The Keynote

The keynote programme at Cyber Security Chicago is focused on helping organisations protect themselves and their organisations from cybercrime, cyber terrorism and human factors.

The Keynote Theater at Cyber Security Chicago 2017 saw a deep analysis on the latest attack vectors and techniques hackers, nation states and social engineers are using against organizations like yours. This unique theater showcases some of the best new technologies and practices in the industry, enabling you understand the impact and capabilities of machine learning and artificial intelligence based defences. There is also be some incredibly valuable insight in to building cyber teams and company culture to ensure that the entire organization are working together to stay protected. The programme for 2018 will be a mixture of demonstrations, presentations and panel debates from a world class line up of experts.

The Keynote Speakers

Adrienne McEwan
Adrienne McEwan

Cloud Security CSE Cisco

View

Adrienne McEwan

Adrienne McEwan is a Consulting Systems Engineer at Cisco with several years worth of product knowledge pertaining to Internet based threats.  She worked on the Content Security team solidifying her knowledge with Web and Email based threats before transitioning to the Cloud Security team where she now focuses on DNS, Web, and Cloud application based threats. Adrienne is passionate about teaching endusers how to protect themselves from malware, ransomware, phishing, and Oauth attacks. Adrienne lives in the United States where she enjoys hiking, kayaking, and worldwide travel with her daughter.

Andrew Tsonchev
Andrew Tsonchev

Director of Technology, Darktrace Industrial Darktrace

View

Andrew Tsonchev
Charles Stockwell
Charles Stockwell

CEO  The Security Stronghold

View

Charles Stockwell

Charles Stockwell believes the human element can be your organization's best defense. While typically thought of as the weakest link, Charles has transformed the human element into a proactive security control countless times. He does this as CEO of The Security Stronghold, LLC where his team works with organizations in a variety of industries to transform their security culture and provide other security services, always focusing on the human element first. Charles has been featured in numerous industry publications and is always looking for the next challenge.

Dave Lewis
Dave Lewis

Advisory CISO - Global Duo Security

View

Dave Lewis

Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. Currently, Lewis is a Global Security Advocate for Duo Security. He is the founder of the security site Liquidmatrix Security Digest and cohost of the Liquidmatrix podcast. Lewis writes a column for CSO Online and Forbes.

Dr. Rajiv Ramaswami
Dr. Rajiv Ramaswami

Chief Operating Officer, Products and Cloud Services VMware

View

Dr. Rajiv Ramaswami

Rajiv Ramaswami joined VMware in April 2016 and has joint responsibility with Raghu Raghuram for all VMware’s product and service offerings and centralized services, support and operational functions. In this role, Ramaswami’s primary focus is on VMware’s product offerings. Prior to this role, Ramaswami led VMware’s Networking and Security business as executive vice president and general manager.

 

Before joining VMware, Ramaswami was executive vice president and general manager for the Infrastructure and Networking group at Broadcom Corporation for six years. During his tenure, the business grew from $1.6B to $2.6B and Broadcom became a leader in delivering merchant silicon switching solutions which have now been widely adopted in carrier, data center and enterprise networks, transforming how these networks have been built.

 

He previously served as vice president and general manager for switching, storage, data center and optical business units at Cisco for 8 years, and earlier in his career, worked at Xros (acquired by Nortel), Tellabs, and IBM Research.

 

Ramaswami received his Bachelor’s degree from the Indian Institute of Technology, Madras, of which he is a Distinguished Alumnus, and Masters and Doctorate degrees from the University of California, Berkeley.

Elizabeth Zalman
Elizabeth Zalman

Co-founder & CEO  strongDM

View

Elizabeth Zalman

Elizabeth Zalman is the Co-founder & CEO of strongDM, the definitive data security product. Previously she was Co-Founder and CEO of the cross-device profile company Media Armor. After its acquisition, she served as VP of Analytics at the acquirer, Nomi. Prior to Media Armor, she led the client analytics and media optimization team at Dotomi (now Conversant), generating an annual $500M in incremental revenue for 50 of the IR Top 100. With over 15 years' experience leading data-driven organizations, she is an expert in analytics, data privacy, and security.
 

George Beebe
George Beebe

Director of Intelligence and National Security  Center for the National Interest

View

George Beebe

George Beebe is one of America’s most well-informed and insightful experts on international affairs and foreign policy. He has an especially strong background in cyber security, US intelligence, US-Russia relations, and the challenges of the changing international order. George Beebe is Director for Intelligence and National Security at the Center for the National Interest.

Ian Glover
Ian Glover

President CREST

View

Ian Glover

Ian has worked in the IT industry for the last 40 years and has been working in information security for the last 36 years - and has enjoyed nearly every minute of it. As President of CREST he has taken it to a position of influence in the technical security industry and has been instrumental in many major industry initiatives. These include the award winning Cyber Essentials scheme, which assesses basic levels of cyber hygiene; and the CREST, Bank of England and Government project to develop the STAR and CBEST Schemes that are designed to provide higher levels of assurance for critical parts of the UK financial services and other parts of the critical national infrastructure. He also helped to develop and implement the UK Government CIR (Cyber Incident Response) and CREST Cyber Security Incident Response (CSIR) schemes.

Internationally he is working with governments and regulators to establish or develop CREST chapters in Singapore, Hong Kong, Malaysia, Australia and the USA. He is also supporting member companies in many other regions. Prior to representing CREST, Ian was one of the founders of Insight Consulting, a leading specialist information security consultancy. The business was purchased by Siemens. He then sat on the Board of Siemens Communications. Prior to establishing Insight Consulting has worked for the MoD, Treasury (CCTA) and Ernst and Young.

Ina Wanca
Ina Wanca

NYU Cybersecurity Professor & Founder  AI Governance

View

Ina Wanca

Ina is a founder of AI Governance and a cybersecurity professor at New York University. Prominent cybersecurity and artificial intelligence scholar and advisor, known for groundbreaking contributions to social political, criminal justice, business issues, and her pioneering cyber-learning systems.

John Willis
John Willis

Vice President of Devops and Digital Practices  SJ Technologies

View

John Willis

John Willis is Vice President of Devops and Digital Practices at SJ Technologies. Prior to SJT he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015.  Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “Devops Handbook” along with authors Gene Kim and Jez Humble.   

Jonathan Kaftzan
Jonathan Kaftzan

VP Product Marketing and Innovation Deep Instinct

View

Jonathan Kaftzan

Jonathan is a marketing and business development executive with extensive experience in the global tech industry.
 
Before Joining Deep Instinct, Jonathan previously headed marketing for Amdocs Digital, Intelligence & BSS division. He was responsible for defining, creating and implementing the division’s marketing and business strategy, thought leadership and roadmap. His role includes working closely with customers, helping them to devise strategies and business models for their organizations. Before joining Amdocs, Jonathan worked in consultancy, specializing in business and marketing strategy.

Jonathan holds an MBA from Ben-Gurion University of the Negev and a B.Sc. in industrial engineering from Tel Aviv University.
 

Marcin Kleczynski
Marcin Kleczynski

Founder and CEO Malwarebytes

View

Marcin Kleczynski

Marcin is the founder of Malwarebytes. He oversees the strategic expansion of the business, as well as the long-term vision for the research and development teams. Marcin has been recognized for his work in cybersecurity, receiving the Ernst and Young Entrepreneur of the Year award, being named to the Forbes 30 Under 30, the Silicon Valley 40 Under 40, and numerous executive leadership awards including two Stevie awards for Executive of the Year. Marcin has delivered talks at TEDx, Collision Conference, Black Hat and CeBIT.

Martin Holste
Martin Holste

CTO, Cloud FireEye

View

Martin Holste
Nick Hayes
Nick Hayes

Senior Analyst, Security & Risk  Forrester Research

View

Nick Hayes

Nick Hayes is a Senior Analyst on the Security & Risk team at Forrester Research. Nick’s research focuses on the intersection of security, risk, and reputation in today’s digital world. He helps security and risk pros improve the way they protect business assets and mitigate digital risks online, such as impersonations, account takeovers, data leakage, social engineering and other business compromise. Nick specializes in risk intelligence, social media security, and the human elements of cybersecurity.
 
He is regularly cited in major media outlets, including CFO Magazine, CNBC, DarkReading, Financial Times, NBC News, SC Magazine, and VentureBeat. He also speaks at range of leading industry and technology conferences throughout the year.

Rocio Baeza
Rocio Baeza

CEO and Founder  CyberSecurityBase

View

Rocio Baeza

Rocio Baeza is the CEO and Founder of CyberSecurityBase, a consulting practice that helps rising tech companies get started with data security. There are volumes of data security and privacy laws/regulations, frameworks, and standards out there. Technology leaders are overwhelmed with too much information, oftentimes not knowing where to start and what to focus on. CyberSecurityBase operates with a mission is to simplify security, teach that model, and empower tech leaders.

Rocio studied Mathematics at the University of Chicago. Her professional background includes data analytics, product management, and IT compliance in the private sector. She moved up the ranks as an Analyst, Manager, and CISO. During this time, Rocio has observed that rising tech companies are in a unique position where they are offering innovative products and services, however, the traditional information security model is an immediate poor fit. This is leaving emerging tech companies AND consumers in a vulnerable position, and Rocio is on a mission to help change that.

Sandra Fathi
Sandra Fathi

President Affect

View

Sandra Fathi

Sandra Fathi is President and Founder of Affect, a public relations and social media firm specializing in technology, healthcare and professional services. Sandra has spent the past 20 years helping technology companies achieve their communications goals. Starting her career as a reporter for a division of Ziff Davis and IDG Tech Network, she went on to work at a number of leading technology firms and one of the top global PR agencies, Edelman. Her clients have included Apple, EDS, Ericsson, Nokia and Microsoft, as well as innovative start-ups.
 
Sandra is an expert in media relations, crisis communications, brand reputation and executive visibility. She is a sought-after speaker and writer on brand reputation with commentary appearing in CNN, Forbes, Entrepreneur, Inc., Huffington Post and U.S. News & World Report. Sandra also regularly provides training to c-level executives on corporate communications strategies – including crisis response in the digital age.
 
Sandra is currently on the board of PR Council and PRSA-NY and has been recognized as one of PRNews Top Women in PR, a PRNews PR Professional of the Year finalist, and a Bulldog PR Agency Professional of the Year. She holds a BA degree in International Relations from the Hebrew University of Jerusalem.

Shira Shamban
Shira Shamban

Head of Security Research Dome9 Security

View

Shira Shamban

Shira Shamban is a security researcher and technical expert with a focus on threat intelligence. Shira started her professional career in cybersecurity as a military officer in the elite intelligence unit 8200 of the Israel Defense Force. During her 13-year service in the unit, Shira acquired hands-on experience in cybersecurity and intelligence operations while earning an engineering degree from Tel-Aviv University.
 
After her military service, Shira turned to security innovation in business. As the Data Initiative Lead at Dome9 Security, Shira is now leading the company's security research, in order to implement its results in Dome9's products and by that help organizations embrace the public cloud securely. Shira strongly believes in empowering women in the world of technology. She volunteers as a lecturer and a mentor in forums such as SheCodes and OWASP-WIA.

Theresa Payton
Theresa Payton

CEO Fortalice Solutions

View

Theresa Payton

As the star of the CBS TV series, “Hunted,” Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.

The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.

Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful and rapidly-growing cybersecurity firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.

Theresa’s distinct approachability, combined with her visionary perspective and easy-to-implement strategies, effectively prepare audiences for success in the ongoing battle against cybercrime.

The Keynote Seminars

  • Wed 26th Sep 08:30 - 09:20
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things Theresa Payton  |   Fortalice Solutions  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 08:30 to 09:20

    Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    New technologies are in the news every day but is it all just hype or a true workplace reality? Are you leveraging Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning & the Internet of Things as part of your go to market strategy? You may wonder, are these data elements safe from hackers? Payton explains how to harness these newer technologies to achieve business goals while incorporating safeguards to fight cybercriminals and how the Blockchain could be your new security BFF and how Cryptocurrency, AI, and the Internet of Things have quickly become key drivers of global change.

    Speaker

    Photo Speaker Name Profile
    Theresa Payton Theresa Payton View Profile
  • Wed 26th Sep 09:30 - 10:00
  • Is the New Cybercriminal Mafia Winning? Recruitment, Retention and the Hire Marcin Kleczynski  |   Malwarebytes  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 09:30 to 10:00

    Is the New Cybercriminal Mafia Winning? Recruitment, Retention and the Hire

    Without question, cybercriminals are the New Mafia of today’s world. The manner in which they operate is very similar to the traditional mafia of decades past. Today, there is an ongoing cybersecurity talent gap. And, cybercriminals are taking notice and capitalizing on white hat shortcomings. At the same time, it’s becoming increasingly hard to hire the right people with the acumen, training and know-how to protect today’s enterprises from security threats. Is the new cybercriminal mafia stealing all the good security talent? And, how?

    Speaker

    Photo Speaker Name Profile
    Marcin Kleczynski Marcin Kleczynski View Profile
  • Wed 26th Sep 10:50 - 11:20
  • Doxxing, Dissidents, And Digital Extortion: Fortify Your Digital Risk Defenses Nick Hayes  |   Forrester Research  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 10:50 to 11:20

    Doxxing, Dissidents, And Digital Extortion: Fortify Your Digital Risk Defenses

    In this session Nick will highlight tactics that cyberadversaries use to exploit and weaponize external digital channels in every phase of a cyberattack. For each tactic, he will offer proactive recommendations and defense strategies that security leaders can use to prepare, prevent, and protect against them.

    Speaker

    Photo Speaker Name Profile
    Nick Hayes Nick Hayes View Profile
  • Wed 26th Sep 11:30 - 12:00
  • AI-Based Autonomous Response: Are Humans Ready?  Andrew Tsonchev  |   Darktrace   |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 11:30 to 12:00

    AI-Based Autonomous Response: Are Humans Ready? 

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.

    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Wed 26th Sep 01:00 - 01:30
  • Please hack my car – Is bug bounty an appropriate way of testing autonomous vehicles? Ian Glover  |   CREST  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 01:00 to 01:30

    Please hack my car – Is bug bounty an appropriate way of testing autonomous vehicles?

    Crowdsourcing the identification of vulnerabilities is attractive and has led to the development of bug bounty programmes. These programmes provide recognition to researchers for reporting vulnerabilities. Bug bounty programmes are being launched at a remarkable pace with evidence of both good and bad practice. Currently there is no definition of good practice and no guidelines for those procuring bug bounty programmes nor support or guidance for the researchers. There is also no clear view on the appropriateness of using such programmes to test safety critical systems such as those used on autonomous vehicles.
     
    Would you be comfortable travelling in an autonomous vehicle where suppliers are actively allowing the vehicle to be hacked; or do you feel more confident travelling in a vehicle that has been openly tested by the crowd?

    Speaker

    Photo Speaker Name Profile
    Ian Glover Ian Glover View Profile
  • Wed 26th Sep 01:40 - 02:10
  • Zero Trust & The Flaming Sword of Justice Dave Lewis  |   Duo Security  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 01:40 to 02:10

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Wed 26th Sep 02:20 - 02:50
  • Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation Sandra Fathi  |   Affect  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 02:20 to 02:50

    Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation

    Cyber attacks can be devastating - resulting in loss of revenue, interrupted business continuity and significant damages to brand reputation and corporate morale. Incident response is no longer relegated to the IT department and must involve executives across the entire organization – from the board to the marketing department to technical teams.
    This session will address the critical tactics involved in communicating a cybersecurity incident to the public - focusing on the orchestration of technical, legal and communications executives. Sandra Fathi, president of Affect, will lead an interactive discussion on the corporate communications challenges that executives face in a cybersecurity incident.

    Speaker

    Photo Speaker Name Profile
    Sandra Fathi Sandra Fathi View Profile
  • Wed 26th Sep 03:00 - 03:30
  • My Experience Teaching a Simple GDPR Implementation Approach on YouTube Rocio Baeza  |   CyberSecurityBase  |   The Keynote

    The Keynote Theatre

    Wed 26th Sep 03:00 to 03:30

    My Experience Teaching a Simple GDPR Implementation Approach on YouTube

    In 2018, Rocio challenged herself to try and come up with a simplified GDPR implementation plan that she can teach online on YouTube. Why? In working with various security and privacy laws/regulations/frameworks, she has experienced first-hand the difficulty in translating requirements into clear and actionable steps. GDPR requires much-needed measures for the responsible management and use of personal data. As a data privacy advocate, she welcomed the measures that provide consumers with choice and transparency over the use of their personal data. As a data security professional, she appreciates the absence of technical jargon and assumption that all organizations are running on an “old-school” IT environment. This is a win for consumers, organizations, and the data privacy industry.

    As business and tech leaders decide on their approach for reaching and maintaining GDPR compliance, Rocio provides a simple implementation approach that doesn't conflict with creativity and innovation that rising tech companies are bringing to the table.

    Speaker

    Photo Speaker Name Profile
    Rocio Baeza Rocio Baeza View Profile
  • Thu 27th Sep 08:30 - 09:20
  • War By Other Means: How Cyber Technology Shapes Our New Shadow War with Russia George Beebe  |   Center for the National Interest  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 08:30 to 09:20

    War By Other Means: How Cyber Technology Shapes Our New Shadow War with Russia

    Russia and the US are in an undeclared virtual war.  But it is not a hot war like World War II.  And it is not a Cold War.  Rather, it is something in between, a “shadow war,” in which we do things that once required physical force, but today can be accomplished through less violent but no less effective means.  Unlike the Cold War, this shadow war is being waged without rules, and neither side recognizes how easily it could spiral out of control. 

    Speaker

    Photo Speaker Name Profile
    George Beebe George Beebe View Profile
  • Thu 27th Sep 09:30 - 10:00
  • The Divine and Felonious Nature of Cyber Security John Willis  |   SJ Technologies  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 09:30 to 10:00

    Speaker

    Photo Speaker Name Profile
    John Willis John Willis View Profile
  • Thu 27th Sep 10:50 - 11:20
  • Using Home-Court Advantage to Transform Your Security Approach Dr. Rajiv Ramaswami   |   VMware  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 10:50 to 11:20

    Using Home-Court Advantage to Transform Your Security Approach

    When it comes to cyber security, the attacker is in an advantageous position. Defense is harder than offense and we’re fighting an asymmetrical battle. But we do have one piece of information the attacker doesn’t. We have exclusive knowledge of how our apps and data should behave on our own infrastructure. This knowledge can be used to create a home-court advantage that gives us crucial leverage and reduces our attack surface.
     
    Find out how the unique properties of cloud and mobile can be used to enable new security models never before possible – providing critical insights for that home court advantage.

    Speaker

    Photo Speaker Name Profile
    Dr. Rajiv Ramaswami Dr. Rajiv Ramaswami View Profile
  • Thu 27th Sep 11:30 - 12:00
  • Preventing the Next-Generation Data Breach Storms:  Human, Machines and the Art of Deception Ina Wanca  |   AI Governance  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 11:30 to 12:00

    Preventing the Next-Generation Data Breach Storms:  Human, Machines and the Art of Deception

    Cyber risk uncertainties, due to the proliferation of human errors and behavior weaknesses, are not addressed by current cyber risk framework models. Case studies will examine the implications of the of artificial intelligence misuse for humans and machines’ deception. By the end of the session, the speaker will share lessons learned and the best predictive prevention tools for avoiding data breaches.

    Speaker

    Photo Speaker Name Profile
    Ina Wanca Ina Wanca View Profile
  • Thu 27th Sep 01:00 - 01:30
  • Turning Your Cybersecurity Toddlers Into Warriors! Proven field-tested methods to fill the knowledge gap within your staff Shira Shamban  |   Dome9 Security  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 01:00 to 01:30

    Turning Your Cybersecurity Toddlers Into Warriors! Proven field-tested methods to fill the knowledge gap within your staff

    IT security is expanding rapidly. And, unlike the skill gap, there is no shortage of malicious actors trying to get data. In order to break this endless, downward spiral resulting in increased turnover and lower overall job satisfaction, IT organizations must implement updated strategies and methodologies towards security.

    This session will include insights and lessons learned from 13 years as an officer in the elite intelligence unit 8200 of the Israel Defense Force. I will share solutions I learned from the hands-on experience in cybersecurity and operations including CD/CR - Continuous Detection / Continuous Remediation.

    Speaker

    Photo Speaker Name Profile
    Shira Shamban Shira Shamban View Profile
  • Thu 27th Sep 01:40 - 02:10
  • Do you know your vendor dependencies? Elizabeth Zalman  |   strongDM  |   The Keynote

    The Keynote Theatre

    Thu 27th Sep 01:40 to 02:10

    Do you know your vendor dependencies?

    You're only as secure as your weakest link. That includes not only your employees, but your vendors and their employees too. Most companies have no idea how many systems and people have access to their data. You can't protect your data if you can't tell who has access to it, nor what they're doing with it. In this talk, I'll share practical examples of breaches I've personally experienced along with advice on how to hold your vendors accountable.

    Speaker

    Photo Speaker Name Profile
    Elizabeth Zalman Elizabeth Zalman View Profile
  • Thu 27th Sep 02:20 - 03:10
  • PANEL: The Year Ahead - GDPR, Ransomware, AI Security & the Next Big Threat Panel  |  The Keynote

    The Keynote Theatre

    Thu 27th Sep 02:20 to 03:10

    Speakers

    Speaker Name Profile
    Adrienne McEwan Adrienne McEwan View Profile
    Charles Stockwell Charles Stockwell View Profile
    Jonathan Kaftzan Jonathan Kaftzan View Profile
    Martin Holste View Profile
Top