18 - 19 OCTOBER 2017 / McCormick Place, Chicago
  • Wed 18th Oct 08:45 - 09:00
  • The Keynote Theatre

    Wed 18th Oct 08:45 to 09:00

  • Wed 18th Oct 09:00 - 09:40
  • Day One Opening Keynote - To Be Announced Add to Schedule
    -Earn 0.5 CPE Points

    The Keynote Theatre

    Wed 18th Oct 09:00 to 09:40

  • Wed 18th Oct 09:45 - 10:10
  • The State of Internet Security – And Steps to a Safer Future Add to Schedule
    -Earn 0.5 CPE Points Andy Ellis  |   Akamai Technologies  |   The Keynote

    The Keynote Theatre

    Wed 18th Oct 09:45 to 10:10

    The State of Internet Security – And Steps to a Safer Future

    In a world of increasingly sophisticated cyberthreats, getting to a secure web experience can pose a challenge. Citing results of the state of the internet security report, based on his company’s birds eye view of Internet activity, Andy Ellis, Chief Security Officer of Akamai, will help attendees understand the hazards we all face, and the steps forward towards a safer future.

    Speaker

    Photo Speaker Name Profile
    Andy Ellis Andy Ellis View Profile
  • Wed 18th Oct 10:10 - 10:40
  • Next-Gen Application Security Add to Schedule
    -Earn 0.5 CPE Points Alex Mathews  |   Positive Technologies   |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 18th Oct 10:10 to 10:40

    Next-Gen Application Security

    Application security is rapidly moving into top gear. Not only is this caused by ever-evolving attacks aimed at the application layer, but also driven by the constantly growing number and complexity of web applications as a result of digital transformation.

    To stay one step ahead of competitors, companies must deliver value faster, without putting their customers at risk while remaining compliant.

    This takes a fundamental shift in the way application security should be approached: during our session, we’ll share our expert vision of how smart application security strategy should be implemented to protect companies without disrupting their business processes.

    Speaker

    Photo Speaker Name Profile
    Alex Mathews Alex Mathews View Profile
  • Six Steps to Secure Access for Privileged Insiders and Vendors Add to Schedule
    -Earn 0.5 CPE Points Sam Elliott  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 18th Oct 10:10 to 10:40

    Six Steps to Secure Access for Privileged Insiders and Vendors

    Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.

    Speaker

    Photo Speaker Name Profile
    Sam Elliott Sam Elliott View Profile
  • The Hidden Threats of Weak IoT Security within the Enterprise Add to Schedule
    -Earn 0.5 CPE Points Sameer Dixit  |   Spirent  |   IoT Security

    IoT Security Theatre

    Wed 18th Oct 10:10 to 10:40

    The Hidden Threats of Weak IoT Security within the Enterprise

    Most enterprises have Internet of Things (IoT) deployments, whether for data monitoring, supply chain, facility management, or manufacturing processes. Unfortunately, many don’t realize how extensive these deployments actually are—or the attack surface they represent. In fact, IoT deployments have a higher number of security breaches, with costlier consequences, than traditional enterprise breaches. This presentation will describe the current state of IoT security, provide insight into attack methods, and identify unique challenges of securing IoT deployments. Attendees will also receive suggested best practices for securing new IoT deployments, increasing system layer security, or enhancing security in production deployments.

    Speaker

    Photo Speaker Name Profile
    Sameer Dixit Sameer Dixit View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule
    -Earn 0.5 CPE Points Nicole Eagan  |   Darktrace  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 18th Oct 10:10 to 10:40

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Insider Threats Add to Schedule
    -Earn 0.5 CPE Points Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 18th Oct 10:10 to 10:40

    Insider Threats

    The risks of the one can easily outweigh the needs of the many. Privileged account abuse is a leading cause of insider threats in cybersecurity and the risks of one unmanaged privileged account can jeopardize the mission for all others. In this session, we will explore the top privileged account risks, how they can be leveraged against an organization, and security best practices from NIST to PCI that can help ensure that privileged accounts are never dismissed from accountability.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 18th Oct 10:15 - 10:40
  • Cybersecurity in the 4th Industrial Revolution Add to Schedule
    -Earn 0.5 CPE Points Ondrej Vlcek  |   Avast  |   The Keynote

    The Keynote Theatre

    Wed 18th Oct 10:15 to 10:40

    Cybersecurity in the 4th Industrial Revolution

    Today, we are using robotics in production, autonomous vehicles enter our streets and we are ever-connected through mobile devices and home devices around us, including smart TVs, thermostats, smart fridges, and smart toys. The digital world is driven by automation and artificial intelligence. However, we also see technology designed for good purposes being abused for malicious intent. Ondrej Vlcek, Avast EVP&GM, Consumer, and CTO, will explain today’s security risks and talk about how the security industry can stay ahead of cybercriminals, by detecting vulnerabilities in the network, and by leveraging AI and machine learning as a tool to fight back.
     

    Speaker

    Photo Speaker Name Profile
    Ondrej Vlcek Ondrej Vlcek View Profile
  • Wed 18th Oct 11:00 - 11:30
  • No Silver Bullets - Cybersecurity in the Cognitive Era Add to Schedule
    -Earn 0.5 CPE Points Doug Lhotka  |   IBM  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 18th Oct 11:00 to 11:30

    No Silver Bullets - Cybersecurity in the Cognitive Era

    It's no surprise that our organizations are under attack by industrialized threats from highly skilled adversaries.   At same time we're drowning in information, facing a growing skills shortage, and often dealing with security infrastructures from the dark ages.  It's no wonder that the industry is looking for the latest magic bullet, and Cognitive security is now the king of the hype curve.  We'll talk about the threats in more detail, the growing migration from compliance to risk-focused security, and how security is fundamentally an information management problem.  We'll investigate how cognitive technology is being applied in real organizations today, and try to get beyond the marketing and hype to understand this fundamental shift in how we approach cybersecurity.

    Speaker

    Photo Speaker Name Profile
    Doug Lhotka Doug Lhotka View Profile
  • The way we work has changed. Has your security? Add to Schedule
    -Earn 0.5 CPE Points

    IoT Security Theatre

    Wed 18th Oct 11:00 to 11:30

    The way we work has changed. Has your security?

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organisations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This interactive session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture. Presenters will review best practices around the transition of a security architecture itself to the cloud, utilizing customer case studies.

  • M2M: Machine Learning and the war against the machines Add to Schedule
    -Earn 0.5 CPE Points Aamir Lakhani  |   Fortinet  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 18th Oct 11:00 to 11:30

    M2M: Machine Learning and the war against the machines

    Machine Learning is the new buzzword in the cyber security industry. Many security firms are claiming it gives them an advantage in catching cyber threats. How does machine learning work in regards to cyber security? How is used to actually determine a cyber threat? This talk will examine what machine learning means to cyber security, how it is succeeding, and some of the common short comping and challenges it presents.

    Speaker

    Photo Speaker Name Profile
    Aamir Lakhani Aamir Lakhani View Profile
  • Wed 18th Oct 11:15 - 12:00
  • PANEL: The Future of Cyber Security Add to Schedule
    -Earn 0.5 CPE Points Panel  |  The Keynote

    The Keynote Theatre

    Wed 18th Oct 11:15 to 12:00

    Speakers

    Photo Speaker Name Profile
    Colin McKinty Colin McKinty View Profile
    John McClurg John McClurg View Profile
  • Wed 18th Oct 11:40 - 12:10
  • The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk Add to Schedule
    -Earn 0.5 CPE Points David Aucsmith  |   root9B   |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 18th Oct 11:40 to 12:10

    The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk

    The number one technique used by attackers in a data breach is leveraging weak or stolen credentials. To combat this technique, organizations are embracing methods to include multifactor authentication and improved access control for domain administrator accounts. Companies fall short in assessing their pre-attack risk and in failing to take into consideration non-administrator accounts and local accounts. Organizations must implement proactive measures to minimize risk of an attack. Once a breach occurs, it is too late. This talk will address techniques organizations should use to assess risk prior to an attack and
    approaches to better defend the network from credential-based attacks.

    Speaker

    Photo Speaker Name Profile
    David Aucsmith David Aucsmith View Profile
  • Brought to you by Fox Technologies Add to Schedule
    -Earn 0.5 CPE Points

    Cloud, Mobile & IAM Theatre

    Wed 18th Oct 11:40 to 12:10

  • Brought to you by Cisco Meraki Add to Schedule
    -Earn 0.5 CPE Points

    IoT Security Theatre

    Wed 18th Oct 11:40 to 12:10

  • Layered Security is expensive and isn’t reliable – So how can Automated Endpoint Response be the Answer? Add to Schedule
    -Earn 0.5 CPE Points Jeffrey Duran   |   enSilo  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 18th Oct 11:40 to 12:10

    Layered Security is expensive and isn’t reliable – So how can Automated Endpoint Response be the Answer?

    Traditional cybersecurity detection and response methods are not working. Attackers consistently find ways to compromise endpoint systems regardless of the time, tools, and expense. It is time to look at the promise and challenges of automated incident response and how autoIR will reduce your security operations costs.

    Speaker

    Photo Speaker Name Profile
    Jeffrey Duran Jeffrey Duran View Profile
  • Wed 18th Oct 12:20 - 12:50
  • To Pay or Not to Pay, That Should Never Be the Question Add to Schedule
    -Earn 0.5 CPE Points Eldon Sprickerhoff  |   eSentire  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 18th Oct 12:20 to 12:50

    To Pay or Not to Pay, That Should Never Be the Question

    Until recently, ransomware is something many of us heard about, but never had to deal with. But with recent strains like WannaCry and Petya, firms that handle high-value information must ensure they have the proper defenses in place. In this session, eSentire’s Chief Security Strategist and Founder, Eldon Sprickerhoff reviews the risks of ransomware and provides best practices for protecting against the inevitable breach.

    Speaker

    Photo Speaker Name Profile
    Eldon Sprickerhoff Eldon Sprickerhoff View Profile
  • Wed 18th Oct 13:15 - 13:40
  • HUNT: Securing the Commercial Sector Since 2013 Add to Schedule
    -Earn 0.5 CPE Points Michael Morris  |   Root9B  |   The Keynote

    The Keynote Theatre

    Wed 18th Oct 13:15 to 13:40

    HUNT: Securing the Commercial Sector Since 2013

    The current approach of cybersecurity is not working. This has been made abundantly clear by the multitude of recent media reports and breaches. The damage caused by these events has affected every business sector: energy, retail, manufacturing, finance, medical, insurance, private and public. As the organization that first introduced proactive HUNT operations to the commercial community, root9B has developed and refined their proprietary capabilities and methodologies to facilitate the necessary shift from automated passive technologies. Learn how many organizations within the cyber community are embracing the future that HUNT provides.

    Speaker

    Photo Speaker Name Profile
    Michael Morris Michael Morris View Profile
  • Wed 18th Oct 13:45 - 14:10
  • Overhauling your recruiting and retention strategy for cyber security Add to Schedule
    -Earn 0.5 CPE Points Blake Angove  |   LaSalle Network  |   The Keynote

    The Keynote Theatre

    Wed 18th Oct 13:45 to 14:10

    Overhauling your recruiting and retention strategy for cyber security

    The war for cyber security talent is tight. If you’re looking to attract the best and the brightest, and retain them for the long term, this is the session for you. You will get real tips and actionable solutions for how to recruit top talent and keep them engaged.

    Speaker

    Photo Speaker Name Profile
    Blake Angove Blake Angove View Profile
  • Wed 18th Oct 14:20 - 14:50
  • Defending against Email Borne Cyber-Attacks Add to Schedule
    -Earn 0.5 CPE Points Mike Shine  |   Mimecast  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 18th Oct 14:20 to 14:50

    Defending against Email Borne Cyber-Attacks

    91% of attacks start with an Email.  In this session we’ll review the six most common email-borne attacks, including spear-phishing, credential phishing, weaponized attachments, URL hijacking and a ROPEMAKER, a newly-discovered remote CSS phishing technique.  Simple prevention techniques will be shared with the audience.

    Speaker

    Photo Speaker Name Profile
    Mike Shine Mike Shine View Profile
  • Wed 18th Oct 15:15 - 15:40
  • Brought to you by FBI Chicago Add to Schedule
    -Earn 0.5 CPE Points Daniel Wierzbicki  |   FBI - Chicago Division  |   The Keynote

    The Keynote Theatre

    Wed 18th Oct 15:15 to 15:40

    Speaker

    Photo Speaker Name Profile
    Daniel Wierzbicki Daniel Wierzbicki View Profile
  • Thu 19th Oct 08:45 - 09:00
  • The Keynote Theatre

    Thu 19th Oct 08:45 to 09:00

  • Thu 19th Oct 09:45 - 10:10
  • Machine Learning’s Effect on Cybersecurity Add to Schedule
    -Earn 0.5 CPE Points Ed Cabrera  |   Trend Micro  |   The Keynote

    The Keynote Theatre

    Thu 19th Oct 09:45 to 10:10

    Machine Learning’s Effect on Cybersecurity

    Find out how the use of machine learning changing the security industry – both in the way malicious threats are deployed and in the ability of the industry to detect and block attacks in-line in real-time.  Join, Chief Cybersecurity Officer of Trend Micro as he describes our need for layered threat detection and how the machine learning trend will continue to shape cybersecurity over the next several years.
     

    Speaker

    Photo Speaker Name Profile
    Ed Cabrera Ed Cabrera View Profile
  • Thu 19th Oct 10:10 - 10:40
  • Understanding and evaluating IoT in today’s organizations Add to Schedule
    -Earn 0.5 CPE Points Chris Martincavage  |   BAE Systems  |   IoT Security

    IoT Security Theatre

    Thu 19th Oct 10:10 to 10:40

    Understanding and evaluating IoT in today’s organizations

    IoT is everywhere watching and interacting with us dozens of times a day.  We use and rely on these technologies every day, but what is the risk we expose ourselves to by using these devices? How do we properly identify and assess the risks they introduce to our organization? During this session, we will examine common IoT use cases, understand where the threats exist in these technologies, how to evaluate these technologies, and what considerations you should be thinking about when looking at implementing IoT technologies.

    Speaker

    Photo Speaker Name Profile
    Chris Martincavage Chris Martincavage View Profile
  • Managing Privilege Risks Add to Schedule
    -Earn 0.5 CPE Points Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 19th Oct 10:10 to 10:40

    Managing Privilege Risks

    Despite continued investments in IT security, many organizations still struggle to identify real, critical risks buried within massive amounts recommendations and internally generated data. CISOs need to focus on strategies that assess, prioritize, and address both internal and external risks in business context. Please join our presentation to discuss the top 6 methods to manage these risks. We will cover how aligning vulnerability management and privilege management programs can shed new light on risk in terms of compliance, asset integrity, data confidentiality, and other unique business requirements, while enabling IT and security teams to efficiently collaborate on risk reduction efforts enterprise-wide.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 19th Oct 11:00 - 11:30
  • The way we work has changed. Has your security? Add to Schedule
    -Earn 0.5 CPE Points

    IoT Security Theatre

    Thu 19th Oct 11:00 to 11:30

    The way we work has changed. Has your security?

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organisations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This interactive session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture. Presenters will review best practices around the transition of a security architecture itself to the cloud, utilizing customer case studies.

  • M2M: Machine Learning and the war against the machines Add to Schedule
    -Earn 0.5 CPE Points Aamir Lakhani  |   Fortinet  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 19th Oct 11:00 to 11:30

    M2M: Machine Learning and the war against the machines

    Machine Learning is the new buzzword in the cyber security industry. Many security firms are claiming it gives them an advantage in catching cyber threats. How does machine learning work in regards to cyber security? How is used to actually determine a cyber threat? This talk will examine what machine learning means to cyber security, how it is succeeding, and some of the common short comping and challenges it presents.

    Speaker

    Photo Speaker Name Profile
    Aamir Lakhani Aamir Lakhani View Profile
  • Thu 19th Oct 11:15 - 12:00
  • PANEL: The Future of Identity and Access Management Add to Schedule
    -Earn 0.5 CPE Points Panel  |  The Keynote

    The Keynote Theatre

    Thu 19th Oct 11:15 to 12:00

    PANEL: The Future of Identity and Access Management

    As modern enterprises drive forwards into the digital cloud and mobile first world empowering users to work anywhere and at any time the critical challenge becomes how can you tell who is actually accessing your network? What technologies are available to help balance the growing security requirements against the impatience of the modern user? This landmark panel session will bring together the leading technical brains behind the very latest game changing solutions. Don’t miss this rare opportunity to hear from the world class experts who can help you plot a path through to finally and securely embracing the digital era.

    Speakers

    Photo Speaker Name Profile
    Bill Mann Bill Mann View Profile
    David Meyer David Meyer View Profile
    Karl McGuinness Karl McGuinness View Profile
    Sachin Gupta Sachin Gupta View Profile
  • Thu 19th Oct 11:40 - 12:10
  • The Future of Cyber Technologies, App&Sec, and DevOps: Importance of Application Security in DevOps Add to Schedule
    -Earn 0.5 CPE Points Tej Aulakh  |   Spirent Communications  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 19th Oct 11:40 to 12:10

    The Future of Cyber Technologies, App&Sec, and DevOps: Importance of Application Security in DevOps

    Most organizations have well-established software development lifecycle (SDLC) processes for analysis, design, development, testing and production releases of software products and packages. But typically rely on the costlier approach of software patching to fix the security related issues. Furthermore, with the upsurge of DevOps, rapid application delivery is dramatically shifting the approach of integrated security processes during continuous integration (CI) and continuous delivery (CD) with increased focus on agility, speed, and innovation. Thus, DevOps requires a fundamental transformation in the implementation of secure coding practices to make security a vital part of development in the early stages of the SDLC. This presentation will discuss the security steps that organizations can take to develop and deploy secure applications with the convergence of DevOps. Attendees will learn about the key challenges in structural and process barriers, best practices for secure application development and steps to enhance the integration between application security and DevOps.

    Speaker

    Photo Speaker Name Profile
    Tej Aulakh Tej Aulakh View Profile
  • Thu 19th Oct 13:45 - 14:45
  • Phishing, Vishing and SmSHing – Oh my! The way you get hacked daily Add to Schedule
    -Earn 1 CPE Point Christopher Hadnagy  |   Social Engineer Inc  |   The Keynote

    The Keynote Theatre

    Thu 19th Oct 13:45 to 14:45

    Phishing, Vishing and SmSHing – Oh my! The way you get hacked daily

    The world of hacking has taken a turn to the human element. With more than 90% of all breaches involving phishing as a vector, social engineering is a new buzzword on everyone’s tongues. What is social engineering? Are you really secure? Is there any protection?

    Speaker

    Photo Speaker Name Profile
    Christopher Hadnagy Christopher Hadnagy View Profile
  • Thu 19th Oct 14:20 - 14:50
  • GDPR is a ticking time bomb – What CISOs need to know, and do, to get prepared” Add to Schedule
    -Earn 0.5 CPE Points Gary Southwell  |   CSPi  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 19th Oct 14:20 to 14:50

    GDPR is a ticking time bomb – What CISOs need to know, and do, to get prepared”

    The countdown to GDPR is on and companies are just now thinking about how to ensure their incident response strategies can meet data privacy compliance requirements, especially the strict 72-hour breach notification.  Not meeting this requirement leaves organizations subject to staggering fines in addition to lost business.  More confusing is how GDPR impacts US companies, even if they do not conduct business in the EU. 

    What does a CISO need to know to get their houses in order prior to the May 2018 deadline?

    Luckily, there are best practices to not only help organizations improve their incident investigation techniques but also be ready constantly changing landscape of global data privacy.  

    Speaker

    Photo Speaker Name Profile
    Gary Southwell Gary Southwell View Profile
  • Thu 19th Oct 15:15 - 15:40
  • Establishing a Secure Software Development Program Add to Schedule
    -Earn 0.5 CPE Points Paul Cotter  |   West Monroe Partners  |   The Keynote

    The Keynote Theatre

    Thu 19th Oct 15:15 to 15:40

    Establishing a Secure Software Development Program

    A secure development training program is a requirement under the PCI DSS, yet organizations often do not maximize the value that it can provide.  We’ll discuss how a well-established program can increase development efficiency, provide direct business value, and incite executive sponsorship for continuing and/or expanding investment in the organization’s security program.

    Speaker

    Photo Speaker Name Profile
    Paul Cotter Paul Cotter View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top