Cloud, Mobile & IAM

In recent years there has been a cultural shift supporting an increasingly mobile and flexible workforce enabled by technologies such as Cloud. This has not only made having a robust IAM strategy more essential but also increasingly more challenging. This theater provides tips for best practice when setting your strategy and examples of mistakes to avoid.

Cloud, Mobile & IAM Speakers

Adrienne McEwan
Adrienne McEwan

Cloud Security CSE Cisco

View

Adrienne McEwan

Adrienne McEwan is a Consulting Systems Engineer at Cisco with several years worth of product knowledge pertaining to Internet based threats.  She worked on the Content Security team solidifying her knowledge with Web and Email based threats before transitioning to the Cloud Security team where she now focuses on DNS, Web, and Cloud application based threats. Adrienne is passionate about teaching endusers how to protect themselves from malware, ransomware, phishing, and Oauth attacks. Adrienne lives in the United States where she enjoys hiking, kayaking, and worldwide travel with her daughter.

Alex Reshetniak
Alex Reshetniak

Senior Security Researcher  Lookout

View

Alex Reshetniak

Alex is a Sr. Security Researcher at Lookout, where he focuses on finding and analyzing mobile malware. Prior to joining the company, Alex worked at Deloitte, serving as an information security investigator at a large financial institution. His experience includes malware analysis, forensics, and incident response.

Bryan Christ
Bryan Christ

IAM Sales Engineer Hitachi ID

View

Bryan Christ
David Dingwall
David Dingwall

Senior Cybersecurity Strategist HelpSystems

View

David Dingwall

David has been embedded for three decades within the Identity and Access Management (IAM) marketplace, and with other cybersecurity infrastructures to support multi-national organizations’ business operations and audit requirements. His roles have previously included Consulting Architect, Business Development and Product Marketing. His industry experience includes working with Hi-Tech, Healthcare, Energy, Oil & Gas, FMCG, Manufacturing, Financial Services, Mining organizations and Government police and national security departments.

At HelpSystems David is part of our team of cybersecurity experts. David presents and writes on a variety of topics including cybersecurity industry trends, thought leadership and practical tips for organizations looking to improve their security posture and improve efficiency of security and system operations teams.

David van Schravendijk
David van Schravendijk

Product Marketing Manager Cisco Meraki

View

David van Schravendijk
Kevin Malesky
Kevin Malesky

Cloud Security Specialist Check Point Software

View

Kevin Malesky

Kevin Malesky is a Cloud Practice Leader with Check Point Software.  For over decade, Kevin has been a trusted advisor to industry leading enterprise organizations and partners in the Central U.S. His diverse background ranging from data center technology and security, network virtualization, and expertise in cloud computing has given him a well-rounded understanding of the needs and challenges organizations face on a daily basis. Kevin’s background has given him an appreciation of the unique and significant changes that cloud adoption brings to each individual organization.

Mark Contatore
Mark Contatore

Sr. Manager of Security Solutions Bomgar

View

Mark Contatore

Chris Stoneff came to Bomgar through the acquisition of Lieberman Software where he oversaw product management, quality assurance and technical support, and was responsible for meeting the real-world needs of the company’s customers. Mr. Stoneff has over 20 years of systems administration, consulting, training, and product management experience. An accomplished consultant and technical trainer, he has taught thousands of administrators on fundamental and advanced cybersecurity concepts and technologies.

Otavio Freire
Otavio Freire

CTO/President & Co-Founder SafeGuard Cyber

View

Otavio Freire
Prasidh Srikanth
Prasidh Srikanth

Sr. Product Manager Bitglass

View

Prasidh Srikanth
Todd Bursch
Todd Bursch

Manager, Solution Architects Forcepoint

View

Todd Bursch

Cloud, Mobile & IAM Seminars

  • Wed 26th Sep 09:30 - 10:00
  • In Cyberwarfare, Speed Heals Mark Contatore  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 09:30 to 10:00

    In Cyberwarfare, Speed Heals

    It’s been said that speed kills. But in cyber warfare, speed heals. That’s because with today’s advanced cyberattacks, you need to move faster than the attackers to minimize damage. You can’t stop every threat. Intruders will get in. But once they’re in, the right cybersecurity solution can stop them in their tracks. Think about what usually happens in a cyberattack. Someone breaks in, steals a credential, and sets up shop. What if that attacker came back just one day later and all your passwords were changed and he no longer had access? Attend this presentation to learn how it’s done.

    Speaker

    Photo Speaker Name Profile
    Mark Contatore Mark Contatore View Profile
  • Wed 26th Sep 10:10 - 10:40
  • Cisco Cloud Security: Stepping Into the Cloud with Confidence Adrienne McEwan  |   Cisco  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:10 to 10:40

    Cisco Cloud Security: Stepping Into the Cloud with Confidence

    Learn how Cisco’s Cloud Security Solutions can help secure your environment from the network to the cloud protecting everything from end-devices to content stored within sanctioned SaaS applications. Also, find out how attacks are staged and deployed during The Anatomy of An Attack and how Cisco’s Cloud Security Solutions can help you investigate and remediate attacks your environment may face.

    Speaker

    Photo Speaker Name Profile
    Adrienne McEwan Adrienne McEwan View Profile
  • Wed 26th Sep 10:50 - 11:20
  • Yes, You Can Get Burned When Its Cloudy? Kevin Malesky  |   Check Point Software  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:50 to 11:20

    Yes, You Can Get Burned When Its Cloudy?

    The dynamic shift by enterprises to the cloud redefines security posture—how do we secure hybrid environments and dynamic workloads?

    Speaker

    Speaker Name Profile
    Kevin Malesky View Profile
  • Wed 26th Sep 11:30 - 12:00
  • When cloud migrations become an annual event, what does it mean for IAM, PAM and audit? David Dingwall  |   HelpSystems  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 11:30 to 12:00

    When cloud migrations become an annual event, what does it mean for IAM, PAM and audit?

    With the fast pace of development, companies are continually re-assessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.

    With public cloud price plans moving quickly, the technology for live migrations is also tantalizingly close to becoming frictionless. Keeping control of this shifting sand of technology stacks while keeping your business units under control poses new challenges for all who are involved in IAM, PAM, cloud provisioning, or audit.

    Speaker

    Photo Speaker Name Profile
    David Dingwall David Dingwall View Profile
  • Wed 26th Sep 01:00 - 01:30
  • Blowing the cover: Hands-on analysis of handcrafted Android malware Alex Reshetniak  |   Lookout  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 01:00 to 01:30

    Blowing the cover: Hands-on analysis of handcrafted Android malware

    Since the first Android malware was publically reported back in 2010, threat actors and defenders have been playing a continuous game of cat and mouse -- developing their tools, techniques and tactics. While using freely available obfuscators or simply replacing variable names with gibberish are common ways to impede detection and analysis efforts of security researchers, in this talk we will unveil some novel approaches employed by malware authors to conceal their apps’ functionality and stay under the radar. We will cover multiple examples of such techniques, which include storing the payload in a generic, typeless binary file, using a file that looks legitimate, as well as having no visible payload file at all.

    Speaker

    Photo Speaker Name Profile
    Alex Reshetniak Alex Reshetniak View Profile
  • Wed 26th Sep 01:40 - 02:10
  • Adopting an Automation-First Strategy for Identity and Access Management Bryan Christ  |   Hitachi ID   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 01:40 to 02:10

    Adopting an Automation-First Strategy for Identity and Access Management

    Process automation within an IAM environment can be challenging. Many systems that excel at governance and certification tasks are simply not well suited for automation. Many organizations believe their requirements are simply too unique to be automated and/or their existing home grown solutions will suffice. A thorough data cleanup is often advocated for before automation technologies are deployed however this is the wrong approach as such technologies can actually help with the data cleansing effort. In this session we will explore many aspects of IAM automation and deliver concrete recommendations towards achieving the goal of identity management automation.

    Speaker

    Photo Speaker Name Profile
    Bryan Christ Bryan Christ View Profile
  • Wed 26th Sep 02:20 - 02:50
  • Surviving the Cloud: How Big is Your Risk? Prasidh Srikanth  |   Bitglass   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 02:20 to 02:50

    Surviving the Cloud: How Big is Your Risk?

    Is your organization moving to the cloud? Is BYOD (bring your own device) a growing trend in your workplace? Do you have users accessing corporate data from around the world? During this session, we will talk about cloud adoption's incredible momentum in the enterprise. Come learn about the security threats that organizations face in the cloud by discussing real-world examples. You will also learn how modern security vendors are reacting to cloud migration, adapting to evolving technology trends, and positioning themselves for a secure tomorrow.

    Speaker

    Photo Speaker Name Profile
    Prasidh Srikanth Prasidh Srikanth View Profile
  • Thu 27th Sep 09:30 - 10:00
  • Microsoft Office 365 – Make it a Secure Journey for Digital Transformation Todd Bursch  |   Forcepoint   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 09:30 to 10:00

    Microsoft Office 365 – Make it a Secure Journey for Digital Transformation

    Office 365 adoption is continuing at a strong pace, and is often the corner stone for a company’s digital transformation journey.  The decision to implement Office 365 is often a top-down decision, resulting in lack of awareness in terms of security and capabilities when the platform is initially rolled out.  However, this rapid change puts pressure on departments to adapt, exposes weaknesses, and creates new security challenges as IT remodels its security posture to protect the new ecosystem.

    This session will provide insights into how only Forcepoint can secure Office 365 and all your other SaaS applications.

    Speaker

    Photo Speaker Name Profile
    Todd Bursch Todd Bursch View Profile
  • Thu 27th Sep 10:10 - 10:40
  • Cisco Cloud Security: Stepping Into the Cloud with Confidence Adrienne McEwan  |   Cisco  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 10:10 to 10:40

    Cisco Cloud Security: Stepping Into the Cloud with Confidence

    Learn how Cisco’s Cloud Security Solutions can help secure your environment from the network to the cloud protecting everything from end-devices to content stored within sanctioned SaaS applications. Also, find out how attacks are staged and deployed during The Anatomy of An Attack and how Cisco’s Cloud Security Solutions can help you investigate and remediate attacks your environment may face.

    Speaker

    Photo Speaker Name Profile
    Adrienne McEwan Adrienne McEwan View Profile
  • Thu 27th Sep 10:50 - 11:20
  • Empower Your Workforce by Securing Mobile Technology Otavio Freire  |   SafeGuard Cyber  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 10:50 to 11:20

    Empower Your Workforce by Securing Mobile Technology

    The reality is enterprise employees are using mobile apps on their own to do their work more efficiently, especially with international clients. This discussion will present ways in which management can secure these new technologies and align cybersecurity protocols with employee realities

    Speaker

    Photo Speaker Name Profile
    Otavio Freire Otavio Freire View Profile
  • Thu 27th Sep 11:30 - 12:00
  • Preparing for the Unthinkable David van Schravendijk  |   Cisco Meraki   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 11:30 to 12:00

    Preparing for the Unthinkable

    Past performance is no guarantee of future results. There are many trends in the cybersecurity landscape, that will be different tomorrow. Security professionals can effectively prepare themselves for unknown future events by delivering high-power Cisco security technologies via an all-inclusive, unique cloud-managed platform. This session will show you how new threats can be prevented dynamically without needing to configure or modify a network.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
Top