Future Cyber Tech, Application Security & DevOps

Businesses are acutely aware that there is an increasingly sophisticated criminal threat to their systems and data. Being fully protected against these threats has never been more imperative given the legislative and PR implications of high profile breaches. In this theater you can learn from the vendors at the front-line in the battle with cyber criminals about how future cyber tech solutions will counter the evolving threats.

Future Cyber Tech, Application Security & DevOps Speakers

Ado Kukic
Ado Kukic

Developer Evangelist Auth0

View

Ado Kukic
Chris Calvert
Chris Calvert

Co-Founder & VP, Product Strategy Respond Software

View

Chris Calvert
Julie Starr
Julie Starr

Security and Compliance Specialist Google Cloud

View

Julie Starr

 Julie is a Security and Compliance Specialist, continuing in a long career where she's helped all manner of organizations understand how to best manage security considerations. She has worked for vendors such as VMware, Cisco, Palo Alto Networks, Blue Coat, Check Point, and Sun Microsystems. She began her career in IT with Georgia Tech; was adjunct faculty at North Carolina State University teaching networking and security classes. Julie holds a Bachelor of Computer Engineering from Georgia Tech; a Masters in Computer Science from NCSU; is a CISSP; and is a member of ACM, IEEE, ISSA, and AFCEA.

Keith Mokris
Keith Mokris

Sr Manager, Product Marketing Twistlock

View

Keith Mokris

Keith Mokris leads Product Marketing at Twistlock to tell the story around how enterprises can leverage the Twistlock cloud native cybersecurity platform to secure their modern applications. Previously, Keith was in charge of product marketing at NowSecure, helping enterprises integrate mobile application security testing into their development pipelines and isolate critical vulnerabilities via penetration testing. In his free time, he is a landscape and street photographer.

Mark Stanford
Mark Stanford

Systems Engineering Manager Cisco Security

View

Mark Stanford
Nikhil Ollukaren
Nikhil Ollukaren

Application security Consultant  Optiv Security Inc.

View

Nikhil Ollukaren
Peter Chestna
Peter Chestna

Director of Developer Engagement Veracode

View

Peter Chestna

As Director of Developer Engagement, Pete provides customers with practical advice on how to successfully roll out developer-centric application security programs. Relying on more than 10 years of direct AppSec experience as both a developer and development leader, Pete provides information on best practices amassed from working with Veracode’s 1,000+ customers.

Tal Melamed
Tal Melamed

Head of Security Research  Protego Labs

View

Tal Melamed
Tim Mackey
Tim Mackey

Technical Evangelist Black Duck by Synopsys

View

Tim Mackey
Todd O’Boyle
Todd O’Boyle

 Watchguard

View

Todd O’Boyle

Todd O’Boyle is Director of Product Management at WatchGuard. Prior to WatchGuard, Todd was a co-founder and CTO at Strongarm, which was acquired by WatchGuard in January of 2018. Prior to founding Strongarm, Todd spent 15 years at The MITRE Corporation, providing technical support to the US Department of Defense and the Intelligence Community, where he split his time between real-world cyber operations and research. He served as principal investigator for a project developing methods to improve how operators respond to adversaries, researched software protections used by adversaries, developed techniques for profiling network flow data to identify adversary activity, and built some of the original computer forensics tools. Todd has a Bachelor of Science, Computer Science from Purdue University.

Todd Weller
Todd Weller

Chief Strategy Officer  Bandura Systems

View

Todd Weller

Future Cyber Tech, Application Security & DevOps Seminars

  • Wed 17th Oct 10:10 - 10:40
  • Faster vs Secure: Threats, risks, governance and containerized applications Tim Mackey  |   Black Duck by Synopsys  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 10:10 to 10:40

    Faster vs Secure: Threats, risks, governance and containerized applications

    When deploying containerized applications at scale, a trust model is a key component of secure deployments. Defining that trust model requires an understanding of the risk factors impacting both application development and assumptions imposed by the orchestration solution. This trust model needs continual reassessment guided by the evolving threat landscape. For example, modification of existing patch management and continuous monitoring processes are often required for containerized applications and should include information from the trust model.

    Speaker

    Photo Speaker Name Profile
    Tim Mackey Tim Mackey View Profile
  • Wed 17th Oct 11:30 - 12:00
  • How containerization makes security and compliance instantly easier Keith Mokris  |   Twistlock  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 11:30 to 12:00

    How containerization makes security and compliance instantly easier

    As containers become the commonplace method for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, we'll discuss a company that provides environmental science and engineering consulting to some of the world’s largest civil waterworks projects. This company has the typical data collection, modeling, and other core line-of-business applications – but also provides a critical 14-year old app that models storm surge. The move to containers for this application delivered immediate benefits, including consistency, security and compliance.

    Speaker

    Photo Speaker Name Profile
    Keith Mokris Keith Mokris View Profile
  • Wed 17th Oct 01:00 - 01:30
  • A Token Walks Into a SPA... Ado Kukic  |   Auth0  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 01:00 to 01:30

    A Token Walks Into a SPA...

    Between Angular, React, & Vue it can be hard NOT to build SPAs these days. But having to deal with cookies, tokens, auth, & resource access - you may even feel like you need a second page (gasp!) for security! Fear not, for the technology to create truly secure SPAs is there and I’ll show you how.

    Speaker

    Photo Speaker Name Profile
    Ado Kukic Ado Kukic View Profile
  • Wed 17th Oct 01:40 - 02:10
  • Baking in Security: The passing of the Network Security Era Julie Starr   |   Google Cloud  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 01:40 to 02:10

    Speaker

    Photo Speaker Name Profile
    Julie Starr Julie Starr View Profile
  • Wed 17th Oct 02:20 - 02:50
  • Serverless security: the untold story. Tal Melamed   |   Protego Labs  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 02:20 to 02:50

    Serverless security: the untold story.

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security challenges. Some of these security threats are equal to those we know from traditional application development and some take a new form. For better and for worse.

    In this talk I will describe how these threats are different from the traditional attacks we all know so well, aiming at shedding light upon the security risks under this rather new technology.

    Speaker

    Photo Speaker Name Profile
    Tal Melamed Tal Melamed View Profile
  • Wed 17th Oct 03:00 - 03:45
  • The Power of Your People: How to Rally Your Troops Against Phishing Todd O’Boyle  |   Watchguard  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 17th Oct 03:00 to 03:45

    The Power of Your People: How to Rally Your Troops Against Phishing

    This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

    Speaker

    Photo Speaker Name Profile
    Todd O’Boyle Todd O’Boyle View Profile
  • Thu 18th Oct 09:30 - 10:00
  • Rethinking branch security Mark Stanford  |   Cisco Security   |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 09:30 to 10:00

    Rethinking branch security

    Today, security teams and IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective branch office security without any reduction in performance. And with more and more branch locations using direct internet access, how can you quickly and easily protect users on any device, in every office? With Cisco Umbrella, say hello to simple and effective protection for branch offices.

    Speaker

    Photo Speaker Name Profile
    Mark Stanford Mark Stanford View Profile
  • Thu 18th Oct 11:30 - 12:00
  • Cybersecurity Attacks are Evolving and So Must We: Enter AI-Driven Autonomous Security Chris Calvert   |   Respond Software  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 11:30 to 12:00

    Cybersecurity Attacks are Evolving and So Must We: Enter AI-Driven Autonomous Security

    Cyber security attacks are increasing in frequency, each one becoming more potentially harmful than the last. Traditional methods of threat prediction and mitigating risks cannot keep pace with the increased sophistication of attacks, requiring a fundamental shift in security technology. Respond Analyst leverages Probability Theory and advanced algorithms to analyze all relevant cyber observables, ultimately making fully contextualized and informed decisions at the scale, speed and consistency no human can match.

    Speaker

    Photo Speaker Name Profile
    Chris Calvert Chris Calvert View Profile
  • Thu 18th Oct 01:00 - 01:30
  • Not a free lunch – Managing your open source program Peter Chestna   |   Veracode  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 01:00 to 01:30

    Not a free lunch – Managing your open source program

    No one builds software completely from scratch anymore. The use of open source software is at an all-time high. The benefits in terms of time to market are too great to ignore. Once incorporated, they are orphaned and left to fend for themselves. That’s a huge problem when a CVE is announced and we are left with a hugely expensive upgrade or uncontrolled exposure to risk. Let's talk strategy.

    Speaker

    Photo Speaker Name Profile
    Peter Chestna Peter Chestna View Profile
  • Thu 18th Oct 01:40 - 02:10
  • How to Use Intelligence to Automate & Scale Network Prevention Todd Weller  |   Bandura Systems  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 01:40 to 02:10

    How to Use Intelligence to Automate & Scale Network Prevention

    Security organizations have access to large volumes of actionable threat intelligence.  However, many organizations experience significant challenges putting threat intelligence into action to improve network defense and security operations.  These challenges are driven by a combination of technology limitations in existing network security controls and the use of threat intelligence primarily focused on manual detection and response processes. This presentation will focus on how organizations are using Threat Intelligence Gateway technology and automation to overcome these challenges allowing them to put threat intelligence into action to better protect networks.

    Speaker

    Photo Speaker Name Profile
    Todd Weller Todd Weller View Profile
  • Thu 18th Oct 02:20 - 02:50
  • Top Tips for Implementing an Effective AppSec Program Nikhil Ollukaren  |   Optiv Security Inc.  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 18th Oct 02:20 to 02:50

    Top Tips for Implementing an Effective AppSec Program

    Attend this session to learn how forward-thinking clients are implementing mature AppSec programs. We’ll also discuss how modern development teams are overcoming the traditional challenges around deploying applications rapidly and securely.

    Speaker

    Photo Speaker Name Profile
    Nikhil Ollukaren Nikhil Ollukaren View Profile
Top