Agenda

  • Wed 26th Sep 08:30 - 09:20
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things Theresa Payton  |   Fortalice Solutions  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 08:30 to 09:20

    Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    New technologies are in the news every day but is it all just hype or a true workplace reality? Are you leveraging Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning & the Internet of Things as part of your go to market strategy? You may wonder, are these data elements safe from hackers? Payton explains how to harness these newer technologies to achieve business goals while incorporating safeguards to fight cybercriminals and how the Blockchain could be your new security BFF and how Cryptocurrency, AI, and the Internet of Things have quickly become key drivers of global change.

    Speaker

    Photo Speaker Name Profile
    Theresa Payton Theresa Payton View Profile
  • Wed 26th Sep 09:30 - 10:00
  • Is the New Cybercriminal Mafia Winning? Recruitment, Retention and the Hire Marcin Kleczynski  |   Malwarebytes  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 09:30 to 10:00

    Is the New Cybercriminal Mafia Winning? Recruitment, Retention and the Hire

    Without question, cybercriminals are the New Mafia of today’s world. The manner in which they operate is very similar to the traditional mafia of decades past. Today, there is an ongoing cybersecurity talent gap. And, cybercriminals are taking notice and capitalizing on white hat shortcomings. At the same time, it’s becoming increasingly hard to hire the right people with the acumen, training and know-how to protect today’s enterprises from security threats. Is the new cybercriminal mafia stealing all the good security talent? And, how?

    Speaker

    Photo Speaker Name Profile
    Marcin Kleczynski Marcin Kleczynski View Profile
  • Brought to you by Darktrace

    Network Security and Ransomware Theatre

    Wed 26th Sep 09:30 to 10:00

  • Brought to you by BAE Systems

    IoT Security Theatre

    Wed 26th Sep 09:30 to 10:00

  • Brought to you by Bomgar

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 09:30 to 10:00

  • Brought to you by BlackDuck

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 26th Sep 09:30 to 10:00

  • How to Build Effective Defensive Strategies Against Privileged Attacks Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 09:30 to 10:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

    Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 26th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Keith Rayle   |   Fortinet, Inc.  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Keith Rayle Keith Rayle View Profile
  • Brought to you by Cisco

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:10 to 10:40

  • Wed 26th Sep 10:30 - 11:20
  • Brought to you by Cisco Meraki

    Cyber Hack Theatre

    Wed 26th Sep 10:30 to 11:20

  • Wed 26th Sep 10:50 - 11:20
  • Brought to you by Forrester Research Nick Hayes  |   Forrester Research  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 10:50 to 11:20

    Speaker

    Photo Speaker Name Profile
    Nick Hayes Nick Hayes View Profile
  • Brought to you by eSentire

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:50 to 11:20

  • Brought to you by Cisco Meraki

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:50 to 11:20

  • Brought to you by IBM Security

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 26th Sep 10:50 to 11:20

  • Wed 26th Sep 11:30 - 12:00
  • Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason) Roy Katmor  |   enSilo  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 11:30 to 12:00

    Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason)

    The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?

    Speaker

    Photo Speaker Name Profile
    Roy Katmor Roy Katmor View Profile
  • When cloud migrations become an annual event, what does it mean for IAM, PAM and audit? David Dingwall  |   HelpSystems  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 11:30 to 12:00

    When cloud migrations become an annual event, what does it mean for IAM, PAM and audit?

    With the fast pace of development, companies are continually re-assessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.

    With public cloud price plans moving quickly, the technology for live migrations is also tantalizingly close to becoming frictionless. Keeping control of this shifting sand of technology stacks while keeping your business units under control poses new challenges for all who are involved in IAM, PAM, cloud provisioning, or audit.

    Speaker

    Photo Speaker Name Profile
    David Dingwall David Dingwall View Profile
  • Brought to you by Forcepoint

    Cyber Hack Theatre

    Wed 26th Sep 11:30 to 12:10

  • Wed 26th Sep 13:40 - 14:10
  • Brought to you by Akamai Technologies Dave Lewis  |   Akamai Technologies   |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason) Roy Katmor  |   enSilo  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 26th Sep 13:40 to 14:10

    Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason)

    The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?

    Speaker

    Photo Speaker Name Profile
    Roy Katmor Roy Katmor View Profile
  • Wed 26th Sep 14:20 - 14:50
  • Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation Sandra Fathi  |   Affect  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 14:20 to 14:50

    Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation

    Cyber attacks can be devastating - resulting in loss of revenue, interrupted business continuity and significant damages to brand reputation and corporate morale. Incident response is no longer relegated to the IT department and must involve executives across the entire organization – from the board to the marketing department to technical teams.
    This session will address the critical tactics involved in communicating a cybersecurity incident to the public - focusing on the orchestration of technical, legal and communications executives. Sandra Fathi, president of Affect, will lead an interactive discussion on the corporate communications challenges that executives face in a cybersecurity incident.

    Speaker

    Photo Speaker Name Profile
    Sandra Fathi Sandra Fathi View Profile
  • Thu 27th Sep 08:30 - 09:20
  • Brought to you by Center for the National Interest George Beebe  |   Center for the National Interest  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 08:30 to 09:20

    Speaker

    Photo Speaker Name Profile
    George Beebe George Beebe View Profile
  • Thu 27th Sep 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Brought to you by Forcepoint

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 09:30 to 10:00

  • Thu 27th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Keith Rayle   |   Fortinet, Inc.  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Keith Rayle Keith Rayle View Profile
  • Brought to you by Cisco

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 10:10 to 10:40

  • Thu 27th Sep 10:50 - 11:20
  • Using Home-Court Advantage to Transform Your Security Approach Dr. Rajiv Ramaswami   |   VMware  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 10:50 to 11:20

    Using Home-Court Advantage to Transform Your Security Approach

    When it comes to cyber security, the attacker is in an advantageous position. Defense is harder than offense and we’re fighting an asymmetrical battle. But we do have one piece of information the attacker doesn’t. We have exclusive knowledge of how our apps and data should behave on our own infrastructure. This knowledge can be used to create a home-court advantage that gives us crucial leverage and reduces our attack surface.
     
    Find out how the unique properties of cloud and mobile can be used to enable new security models never before possible – providing critical insights for that home court advantage.

    Speaker

    Photo Speaker Name Profile
    Dr. Rajiv Ramaswami Dr. Rajiv Ramaswami View Profile
  • Brought to you by IBM Security

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:50 to 11:20

  • Thu 27th Sep 13:40 - 14:10
  • Do you know your vendor dependencies? Elizabeth Zalman  |   strongDM  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 13:40 to 14:10

    Do you know your vendor dependencies?

    You're only as secure as your weakest link. That includes not only your employees, but your vendors and their employees too. Most companies have no idea how many systems and people have access to their data. You can't protect your data if you can't tell who has access to it, nor what they're doing with it. In this talk, I'll share practical examples of breaches I've personally experienced along with advice on how to hold your vendors accountable.

    Speaker

    Photo Speaker Name Profile
    Elizabeth Zalman Elizabeth Zalman View Profile
Top