Network Security and Ransomware

The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving Ransomware.

Network Security and Ransomware Speakers

Aamir Lakhani
Aamir Lakhani

Senior Security Strategy  Fortinet

View

Aamir Lakhani

Aamir Lakhani is a cyber security researcher and practitioner, with over 10 years of experience in the security industry. He is responsible to provide IT security solutions to major commercial and federal enterprise organizations. Lakhani has designed cyber solutions for defense and intelligence agencies, and has assisted organizations in defending themselves from active strike back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware and advanced persistent threat (APT) research.

Andy Singer
Andy Singer

VP Product Marketing enSilo

View

Andy Singer
Dan Larson
Dan Larson

Vice President of Product Marketing CrowdStrike

View

Dan Larson
Dave Ostertag
Dave Ostertag

Global Investigations Manager, Investigative Response Verizon

View

Dave Ostertag
David Gold
David Gold

Vice President, Solutions Architecture ProtectWise

View

David Gold
Doug Lhotka
Doug Lhotka

Cyber Security Architect IBM

View

Doug Lhotka

Doug leads the IBM North America Security Architect program. As a practicing security architect, he leverages his expertise in cyber and cognitive security, IT governance and enterprise architecture to help organizations enable strategic business initiatives through their security program, address industrialized threats, and improve the risk posture of the business.

After earning an undergraduate degree in Computer Science, Anthropology, and Psychology/Cognitive Science, he earned a Master of Engineering in Engineering Management, both from the University of Colorado. His research work focused on architectural risk management in what is now called cloud. Over more than 25 years, he has worked with clients of all sizes in the retail, oil & gas, transportation, media and entertainment, healthcare, government, energy & utility, telecommunications, financial services and insurance industries.

He has served on the advisory board for the Engineering Management program at the University of Colorado and is a member of ISC2, a senior member of IEEE. He has been awarded several patents and authored papers on subjects ranging from human computer interaction to architecture governance. An accomplished speaker and author, including a recent book on 3D printing for fine art, his latest book, tentatively titled Cyber Security: Beyond Controls is in development.

An avid outdoorsman, Doug lives in Colorado with his wife and their four-footed & hoofed children. He spends as much of his time as he can not doing security work in the Rocky Mountains.

Georgiana Wagemann
Georgiana Wagemann

Regional Director Darktrace

View

Georgiana Wagemann
Joe Rogalski
Joe Rogalski

Senior Director, Sales Engineering (North America) eSentire

View

Joe Rogalski
Mike Jack
Mike Jack

Senior Manager of Product Marketing of Spirent Communications, Security Business Unit Spirent

View

Mike Jack
Mike Shine
Mike Shine

Manager, Systems Engineering Mimecast

View

Mike Shine

Mike has over 15 years’ experience designing and implementing IT security solutions for major commercial organizations and he’s currently focused on making e-mail safer for businesses.  He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s global headquarters in Watertown, MA.   Mike holds a degree in Computer Engineering from Valparaiso University and was born and raised on the south side of Chicago.

Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Network Security and Ransomware Seminars

  • Wed 26th Sep 09:30 - 10:00
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Georgiana Wagemann  |   Darktrace   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 09:30 to 10:00

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

    Speaker

    Photo Speaker Name Profile
    Georgiana Wagemann Georgiana Wagemann View Profile
  • Wed 26th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Aamir Lakhani  |   Fortinet  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Aamir Lakhani Aamir Lakhani View Profile
  • Wed 26th Sep 10:50 - 11:20
  • Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations Joe Rogalski  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 10:50 to 11:20

    Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations

    While recent trends have shown attackers are using simple tools and tactics for data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact on an organization’s bottom line in 2018. Commodity threats continue to make the case for investment in preventative technologies and stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Minimizing the detection to response timeframe is critical for an organization to not only detect threats, but contain and respond in a timeframe that minimizes the potential risk of affecting their clients and suffering the implications of compliance violations.

    Speaker

    Photo Speaker Name Profile
    Joe Rogalski Joe Rogalski View Profile
  • Wed 26th Sep 11:30 - 12:00
  • Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason) Andy Singer  |   enSilo   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 11:30 to 12:00

    Everything you always wanted to know about incident response (*but were afraid to ask and for a good reason)

    The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?

    Speaker

    Photo Speaker Name Profile
    Andy Singer Andy Singer View Profile
  • Wed 26th Sep 01:00 - 01:30
  • Defense in depth: Achieving Detection and Response Everywhere David Gold  |   ProtectWise   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 01:00 to 01:30

    Defense in depth: Achieving Detection and Response Everywhere

    Past and current breaches have proven that a prevention-only strategy can’t ensure 100% protection. EDR has changed the game on the endpoint to provide complete visibility and forensics to find threats sooner, investigate their impact, and prevent them from happening again. Network Detection and Response (NDR) allows organizations to benefit from full packet forensics, threat detection and incident response workflows across the entire network - from traditional enterprise, to cloud, to industrial environments. By bringing together EDR and NDR we can enable the next generation of SOC analysts to gain complete visibility, detection and response from endpoint to network.

    Speaker

    Photo Speaker Name Profile
    David Gold David Gold View Profile
  • Wed 26th Sep 01:40 - 02:10
  • Lessons Learned from High Profile Breaches – And How to Stop the Next One Dan Larson  |   CrowdStrike   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 01:40 to 02:10

    Lessons Learned from High Profile Breaches – And How to Stop the Next One

    This exclusive session delves into details of some of CrowdStrike’s most eye-opening breach investigations of the past year, and their implications for organizations of all sizes, regardless of their industry or country of origin. Also: New research on “breakout time” –the time from initial  intrusion to the first signs of lateral movement that  precede a breach –and what defenders must do to respond before adversaries can press their attack.

    What the audience will learn:
    Dan will provide insights into the new methods of attacks such as credential theft and whitelist bypassing and other real-world examples of attacks against organizations. Attendees will learn the countermeasures that can be implemented to prevent such attacks.  

    Another take away for attendees is the meaning behind “breakout time”, and what it takes to respond in time to protect an organization’s data and networks.

    Speaker

    Photo Speaker Name Profile
    Dan Larson Dan Larson View Profile
  • Wed 26th Sep 02:20 - 02:50
  • Proactive Security: Data Breach Assessment Mike Jack  |   Spirent   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 26th Sep 02:20 to 02:50

    Proactive Security: Data Breach Assessment

    Cybersecurity is an ever-evolving target as attack techniques become more complex and aggressive. You’ve invested time, money, and effort in securing your organization. You’ve deployed firewalls, endpoint protection, intrusion prevention, and more. But how do you know if your organization is truly secure? No matter what security solutions are in place, the challenge is addressing the true unknowns of cybersecurity. This session will describe how adding data breach assessments to your cybersecurity arsenal can prepare you for inevitable security incidences and you will learn how automation can help your organization regularly—and rigorously—keep your defenses tuned and ready. 

    Speaker

    Photo Speaker Name Profile
    Mike Jack Mike Jack View Profile
  • Wed 26th Sep 03:30 - 04:30
  • MEETUP: Women in Cyber Secuirty

    Network Security and Ransomware Theatre

    Wed 26th Sep 03:30 to 04:30

  • Thu 27th Sep 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 27th Sep 10:10 - 10:40
  • Machine vs. Malware - Artificial Intelligence Workings Aamir Lakhani  |   Fortinet  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:10 to 10:40

    Machine vs. Malware - Artificial Intelligence Workings

    It has never been easier for cybercriminals to build and deliver malicious software. With the ability to hire DarkWeb software engineers or simply purchase malware generating software, CISOs are challenged to keep up. Artificial Intelligence (AI) has emerged as a tool that will turn the tide and enable human resource-constrained security programs. This session will trace the history of AI and provide an insight into the workings of it. An example of a security-focused AI system will be examined and discussed in detail.

    Speaker

    Photo Speaker Name Profile
    Aamir Lakhani Aamir Lakhani View Profile
  • Thu 27th Sep 10:50 - 11:20
  • Chicken Little has left the room: Security Beyond Fear Doug Lhotka  |   IBM  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 10:50 to 11:20

    Chicken Little has left the room: Security Beyond Fear

    We’ve been managing risk in our business for hundreds of years, yet we continue to treat cyber threats as a special case. While it’s true that we’re in a time of escalating, industrialized threats, organizations still react and lurch from one crisis to another, cobbling together a security program based on yesterdays crisis. It’s time we move from a reactive, fear and compliance based program, to a business focused, risk-based approach to cyber security.

    Speaker

    Photo Speaker Name Profile
    Doug Lhotka Doug Lhotka View Profile
  • Thu 27th Sep 11:30 - 12:00
  • Focus Security where it Matters Most Dave Ostertag  |   Verizon   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 11:30 to 12:00

    Focus Security where it Matters Most

    Enterprises are navigating the perfect storm of digital convergence, struggling to enable digitization across every area of their business while also maintaining a secure environment. The attack surface has expanded, increasing internal/external pressure and security program complexity, while making it nearly impossible to prove return on investment or effectively quantify actual mitigation of risk.
     

    Speaker

    Photo Speaker Name Profile
    Dave Ostertag Dave Ostertag View Profile
  • Thu 27th Sep 01:00 - 01:30
  • The Anatomy of an Email-Borne Attack Mike Shine  |   Mimecast  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 01:00 to 01:30

    The Anatomy of an Email-Borne Attack

    Let's face it: email is still the biggest entry point into your organization, even in secure environments. Security threats are real and debilitating, and they aren't going away anytime soon.

    Join us for Anatomy of an Email Born Attack, where Mimecast will paint the current threat landscape for email-borne attacks and demonstrate an actual live e-mail based 'hack' in real-time.

    Speaker

    Photo Speaker Name Profile
    Mike Shine Mike Shine View Profile
  • Thu 27th Sep 01:40 - 02:10
  • Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations Joe Rogalski  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 27th Sep 01:40 to 02:10

    Minimizing the detection to recovery time frame: Avoid the potential effects sophisticated threat actors can have on business operations

    While recent trends have shown attackers are using simple tools and tactics for data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact on an organization’s bottom line in 2018. Commodity threats continue to make the case for investment in preventative technologies and stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Minimizing the detection to response time frame is critical for an organization to not only detect threats, but contain and respond in a time frame that minimizes the potential risk of affecting their clients and suffering the implications of compliance violations.

    Speaker

    Photo Speaker Name Profile
    Joe Rogalski Joe Rogalski View Profile
Top