ISSA Theater 4 - Emerging Technology

ISSA Theater 4 - Emerging Technology Speakers

Dr. Shawn Murray
Dr. Shawn Murray

Principal Scientist US Missile Defense Agency

View

Dr. Shawn Murray

Dr. Murray is a Principal Scientist at the US Missile Defense Agency and is a Director on the International Board for ISSA International. He has worked with the FBI, CIA, NSA in various rolls supporting cybersecurity initiatives globally. He is also the CEO and Chief Academic Officer for Murray Security Services. He has over 20 years of experience in IT and Cybersecurity.

Jeff Neithercutt
Jeff Neithercutt

Cyber Security and Law Enforcement Expert Public Consulting Group

View

Jeff Neithercutt
Juan Asenjo
Juan Asenjo

Senior Manager for Solutions Marketing Thales eSecurity

View

Juan Asenjo

Juan Asenjo, Ph.D., CISSP has worked in the information security field for over 25 years – in government, military, and the private sector. As Senior Manager for Solutions Marketing at Thales eSecurity, he brings to market and evangelizes cryptographic integrations with technology partner solutions, focusing on identity management, authentication, and encryption. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, he helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.

Ken Dunham
Ken Dunham

Senior Director of Technical Cyber Threat Intelligence Optiv

View

Ken Dunham

Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions. He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research. Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners). He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.

Kenneth Geers
Kenneth Geers

Chief Research Scientist Comodo Cybersecurity

View

Kenneth Geers

Kenneth Geers (PhD, CISSP): Comodo Cybersecurity Chief Research Scientist, NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate. 20 years US Government (US Army, NSA, NCIS, NATO). Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “The Virtual Battlefield”, Technical Expert “Tallinn Manual”, many articles and chapters on international and cyber security.

Larry Homoth
Larry Homoth

Director of Sales SecurityIQ

View

Larry Homoth

Larry Homuth is Director of Sales for SecurityIQ, InfoSec Institute’s security awareness training and phishing simulation solution. Larry has provided engineering product development professional services consulting for the largest names in consumer electronics, energy, and aerospace and defense. Additionally, Larry has guided implementation of enterprise software systems for quality and inspection management at 4 of the 5 largest pharmaceutical organizations globally. Based in Madison, Larry consults on business process automation and regulatory compliance through the deployment of SaaS solutions.

Loren Roberts
Loren Roberts

 

View

Loren Roberts
Michael Angelo
Michael Angelo

Chief Security Architect Microfocus/NetIQ

View

Michael Angelo

Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.

Michael Raggo
Michael Raggo

CSO 802 Secure, Inc.

View

Michael Raggo
Sandy Carielli
Sandy Carielli

Director of Security Technologies Entrust Datacard

View

Sandy Carielli
TaI Guest
TaI Guest

Principal Product Manager Beyond Trust (Bomgar)

View

TaI Guest

Tal Guest is the Principal Product Manager at Bomgar, overseeing the strategy and direction of the company’s cybersecurity products. He works with his colleagues at Bomgar to plan and execute go to market strategies. Mr. Guest has more than 20 years of experience in the technology industry, working in various capacities ranging from hands-on technical work to managing a team of highly skilled engineers. He has a Bachelor of Business degree from Mississippi State focused on information systems and makes his home in Madison, MS.

Tyler Cohen Wood
Tyler Cohen Wood

Executive Director Cyber Workforce Program CyberVista

View

Tyler Cohen Wood

Tyler Cohen Wood is a cyber-authority with 18 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). As a cyber, Intelligence, national security expert, author and public speaker, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards, including CyberSat and The Internet of Things Consortium.

ISSA Theater 4 - Emerging Technology Seminars

  • Wed 17th Oct 09:40 - 10:10
  • IoT Wireless Network Threats and Counter-measures Michael Raggo  |   802 Secure, Inc.   |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Wed 17th Oct 09:40 to 10:10

    IoT Wireless Network Threats and Counter-measures

    Current attack vectors indicate that nefarious attacks are increasingly targeting IoT wireless infrastructures. 95% of IoT is wireless, yet most organizations lack a defense-in-depth strategy to address the growing wireless threat landscape consisting of a plethora of new protocols and frequencies including: WiFi, ZigBee, Z-Wave, Bluetooth, P25, M2M communications, and more. This has generated a new wireless threat landscape, as these risks and threats target not only the enterprise network, but Shadow IoT networks. Additionally, this increases the risk from nearby threats such as drones, spy cameras, and more. In this presentation we’ll explore the anatomy of these attacks and categorize these threats to develop an updated defense-in-depth strategy for the evolving IoT wireless threat landscape.

    Speaker

    Speaker Name Profile
    Michael Raggo View Profile
  • Wed 17th Oct 10:40 - 11:30
  • Securing endpoints using analytics and a proven framework Loren Roberts  |     |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Wed 17th Oct 10:40 to 11:30

    Securing endpoints using analytics and a proven framework

    The breadth of IoT technology is only going to continue to expand, so how do we protect all those endpoints? Most companies invest millions in protecting laptops, servers and creating a robust perimeter, and often times overlook the importance of locking down their endpoint infrastructure. Of those organizations that take into consideration endpoint security, many report having only basic measures. Below the surface, these IoT devices can provide data intelligence to detect unknown threats to your network even if the devices have closed firmware. Loren Roberts, HP Senior Security Advisor will use real-world examples of how some of the most secure organizations are still lagging in security beyond the firewall, and share how to use data analytics and a proven framework, to secure endpoint devices. Join Loren at this session to see how you can defend your endpoints from the next wave of hackers.

    Speaker

    Photo Speaker Name Profile
    Loren Roberts Loren Roberts View Profile
  • Wed 17th Oct 01:00 - 02:30
  • Panel; Emerging Technologies – New Challenges Balancing the Needs of the Business with Cyber Security Risk Tech Leaders  |  ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Wed 17th Oct 01:00 to 02:30

  • Wed 17th Oct 03:40 - 04:30
  • The New and Improved Big Data Analytics: Good Enough to Solve a Murder? Tyler Cohen Wood  |   CyberVista  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Wed 17th Oct 03:40 to 04:30

    The New and Improved Big Data Analytics: Good Enough to Solve a Murder?

    There’s been a murder! After detailed forensic data collection, law enforcement officials begin to piece together the facts. They parse through physical data, social media, digitally collected data from witnesses and suspects and other open source intelligence (OSINT) to attempt to piece together the “who done it and why” in order to solve what seems to be an unsolvable case. There’s been a murder! After detailed forensic data collection, law enforcement officials begin to piece together the facts. They parse through physical data, social media, digitally collected data from witnesses and suspects and other open source intelligence (OSINT) to attempt to piece together the “who done it and why” in order to solve what seems to be an unsolvable case.

    Speaker

    Photo Speaker Name Profile
    Tyler Cohen Wood Tyler Cohen Wood View Profile
  • Thu 18th Oct 09:40 - 10:10
  • Introduction to the IoT Security Maturity Model Sandy Carielli  |   Entrust Datacard  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Thu 18th Oct 09:40 to 10:10

    Introduction to the IoT Security Maturity Model

    As the Internet of Things (IoT) becomes an integral part of business strategy, the question of securing the IoT environment has come to the forefront. How can you tell if your IoT solution is sufficiently secure to address your needs? Does it address your requirements and threat environment? How do you evaluate the risk consistently? Not all systems need the same level of security: a manufacturing floor is different from a smart lighting system. The Industrial Internet Consortium (IIC) created the IoT Security Maturity Model (SMM) to help organizations address these issues and provide a framework that addresses IoT requirements, the merging of information technology (IT) with operational technology (OT), and the overarching security and trustworthiness goals. The goal of the SMM is to enable IoT providers to invest appropriately in security mechanisms to meet their requirements. In this session, led by one of the authors of the SMM, we will discuss the work done to date and provide an overview of the structure, purpose, usage and extensibility of the model.

    Speaker

    Photo Speaker Name Profile
    Sandy Carielli Sandy Carielli View Profile
  • Thu 18th Oct 10:40 - 11:30
  • Securing the Chain of Evidence With Blockchain Jeff Neithercutt  |   Public Consulting Group  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Thu 18th Oct 10:40 to 11:30

    Securing the Chain of Evidence With Blockchain

    This will be a discussion of the emerging Blockchain technology and it's use to verify evidence from the moment it is collected to the final presentation in court. Particular attention will be paid to the essential need for non-repudiation in the chain of evidence for both civil and criminal proceedings.

    Speaker

    Photo Speaker Name Profile
    Jeff Neithercutt Jeff Neithercutt View Profile
  • Thu 18th Oct 11:40 - 12:30
  • Orchestration & Automation in Real World Ken Dunham  |   Optiv  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Thu 18th Oct 11:40 to 12:30

    Speaker

    Speaker Name Profile
    Ken Dunham View Profile
  • Thu 18th Oct 01:00 - 01:50
  • The Role of Malware in Intelligence Operations Kenneth Geers  |   Comodo Cybersecurity  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Thu 18th Oct 01:00 to 01:50

    The Role of Malware in Intelligence Operations

    Imagine you are King or Queen for a day. How would you employ the time and talent of computer hackers? Whom would you target, with what type of malware, and for what purpose? Where would you set technical, legal, and ethical constraints? Information Technology continuously transforms the nature of statecraft, from internal security to external threats. This presentation will examine the role of malicious software in real-world nation-state intelligence operations. We will discuss the attack and defense of everything in a modern state, from elections to electricity, and clarify the roles and risks of law enforcement, counterintelligence, and foreign intelligence in the Internet era. Finally, we will address how enterprises should respond to a threat that has no fear of prosecution or retaliation.

    Speaker

    Photo Speaker Name Profile
    Kenneth Geers Kenneth Geers View Profile
  • Thu 18th Oct 02:00 - 02:50
  • SDLCMM & Residual Risk the next chapter Michael Angelo  |   Microfocus/NetIQ  |   ISSA Theater 4 - Emerging Technology

    ISSA Theater 4 - Emerging Technology Theatre

    Thu 18th Oct 02:00 to 02:50

    SDLCMM & Residual Risk the next chapter

    As we continue to secure our environments external attackers continue to be successful. This is true even with new developments and enhancements to our infrastructure’s security. The subsequent analysis and deployment of changes to our internal and generic Security Development Lifecycle (SDLC) don’t seem to even slow them down. The question on everyone’s mind is ‘why are they successful?’. The answer is as because we have gaps in our defenses. Phrased differently we have unmitigated residual risks in our defenses or environment. While the answer sounds easy, the solution isn’t… Or maybe it is.

    Speaker

    Speaker Name Profile
    Michael Angelo View Profile
Top