Network Security and Ransomware

Network Security and Ransomware

The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving Ransomware.

Network Security and Ransomware Speakers

Dan Larson
Dan Larson

Vice President of Product Marketing CrowdStrike

View

Dan Larson
Dave Ostertag
Dave Ostertag

Global Investigations Manager, Investigative Response Verizon

View

Dave Ostertag
David Gold
David Gold

Vice President, Solutions Architecture ProtectWise

View

David Gold
Georgiana Wagemann
Georgiana Wagemann

Regional Director Darktrace

View

Georgiana Wagemann
Keith Rayle
Keith Rayle

Strategist Fortinet, Inc.

View

Keith Rayle

Over 20 years of governance and operational security experience. Executive level security consulting, to include program/portfolio creation and management. Provided board level reporting, security strategy creation and implementation, and global business security integrations. Acting CISO and Director of Security for large corporations. Led large multi-project teams at the program level, with oversight of multiple simultaneous and complex implementations of technical security projects. Designed and implemented most aspects of corporate security programs. Assisted large organizations in defining CISO responsibilities and requirements in order to provide alignment of security programs to business operations.

Consulting experience includes delivery of services to include large multi-project/multi-year programs. Provided executive advisory services in a variety of industries, to include retail, aerospace engineering, national/international banking, healthcare, manufacturing, logistics and transportation, federal/state organizations, and others. A wide range of regulatory experience includes PCI, SOX, FFIEC/FIDC, HIPAA, NERC CIP, and security framework knowledge extends to ISO/IEC 27001/27001, NIST, FISMA, OCTAVE and others.

Program level services for customers, including advisement to Fortune 100 executives (CIO and CISO), creation of corporate security programs and strategies, risk program operational definitions and implementation, and delivery of security/privacy framework implementations. Provided all aspects of creating and implementing multi-project technical programs, from requirements gathering to shifting systems into operational SDLC maintenance cycles. Created large risk management frameworks for global enterprises, to include complex operations such as mergers, acquisitions, and divestitures.

21-year military veteran as a nuclear weapons technician, threat officer, OH-58/AH-1/UH-60 pilot and operations officer.

Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Roy Katmor
Roy Katmor

CEO enSilo

View

Roy Katmor

Roy Katmor is the CEO of enSilo. Roy is a 15-year seasoned product manager and security market strategist, combining strong technical knowledge with proven sales and marketing skills. Prior to enSilo, Roy led Akamai’s security strategy. Before that, he managed Imperva’s data security products and architecture management. Additionally, Roy held various product management and R&D leading roles at several international public and privately-held companies. Roy holds a BSc in Information Systems from the Technion, Israel Institute of Technology, and MBA in finance and business strategy from the Hebrew University.

Sean Blenkhorn
Sean Blenkhorn

Vice President, Sales Engineering & Advisory Services eSentire

View

Sean Blenkhorn

Network Security and Ransomware Seminars

  • Wed 26th Sep 09:30 - 10:00
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Georgiana Wagemann  |   Darktrace   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 09:30 to 10:00

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

    Speaker

    Speaker Name Profile
    Georgiana Wagemann View Profile
  • Wed 26th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Keith Rayle   |   Fortinet, Inc.  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Keith Rayle Keith Rayle View Profile
  • Wed 26th Sep 10:50 - 11:20
  • Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations Sean Blenkhorn  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:50 to 11:20

    Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations

    While recent trends have shown attackers are using simple tools and tactics for data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact on an organization’s bottom line in 2018. Commodity threats continue to make the case for investment in preventative technologies and stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Minimizing the detection to response timeframe is critical for an organization to not only detect threats, but contain and respond in a timeframe that minimizes the potential risk of affecting their clients and suffering the implications of compliance violations.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
  • Wed 26th Sep 11:30 - 12:00
  • Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason) Roy Katmor  |   enSilo  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 11:30 to 12:00

    Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason)

    The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?

    Speaker

    Photo Speaker Name Profile
    Roy Katmor Roy Katmor View Profile
  • Wed 26th Sep 13:00 - 13:30
  • Defense in depth: Achieving Detection and Response Everywhere David Gold  |   ProtectWise   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 13:00 to 13:30

    Defense in depth: Achieving Detection and Response Everywhere

    Past and current breaches have proven that a prevention-only strategy can’t ensure 100% protection. EDR has changed the game on the endpoint to provide complete visibility and forensics to find threats sooner, investigate their impact, and prevent them from happening again. Network Detection and Response (NDR) allows organizations to benefit from full packet forensics, threat detection and incident response workflows across the entire network - from traditional enterprise, to cloud, to industrial environments. By bringing together EDR and NDR we can enable the next generation of SOC analysts to gain complete visibility, detection and response from endpoint to network.

    Speaker

    Photo Speaker Name Profile
    David Gold David Gold View Profile
  • Wed 26th Sep 13:40 - 14:10
  • In an era of advanced threats including targeted attacks: Moving from reactive to a proactive security posture using the power of an automated platf... Dan Larson  |   CrowdStrike   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 13:40 to 14:10

  • Thu 27th Sep 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 27th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Keith Rayle   |   Fortinet, Inc.  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Keith Rayle Keith Rayle View Profile
  • Thu 27th Sep 10:50 - 11:20
  • Brought to you by IBM Security

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:50 to 11:20

  • Thu 27th Sep 11:30 - 12:00
  • Focus Security where it Matters Most Dave Ostertag  |   Verizon   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 11:30 to 12:00

    Focus Security where it Matters Most

    Enterprises are navigating the perfect storm of digital convergence, struggling to enable digitization across every area of their business while also maintaining a secure environment. The attack surface has expanded, increasing internal/external pressure and security program complexity, while making it nearly impossible to prove return on investment or effectively quantify actual mitigation of risk.
     

    Speaker

    Speaker Name Profile
    Dave Ostertag View Profile
  • Thu 27th Sep 13:00 - 13:30
  • Brought to you by Mimecast

    Network Security and Ransomware Theatre

    Thu 27th Sep 13:00 to 13:30

  • Thu 27th Sep 13:40 - 14:10
  • Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations Sean Blenkhorn  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 13:40 to 14:10

    Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations

    While recent trends have shown attackers are using simple tools and tactics for data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact on an organization’s bottom line in 2018. Commodity threats continue to make the case for investment in preventative technologies and stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Minimizing the detection to response time frame is critical for an organization to not only detect threats, but contain and respond in a time frame that minimizes the potential risk of affecting their clients and suffering the implications of compliance violations.

    Speaker

    Photo Speaker Name Profile
    Sean Blenkhorn Sean Blenkhorn View Profile
Top