Agenda

  • Wed 17th Oct 09:30 - 10:00
  • Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses Add to Schedule Sam Elliott  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 17th Oct 09:30 to 10:00

    Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses

    Today's world of cyber warfare is one of continuous zero-day attacks, targeted phishing scams and malicious insiders. Anyone trying to deal with these threats manually has already lost the game. You can't stop cyberattacks from occurring. But, you can limit the damage when these inevitable attacks strike. When you're under attack, blocking intrusions with automated identity management makes a huge difference in keeping your organization's name out of the data breach headlines. Based on my years of experience I'll cover how to redesign and automate your identity management (especially privileged identities) to achieve acceptable losses, even while under constant cyberattack.

    Speaker

    Photo Speaker Name Profile
    Sam Elliott Sam Elliott View Profile
  • Brought to you by BlackDuck Add to Schedule

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 09:30 to 10:00

  • How to Build Effective Defensive Strategies Against Privileged Attacks Add to Schedule Rod Simmons  |   BeyondTrust   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 09:30 to 10:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them

    Speaker

    Photo Speaker Name Profile
    Rod Simmons Rod Simmons View Profile
  • Wed 17th Oct 10:10 - 10:40
  • A New Approach to Managing Digital Risk Add to Schedule Rohit Ghai  |   RSA (a Dell Technologies Business)  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 10:10 to 10:40

    A New Approach to Managing Digital Risk

    Technology continues to propel entire industries through digital transformations, escalating digital risk, and prompting questions from the C-suite, the BOD, regulators and policy makers. Cyber-risk is the largest facet of digital risk we face going forward. Since cybersecurity is now squarely a business issue; it needs to be managed as such. A business-driven approach to managing digital risk entails taking a risk orientation to designing and operating your security operations. This approach is the only way to ensure that technologies like machine learning and data continue to propel us to our digital future.
     

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Wed 17th Oct 10:50 - 11:20
  • Brought to you by eSentire Add to Schedule

    Network Security and Ransomware Theatre

    Wed 17th Oct 10:50 to 11:20

  • Wed 17th Oct 11:30 - 12:00
  • AI-Based Autonomous Response: Are Humans Ready? Add to Schedule Nicole Eagan  |   Darktrace  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 11:30 to 12:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Brought to you by Forcepoint Add to Schedule

    Cyber Hack Theatre

    Wed 17th Oct 11:30 to 12:10

  • Wed 17th Oct 13:00 - 13:30
  • Brought to you by ProtectWise Add to Schedule

    Network Security and Ransomware Theatre

    Wed 17th Oct 13:00 to 13:30

  • Brought to you by Akamai Add to Schedule John Summers   |   Akamai   |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 13:00 to 13:30

    Speaker

    Photo Speaker Name Profile
    John Summers John Summers View Profile
  • Wed 17th Oct 13:40 - 14:10
  • Mind the Gap… Insider Threats & Industry Add to Schedule Patricia Long   |   Long Law Firm  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 13:40 to 14:10

    Mind the Gap… Insider Threats & Industry

    This presentation will provide an overview of the various insider activities across industry and identify the financial impact, motivations, behavioral indicators and organizational factors that contribute to insider threats in industry. Insider Threat malicious motivations such as revenge, ego, espionage, etc., will be identified; as well as mistakes, misuse and negligence acts such as phishing, pretexting, privileged users, accidents, weak passwords, etc. The presentation will also address deterrence and detection and set out mitigating factors and preventative measures. Finally, Mind the Gap… Insider Threats & Industry will identify policy and procedures to create an insider threat program for small or large companies.

    Speaker

    Photo Speaker Name Profile
    Patricia Long Patricia Long View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule

    Network Security and Ransomware Theatre

    Wed 17th Oct 13:40 to 14:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

  • Wed 17th Oct 14:20 - 14:50
  • Shifting the Human Factors Paradigm in Cybersecurity Add to Schedule Dr. Calvin Nobles  |     |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 14:20 to 14:50

    Shifting the Human Factors Paradigm in Cybersecurity

    This presentation emphasizes the need to break the inertia regarding human factors in cybersecurity by leveraging organizational platforms to educate and address human-centric problems in cybersecurity. Shifting the paradigm on human factors in cybersecurity centers on developing an executive-led platform to address (a) human-centered cybersecurity approaches, (b) the need for human factors assessments, (c) increased appreciation for humans factors as a science, and (d) human derailments in information security. Cybersecurity leaders and practitioners continue to admire the human factors problem without exploring the root-level causes of human-enabled mistakes. One way to address human factors is through an organizational platform. 

    Speaker

    Photo Speaker Name Profile
    Dr. Calvin Nobles Dr. Calvin Nobles View Profile
  • Serverless security: the untold story. Add to Schedule Tal Melamed   |   Protego Labs  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 14:20 to 14:50

    Serverless security: the untold story.

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security challenges. Some of these security threats are equal to those we know from traditional application development and some take a new form. For better and for worse.

     In this talk I will describe how these threats are different from the traditional attacks we all know so well, aiming at shedding light upon the security risks under this rather new technology.

    Speaker

    Photo Speaker Name Profile
    Tal Melamed Tal Melamed View Profile
  • Thu 18th Oct 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Add to Schedule Rod Simmons  |   BeyondTrust   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 18th Oct 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Rod Simmons Rod Simmons View Profile
  • The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense Add to Schedule

    IoT Security Theatre

    Thu 18th Oct 09:30 to 10:00

    The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense

    There is an urgent need for a new approach to combat the next generation of cyber-threats, across both OT and IT environments. While total prevention of compromise is untenable, utilizing automated self-learning technologies to detect and respond to emerging threats within a network is an achievable cyber security goal, irrespective of whether the suspicious behavior originated on the corporate network or ICS.

  • Brought to you by Forcepoint Add to Schedule

    Cloud, Mobile & IAM Theatre

    Thu 18th Oct 09:30 to 10:00

  • Thu 18th Oct 10:50 - 11:20
  • Cybersecurity and Data Breaches from a Business Lawyer’s Perspective Add to Schedule Kathy Winger  |   Law Offices of Kathy Delaney Winger  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 10:50 to 11:20

    Cybersecurity and Data Breaches from a Business Lawyer’s Perspective

    The session covers recent data breach cases, the significant change to the legal landscape that is occurring in the cybersecurity and data breach arena and the fact that no company, whether small, medium or large, is immune from liability. It  discusses current and future cybersecurity/data breach legislation and the FTC’s role in regulatory and enforcement actions related to cybersecurity and data breaches. It covers steps that businesses can take to protect themselves before, during and after a data breach and the legal significance of cybersecurity best practices. Finally, it discusses liability for third party vendor breaches and the ins and outs of cyber insurance.  

    Speaker

    Photo Speaker Name Profile
    Kathy Winger Kathy Winger View Profile
  • Brought to you by eSentire Add to Schedule

    Network Security and Ransomware Theatre

    Thu 18th Oct 10:50 to 11:20

  • Thu 18th Oct 11:30 - 12:00
  • Machine Learning: Another Tool in Your Arsenal Add to Schedule Dr. Gordon Skelton  |   Security and Analytics, LLC  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 11:30 to 12:00

    Machine Learning: Another Tool in Your Arsenal

    Artificial Intelligence is a hot topic today.  Machine Learning and Deep Learning are two different fields in AI.  These fields have the potential to aid in the ongoing fight for cyber security.  Before beginning to employee these in your toolkit, you have to have a good understanding of their strengths and weaknesses.  This presentation will focus on Machine Learning and its applicability to enhance cyber security.  Machine learning will be introduced and examples will be provided illustrating how ML can be applied. Also discussed will be how to start an initial project employing ML for cyber security.

    Speaker

    Photo Speaker Name Profile
    Dr. Gordon Skelton Dr. Gordon Skelton View Profile
  • Thu 18th Oct 13:40 - 14:10
  • In Praise of Private Clouds: A Case Study Add to Schedule Robert Gibbons  |   Datto  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 13:40 to 14:10

    In Praise of Private Clouds: A Case Study

    Robert Gibbons, Datto’s CTO, will discuss the security and infrastructure advantages of migrating data from a public to a private cloud based on his own experience. Having recently transferred 12 PB of data out of Amazon Web Service, Gibbons will discuss the motivations, challenges, and lessons learned from moving billions of SaaS data objects, one of the largest data migrations in history.

    Speaker

    Photo Speaker Name Profile
    Robert Gibbons Robert Gibbons View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top