Network Security, Ransomware & IOT

 The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving ransomware.

Network Security, Ransomware & IOT Speakers

Cameron Armstrong
Cameron Armstrong

Director of Channel Sales Darktrace

View

Cameron Armstrong
Craig Kaplan
Craig Kaplan

 Darktrace

View

Craig Kaplan
Dillip Thakur
Dillip Thakur

Principal Consultant  Dimension Data

View

Dillip Thakur
Elizabeth Wharton
Elizabeth Wharton

VP, Strategy  Prevailion, Inc.

View

Elizabeth Wharton
Kevin Dempsey
Kevin Dempsey

Sr Security Services Architect Dimension Data

View

Kevin Dempsey
Roger Harris
Roger Harris

Senior Sales Engineer ProtectWise

View

Roger Harris

Roger Harris has been assisting customers in expert Network Forensics for more than a decade including security incident response, high speed packet capture, precision timing and open source implementations. Before joining ProtectWise, he provided global customer consulting for Napatech, FireEye, nPulse and Endace as well as engineering leadership at managed-services provider Orange.

Ryan Spelman
Ryan Spelman

Senior Director, Business Development Center for Internet Security

View

Ryan Spelman
Sean Blenkhorn
Sean Blenkhorn

Vice President, Sales Engineering & Advisory Services eSentire

View

Sean Blenkhorn
TaI Guest
TaI Guest

Principal Product Manager Beyond Trust (Bomgar)

View

TaI Guest

Tal Guest is the Principal Product Manager at Bomgar, overseeing the strategy and direction of the company’s cybersecurity products. He works with his colleagues at Bomgar to plan and execute go to market strategies. Mr. Guest has more than 20 years of experience in the technology industry, working in various capacities ranging from hands-on technical work to managing a team of highly skilled engineers. He has a Bachelor of Business degree from Mississippi State focused on information systems and makes his home in Madison, MS.

Network Security, Ransomware & IOT Seminars

  • Wed 17th Oct 10:10 - 10:40
  • Data Privacy by Design Dillip Thakur  |   Dimension Data  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 10:10 to 10:40

    Data Privacy by Design

    The session will cover establishing a data privacy program that protects the data as assets and providing adherence with privacy laws. In this regard it is imperative that Organizations’ need to understand in detail how sensitive data is collected, stored, processed, and otherwise retained. Some key ingredients for success and how Data Privacy by Design can be a valuable framework to ensure privacy is at the center of our data processing lifecycles to be discussed.

    Speaker

    Speaker Name Profile
    Dillip Thakur View Profile
  • Wed 17th Oct 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Sean Blenkhorn  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
  • Wed 17th Oct 01:00 - 01:30
  • Defense in depth: Achieving Detection and Response Everywhere Roger Harris  |   ProtectWise   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 01:00 to 01:30

    Defense in depth: Achieving Detection and Response Everywhere

    Past and current breaches have proven that a prevention-only strategy can’t ensure 100% protection. EDR has changed the game on the endpoint to provide complete visibility and forensics to find threats sooner, investigate their impact, and prevent them from happening again. Network Detection and Response (NDR) allows organizations to benefit from full packet forensics, threat detection and incident response workflows across the entire network - from traditional enterprise, to cloud, to industrial environments. By bringing together EDR and NDR we can enable the next generation of SOC analysts to gain complete visibility, detection and response from endpoint to network.

    Speaker

    Photo Speaker Name Profile
    Roger Harris Roger Harris View Profile
  • Wed 17th Oct 01:40 - 02:10
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Cameron Armstrong  |   Darktrace   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 01:40 to 02:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

    Speaker

    Photo Speaker Name Profile
    Cameron Armstrong Cameron Armstrong View Profile
  • Wed 17th Oct 02:20 - 02:50
  • Make Compliance Management a Competitive Advantage Ryan Spelman  |   Center for Internet Security  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 02:20 to 02:50

    Make Compliance Management a Competitive Advantage

    Often we fall back on examples of penalties to explain our security justifications. But what if we could talk about it as a market mover? What if we could explain how customers are looking for security, and that if we show them that we may get their business? Equally, when we tackle a compliance requirement, we fail to see how it touches on others. By using a central guidance document such as the free critical security controls, we can both see how the work we are doing is improving our security posture and also how it can satisfy other requirements. 

    Speaker

    Photo Speaker Name Profile
    Ryan Spelman Ryan Spelman View Profile
  • Wed 17th Oct 03:00 - 03:30
  • IoT Cybersecurity: Litigation Risks and Realities

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 03:00 to 03:30

    IoT Cybersecurity: Litigation Risks and Realities

     A tidal wave of litigation over defective IoT cybersecurity is just over the horizon. Everyone involved in any aspect of the supply chain for a defective IoT device is potentially in the cross-hairs. Drawing on his experience as lead counsel in the federal class action lawsuit stemming from Charlie Miller and Chris Valasek’s famous hack of a Jeep Grand Cherokee in 2015, the presentation will explore the legal rules, litigation realities, and exceptional risks associated with IoT litigation, and will provide concrete guidance regarding steps organizations can take now to minimize legal exposure, and what organizations should do if they’re sued.

  • Wed 17th Oct 03:30 - 04:30
  • Women in Cyber Security

    Network Security, Ransomware & IOT Theatre

    Wed 17th Oct 03:30 to 04:30

  • Thu 18th Oct 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats TaI Guest  |   Beyond Trust (Bomgar)  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    TaI Guest TaI Guest View Profile
  • Thu 18th Oct 10:10 - 10:40
  • The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense Craig Kaplan   |   Darktrace   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 10:10 to 10:40

    The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense

    There is an urgent need for a new approach to combat the next generation of cyber-threats, across both OT and IT environments. While total prevention of compromise is untenable, utilizing automated self-learning technologies to detect and respond to emerging threats within a network is an achievable cyber security goal, irrespective of whether the suspicious behavior originated on the corporate network or ICS.

    Speaker

    Photo Speaker Name Profile
    Craig Kaplan Craig Kaplan View Profile
  • Thu 18th Oct 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Sean Blenkhorn  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
  • Thu 18th Oct 11:30 - 12:00
  • A Proactive Approach to Ransomware Kevin Dempsey  |   Dimension Data  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 11:30 to 12:00

    A Proactive Approach to Ransomware

    The session will describe the characteristics, historical development, and organizational impacts of ransomware. We will cover key risk factors and recommended steps to reducing the likelihood and impact of ransomware attacks.

    Speaker

    Speaker Name Profile
    Kevin Dempsey View Profile
  • Thu 18th Oct 01:00 - 01:30
  • Aviation Cybersecurity: Beyond The Runway Elizabeth Wharton  |   Prevailion, Inc.   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 01:00 to 01:30

    Aviation Cybersecurity: Beyond The Runway

    Ticketing system glitches, frequent flyer data breaches, other technology issues highlight that aviation and airports are mini ecosystems, mini cities, where one issue can derail air traffic around the country. Connected devices, data, and networks improve safety and efficiency but provide a larger security attack surface. Former senior technology attorney for the World’s Busiest Airport and current VP of Strategy, Prevailion (a cyber threat intelligence company), Elizabeth will discuss the evolving approach to protecting the systems and technology in aviation, beyond the aircraft and runways.

    Speaker

    Photo Speaker Name Profile
    Elizabeth Wharton Elizabeth Wharton View Profile
  • Thu 18th Oct 01:40 - 02:10
  • GDPR/CCPA Crash Course: What You Need to Know About Current Privacy Regulations

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 01:40 to 02:10

    GDPR/CCPA Crash Course: What You Need to Know About Current Privacy Regulations

    Data Privacy is currently one of the hottest topics within information security.  For this session, attendees will get a crash course in the European Union (EU) General Data Protection Regulation (GDPR) which recently went into enforcement. This session will cover trends and insights garnered from working in the field preparing customers to comply with these regulations.

  • Thu 18th Oct 02:20 - 03:30
  • Student Session

    Network Security, Ransomware & IOT Theatre

    Thu 18th Oct 02:20 to 03:30

    Student Session

    In this session we are offering those people in full-time study in computer science and cyber security related education the chance to access the conference to help them on their journey towards qualification and ultimately employment. These 15 minute lightning slots sessions delivered by cyber security professionals offer students a chance to gain insights into a career in information security and speak to professionals already working in the industry.

Top