.  This presentation will focus on Machine Learning and its applicability to enhance cyber security.  Machine learning will be introduced and examples will be provided illustrating how ML can be applied. Also discussed will be how to start an initial project employing ML for cyber security.

    Speaker

    Photo Speaker Name Profile
    Dr. Gordon Skelton Dr. Gordon Skelton View Profile
  • Brought to you by Joe Gray Add to Schedule Joe Gray  |   Advanced Persistent Security  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 11:30 to 12:00

    Speaker

    Photo Speaker Name Profile
    Joe Gray Joe Gray View Profile
  • Cybersecurity Attacks are Evolving and So Must We: Enter AI-Driven Autonomous Security Add to Schedule Chris Calvert   |   Respond Software  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 11:30 to 12:00

  • Thu 18th Oct 01:00 - 01:30
  • Brought to you by Elizabeth Wharton Add to Schedule Elizabeth Wharton  |   Prevailion, Inc.   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 01:00 to 01:30

    Speaker

    Photo Speaker Name Profile
    Elizabeth Wharton Elizabeth Wharton View Profile
  • Not a free lunch – Managing your open source program Add to Schedule Peter Chestna   |   Veracode  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 01:00 to 01:30

    Not a free lunch – Managing your open source program

    No one builds software completely from scratch anymore. The use of open source software is at an all-time high. The benefits in terms of time to market are too great to ignore. Once incorporated, they are orphaned and left to fend for themselves. That’s a huge problem when a CVE is announced and we are left with a hugely expensive upgrade or uncontrolled exposure to risk. Let's talk strategy.

    Speaker

    Photo Speaker Name Profile
    Peter Chestna Peter Chestna View Profile
  • Thu 18th Oct 01:40 - 02:10
  • In Praise of Private Clouds: A Case Study Add to Schedule Robert Gibbons  |   Datto  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 01:40 to 02:10

    In Praise of Private Clouds: A Case Study

    Robert Gibbons, Datto’s CTO, will discuss the security and infrastructure advantages of migrating data from a public to a private cloud based on his own experience. Having recently transferred 12 PB of data out of Amazon Web Service, Gibbons will discuss the motivations, challenges, and lessons learned from moving billions of SaaS data objects, one of the largest data migrations in history.

    Speaker

    Photo Speaker Name Profile
    Robert Gibbons Robert Gibbons View Profile
  • GDPR/CCPA Crash Course: What You Need to Know About Current Privacy Regulations Add to Schedule Greg Sparrow  |   CompliancePoint  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 01:40 to 02:10

  • Role Based Access Control (RBAC) Best Practices and Tips for Successful Implementation Add to Schedule Bhavdip Rathod   |   Sailpoint Technologies, Inc.   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 18th Oct 01:40 to 02:10

    Role Based Access Control (RBAC) Best Practices and Tips for Successful Implementation

    One of the main goals of RBAC is to establish the Principle of Least Privileges and grant employees only the access they need to do their jobs. Grouping common access permissions into roles provides a secure and efficient way of managing access and helps keep things simple for administrators the users requesting access. RBAC has become the standard for managing access to IT resources in industry and government. Implementation of RBAC in an enterprise often becomes a major and daunting task. Adopting some of the best practices early in the implementation of RBAC program will ensure successful delivery of the program within the enterprise.

    Speaker

    Photo Speaker Name Profile
    Bhavdip Rathod  Bhavdip Rathod View Profile
  • Brought to you by Todd Weller Add to Schedule Todd Weller  |   Bandura Systems  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 01:40 to 02:10

    Speaker

    Speaker Name Profile
    Todd Weller View Profile
  • Thu 18th Oct 02:20 - 02:50
  • Panel The Year Ahead Add to Schedule Tech Leaders  |  The Keynote

    The Keynote Theatre

    Thu 18th Oct 02:20 to 02:50

    Speakers

    Photo Speaker Name Profile
    Chris Calvert Chris Calvert View Profile
    IJay Palansky IJay Palansky View Profile
  • Top Tips for Implementing an Effective AppSec Program Add to Schedule Nikhil Ollukaren  |   Optiv Security Inc.  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 02:20 to 02:50

    Top Tips for Implementing an Effective AppSec Program

    Attend this session to learn how forward-thinking clients are implementing mature AppSec programs. We’ll also discuss how modern development teams are overcoming the traditional challenges around deploying applications rapidly and securely.

    Speaker

    Photo Speaker Name Profile
    Nikhil Ollukaren Nikhil Ollukaren View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top