• Wed 18th Oct 08:45 - 09:00
  • Welcome Address Add to Schedule

    Keynote Theatre

    Wed 18th Oct 08:45 to 09:00

  • Wed 18th Oct 09:00 - 09:40
  • Day One Opening Keynote - To Be Announced Add to Schedule

    Keynote Theatre

    Wed 18th Oct 09:00 to 09:40

  • Wed 18th Oct 09:45 - 10:10
  • The State of Internet Security – And Steps to a Safer Future Add to Schedule Andy Ellis  |   Akamai Technologies  |   Keynote

    Keynote Theatre

    Wed 18th Oct 09:45 to 10:10

    The State of Internet Security – And Steps to a Safer Future

    In a world of increasingly sophisticated cyberthreats, getting to a secure web experience can pose a challenge. Citing results of the state of the internet security report, based on his company’s birds eye view of Internet activity, Andy Ellis, Chief Security Officer of Akamai, will help attendees understand the hazards we all face, and the steps forward towards a safer future.

    Speaker

    Photo Speaker Name Profile
    Andy Ellis Andy Ellis View Profile
  • Wed 18th Oct 10:10 - 10:40
  • Next-Gen Application Security Add to Schedule Alex Mathews  |   Positive Technologies   |   Future Cyber Tech, Application Security & Devops

    Future Cyber Tech, Application Security & Devops Theatre

    Wed 18th Oct 10:10 to 10:40

    Next-Gen Application Security

    Application security is rapidly moving into top gear. Not only is this caused by ever-evolving attacks aimed at the application layer, but also driven by the constantly growing number and complexity of web applications as a result of digital transformation.

    To stay one step ahead of competitors, companies must deliver value faster, without putting their customers at risk while remaining compliant.

    This takes a fundamental shift in the way application security should be approached: during our session, we’ll share our expert vision of how smart application security strategy should be implemented to protect companies without disrupting their business processes.

    Speaker

    Photo Speaker Name Profile
    Alex Mathews Alex Mathews View Profile
  • Six Steps to Secure Access for Privileged Insiders and Vendors Add to Schedule Sam Elliott  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 18th Oct 10:10 to 10:40

    Six Steps to Secure Access for Privileged Insiders and Vendors

    Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.

    Speaker

    Photo Speaker Name Profile
    Sam Elliott Sam Elliott View Profile
  • The Hidden Threats of Weak IoT Security within the Enterprise Add to Schedule Sameer Dixit  |   Spirent  |   IOT Security Sponsored by Cisco Umbrella

    IOT Security Sponsored by Cisco Umbrella Theatre

    Wed 18th Oct 10:10 to 10:40

    The Hidden Threats of Weak IoT Security within the Enterprise

    Most enterprises have Internet of Things (IoT) deployments, whether for data monitoring, supply chain, facility management, or manufacturing processes. Unfortunately, many don’t realize how extensive these deployments actually are—or the attack surface they represent. In fact, IoT deployments have a higher number of security breaches, with costlier consequences, than traditional enterprise breaches. This presentation will describe the current state of IoT security, provide insight into attack methods, and identify unique challenges of securing IoT deployments. Attendees will also receive suggested best practices for securing new IoT deployments, increasing system layer security, or enhancing security in production deployments.

    Speaker

    Photo Speaker Name Profile
    Sameer Dixit Sameer Dixit View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Nicole Eagan  |   Darktrace  |   Network Security and Ransomware sponsored by Fortinet

    Network Security and Ransomware sponsored by Fortinet Theatre

    Wed 18th Oct 10:10 to 10:40

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Insider Threats Add to Schedule Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 18th Oct 10:10 to 10:40

    Insider Threats

    The risks of the one can easily outweigh the needs of the many. Privileged account abuse is a leading cause of insider threats in cybersecurity and the risks of one unmanaged privileged account can jeopardize the mission for all others. In this session, we will explore the top privileged account risks, how they can be leveraged against an organization, and security best practices from NIST to PCI that can help ensure that privileged accounts are never dismissed from accountability.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 18th Oct 10:15 - 10:40
  • Brought to you by Avast Add to Schedule Vince Steckler  |   Avast  |   Keynote

    Keynote Theatre

    Wed 18th Oct 10:15 to 10:40

    Speaker

    Photo Speaker Name Profile
    Vince Steckler Vince Steckler View Profile
  • Wed 18th Oct 11:00 - 11:30
  • No Silver Bullets - Cybersecurity in the Cognitive Era Add to Schedule Doug Lhotka  |   IBM  |   Future Cyber Tech, Application Security & Devops

    Future Cyber Tech, Application Security & Devops Theatre

    Wed 18th Oct 11:00 to 11:30

    No Silver Bullets - Cybersecurity in the Cognitive Era

    It's no surprise that our organizations are under attack by industrialized threats from highly skilled adversaries.   At same time we're drowning in information, facing a growing skills shortage, and often dealing with security infrastructures from the dark ages.  It's no wonder that the industry is looking for the latest magic bullet, and Cognitive security is now the king of the hype curve.  We'll talk about the threats in more detail, the growing migration from compliance to risk-focused security, and how security is fundamentally an information management problem.  We'll investigate how cognitive technology is being applied in real organizations today, and try to get beyond the marketing and hype to understand this fundamental shift in how we approach cybersecurity.

    Speaker

    Photo Speaker Name Profile
    Doug Lhotka Doug Lhotka View Profile
  • Brought to by Cisco Umbrella Add to Schedule

    IOT Security Sponsored by Cisco Umbrella Theatre

    Wed 18th Oct 11:00 to 11:30

  • Brought to you by Fortinet Add to Schedule

    Network Security and Ransomware sponsored by Fortinet Theatre

    Wed 18th Oct 11:00 to 11:30

  • Wed 18th Oct 11:15 - 12:00
  • PANEL: The Future of Cyber Security Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Wed 18th Oct 11:15 to 12:00

    Speakers

    Photo Speaker Name Profile
    Colin McKinty Colin McKinty View Profile
    John McClurg John McClurg View Profile
  • Wed 18th Oct 11:40 - 12:10
  • Brought to you by root9B Add to Schedule David Aucsmith  |   root9B   |   Future Cyber Tech, Application Security & Devops

    Future Cyber Tech, Application Security & Devops Theatre

    Wed 18th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    David Aucsmith David Aucsmith View Profile
  • Brought to you by Cisco Meraki Add to Schedule

    IOT Security Sponsored by Cisco Umbrella Theatre

    Wed 18th Oct 11:40 to 12:10

  • Layered Security is expensive and isn’t reliable – So how can Automated Endpoint Response be the Answer? Add to Schedule Jeffrey Duran   |   enSilo  |   Network Security and Ransomware sponsored by Fortinet

    Network Security and Ransomware sponsored by Fortinet Theatre

    Wed 18th Oct 11:40 to 12:10

    Layered Security is expensive and isn’t reliable – So how can Automated Endpoint Response be the Answer?

    Traditional cybersecurity detection and response methods are not working. Attackers consistently find ways to compromise endpoint systems regardless of the time, tools, and expense. It is time to look at the promise and challenges of automated incident response and how autoIR will reduce your security operations costs.

    Speaker

    Photo Speaker Name Profile
    Jeffrey Duran Jeffrey Duran View Profile
  • Wed 18th Oct 12:20 - 12:50
  • To Pay or Not to Pay, That Should Never Be the Question Add to Schedule Eldon Sprickerhoff  |   eSentire  |   Network Security and Ransomware sponsored by Fortinet

    Network Security and Ransomware sponsored by Fortinet Theatre

    Wed 18th Oct 12:20 to 12:50

    To Pay or Not to Pay, That Should Never Be the Question

    Until recently, ransomware is something many of us heard about, but never had to deal with. But with recent strains like WannaCry and Petya, firms that handle high-value information must ensure they have the proper defenses in place. In this session, eSentire’s Chief Security Strategist and Founder, Eldon Sprickerhoff reviews the risks of ransomware and provides best practices for protecting against the inevitable breach.

    Speaker

    Photo Speaker Name Profile
    Eldon Sprickerhoff Eldon Sprickerhoff View Profile
  • Wed 18th Oct 13:15 - 13:40
  • Brought to you by root9B Add to Schedule Michael Morris  |   Root9B  |   Keynote

    Keynote Theatre

    Wed 18th Oct 13:15 to 13:40

    Speaker

    Photo Speaker Name Profile
    Michael Morris Michael Morris View Profile
  • Wed 18th Oct 13:45 - 14:10
  • Overhauling your recruiting and retention strategy for cyber security Add to Schedule Blake Angove  |   LaSalle Network  |   Keynote

    Keynote Theatre

    Wed 18th Oct 13:45 to 14:10

    Overhauling your recruiting and retention strategy for cyber security

    The war for cyber security talent is tight. If you’re looking to attract the best and the brightest, and retain them for the long term, this is the session for you. You will get real tips and actionable solutions for how to recruit top talent and keep them engaged.

    Speaker

    Photo Speaker Name Profile
    Blake Angove Blake Angove View Profile
  • Wed 18th Oct 15:15 - 15:40
  • Brought to you by FBI Chicago Add to Schedule Daniel Wierzbicki  |   FBI - Chicago Division  |   Keynote

    Keynote Theatre

    Wed 18th Oct 15:15 to 15:40

    Speaker

    Photo Speaker Name Profile
    Daniel Wierzbicki Daniel Wierzbicki View Profile
  • Thu 19th Oct 08:45 - 09:00
  • Welcome Address Add to Schedule

    Keynote Theatre

    Thu 19th Oct 08:45 to 09:00

  • Thu 19th Oct 09:45 - 10:10
  • Machine Learning’s Effect on Cybersecurity Add to Schedule Ed Cabrera  |   Trend Micro  |   Keynote

    Keynote Theatre

    Thu 19th Oct 09:45 to 10:10

    Machine Learning’s Effect on Cybersecurity

    Find out how the use of machine learning changing the security industry – both in the way malicious threats are deployed and in the ability of the industry to detect and block attacks in-line in real-time.  Join, Chief Cybersecurity Officer of Trend Micro as he describes our need for layered threat detection and how the machine learning trend will continue to shape cybersecurity over the next several years.
     

    Speaker

    Photo Speaker Name Profile
    Ed Cabrera Ed Cabrera View Profile
  • Thu 19th Oct 10:10 - 10:40
  • Understanding and evaluating IoT in today’s organizations Add to Schedule Chris Martincavage  |   BAE Systems  |   IOT Security Sponsored by Cisco Umbrella

    IOT Security Sponsored by Cisco Umbrella Theatre

    Thu 19th Oct 10:10 to 10:40

    Understanding and evaluating IoT in today’s organizations

    IoT is everywhere watching and interacting with us dozens of times a day.  We use and rely on these technologies every day, but what is the risk we expose ourselves to by using these devices? How do we properly identify and assess the risks they introduce to our organization? During this session, we will examine common IoT use cases, understand where the threats exist in these technologies, how to evaluate these technologies, and what considerations you should be thinking about when looking at implementing IoT technologies.

    Speaker

    Photo Speaker Name Profile
    Chris Martincavage Chris Martincavage View Profile
  • Managing Privilege Risks Add to Schedule Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware sponsored by Fortinet

    Network Security and Ransomware sponsored by Fortinet Theatre

    Thu 19th Oct 10:10 to 10:40

    Managing Privilege Risks

    Despite continued investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts recommendations and internally generated data. CISOs need to focus on strategies that assess, prioritize, and address both internal and external risks in business context. Please join our presentation to discuss the top 6 methods to manage these risks. We will cover how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 19th Oct 11:00 - 11:30
  • Brought to you by Cisco Umbrella Add to Schedule

    IOT Security Sponsored by Cisco Umbrella Theatre

    Thu 19th Oct 11:00 to 11:30

  • Brought to you by Fortinet Add to Schedule

    Network Security and Ransomware sponsored by Fortinet Theatre

    Thu 19th Oct 11:00 to 11:30

  • Thu 19th Oct 11:15 - 12:00
  • PANEL: The Future of Identity and Access Management Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Thu 19th Oct 11:15 to 12:00

    PANEL: The Future of Identity and Access Management

    As modern enterprises drive forwards into the digital cloud and mobile first world empowering users to work anywhere and at any time the critical challenge becomes how can you tell who is actually accessing your network? What technologies are available to help balance the growing security requirements against the impatience of the modern user? This landmark panel session will bring together the leading technical brains behind the very latest game changing solutions. Don’t miss this rare opportunity to hear from the world class experts who can help you plot a path through to finally and securely embracing the digital era.

    Speakers

    Photo Speaker Name Profile
    Bill Mann Bill Mann View Profile
    David Meyer David Meyer View Profile
    Karl McGuinness Karl McGuinness View Profile
    Sachin Gupta Sachin Gupta View Profile
  • Thu 19th Oct 13:15 - 13:40
  • Outsmart Hackers with Deep Learning Artificial Intelligence Add to Schedule Guy Caspi  |   Deep Instinct  |   Keynote

    Keynote Theatre

    Thu 19th Oct 13:15 to 13:40

    Outsmart Hackers with Deep Learning Artificial Intelligence

    Deep learning is a novel branch of artificial intelligence inspired by the brain’s ability to learn. It has exhibited groundbreaking results when applied to computer vision, speech, and text understanding. Deep Instinct is the first company to apply deep learning to cybersecurity. Join Guy Caspi, Deep Instinct’s CEO, to learn about the evolution of artificial intelligence and cybersecurity solutions: from legacy, signature-based solutions to newer sandboxing and machine learning-based solutions until deep learning. The session will cover deep learning’s first application to cybersecurity, showcasing the highest accuracy rates in detecting zero-day and APT attacks, offering real-time, proactive protection.

    Speaker

    Photo Speaker Name Profile
    Guy Caspi Guy Caspi View Profile
  • Thu 19th Oct 13:45 - 14:45
  • Phishing, Vishing and SmSHing – Oh my! The way you get hacked daily Add to Schedule Christopher Hadnagy  |   Social Engineer Inc  |   Keynote

    Keynote Theatre

    Thu 19th Oct 13:45 to 14:45

    Phishing, Vishing and SmSHing – Oh my! The way you get hacked daily

    The world of hacking has taken a turn to the human element. With more than 90% of all breaches involving phishing as a vector, social engineering is a new buzzword on everyone’s tongues. What is social engineering? Are you really secure? Is there any protection?

    Speaker

    Photo Speaker Name Profile
    Christopher Hadnagy Christopher Hadnagy View Profile
  • Thu 19th Oct 14:20 - 14:50
  • GDPR is a ticking time bomb – What CISOs need to know, and do, to get prepared” Add to Schedule Gary Southwell  |   CSPi  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 19th Oct 14:20 to 14:50

    GDPR is a ticking time bomb – What CISOs need to know, and do, to get prepared”

    The countdown to GDPR is on and companies are just now thinking about how to ensure their incident response strategies can meet data privacy compliance requirements, especially the strict 72-hour breach notification.  Not meeting this requirement leaves organizations subject to staggering fines in addition to lost business.  More confusing is how GDPR impacts US companies, even if they do not conduct business in the EU. 

    What does a CISO need to know to get their houses in order prior to the May 2018 deadline?

    Luckily, there are best practices to not only help organizations improve their incident investigation techniques but also be ready constantly changing landscape of global data privacy.  

    Speaker

    Photo Speaker Name Profile
    Gary Southwell Gary Southwell View Profile
  • Thu 19th Oct 15:15 - 15:40
  • Establishing a Secure Development Training Program Add to Schedule Paul Cotter  |   West Monroe Partners  |   Keynote

    Keynote Theatre

    Thu 19th Oct 15:15 to 15:40

    Establishing a Secure Development Training Program

    A secure development training program is a requirement under the PCI DSS, yet organizations often do not maximize the value that it can provide.  We’ll discuss how a well-established program can increase development efficiency, provide direct business value, and incite executive sponsorship for continuing and/or expanding investment in the organization’s security program.

    Speaker

    Speaker Name Profile
    Paul Cotter View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top