Agenda

  • Wed 31st Oct 09:30 - 10:00
  • AI-Based Autonomous Response: Are Humans Ready? Add to Schedule Nicole Eagan  |   Darktrace  |   The Keynote

    The Keynote Theatre

    Wed 31st Oct 09:30 to 10:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • How to Build Effective Defensive Strategies Against Privileged Attacks Add to Schedule Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 31st Oct 09:30 to 10:00

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

    Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule

    Network Security and Ransomware Theatre

    Wed 31st Oct 09:30 to 10:00

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

  • Introduction to Internet of Things (IoT) and Industrial Internet of Things (IIoT) Add to Schedule Leonard Jacobs  |   Netsecuris Inc.  |   IoT Security

    IoT Security Theatre

    Wed 31st Oct 09:30 to 10:00

    Introduction to Internet of Things (IoT) and Industrial Internet of Things (IIoT)

    The Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices communicate more effectively with publish-subscribe-based lightweight messaging protocols as compared to utilizing the traditional request-response nature of TCP/IP communication.  The presentation provides a review of the prominent messaging protocols (MQTT, OpenFMB, and others) utilized today with IoT and IIoT communications. The cyber security protection mechanisms for these messaging protocols will be addressed.
     
     

    Speaker

    Photo Speaker Name Profile
    Leonard Jacobs Leonard Jacobs View Profile
  • Brought to you by BlackDuck Add to Schedule

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 31st Oct 09:30 to 10:00

  • Wed 31st Oct 10:10 - 10:40
  • Brought to you by Forcepoint Add to Schedule

    Cloud, Mobile & IAM Theatre

    Wed 31st Oct 10:10 to 10:40

  • Wed 31st Oct 10:50 - 11:20
  • Can You Be Just a Little Bit Beyond? Add to Schedule Wendy Nather   |   Duo Security   |   The Keynote

    The Keynote Theatre

    Wed 31st Oct 10:50 to 11:20

    Can You Be Just a Little Bit Beyond?

    Some organizations are afraid that going to a zero-trust model (such as Google's BeyondCorp) means all or nothing, and that they may face security risks in the middle of migrating. Even Google didn’t do it in a day, so let’s talk about incremental changes that don’t require a sudden switchover.

    Speaker

    Photo Speaker Name Profile
    Wendy Nather Wendy Nather View Profile
  • Minimizing the detection to recovery timeframe Add to Schedule Brent Feller  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 31st Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Brought to you by Hitachi ID Add to Schedule

    Cloud, Mobile & IAM Theatre

    Wed 31st Oct 10:50 to 11:20

  • Wed 31st Oct 11:30 - 12:00
  • Hacking Dumberly, Just Like the Bad Guys Add to Schedule Tim Medin  |   Red Siege  |   The Keynote

    The Keynote Theatre

    Wed 31st Oct 11:30 to 12:00

    Hacking Dumberly, Just Like the Bad Guys

    Tim will discuss the dumbest red team tricks and hacks he's encountered over the years. He is going to take the A out of APT, because so few attackers really need to use advanced techniques. He'll also discuss the simple defenses that make an attacker's life much more difficult.

    Speaker

    Photo Speaker Name Profile
    Tim Medin Tim Medin View Profile
  • Wed 31st Oct 13:00 - 13:30
  • Brought to you by Google Add to Schedule Matthew O’Connor   |   Google  |   The Keynote

    The Keynote Theatre

    Wed 31st Oct 13:00 to 13:30

    Speaker

    Photo Speaker Name Profile
    Matthew O’Connor Matthew O’Connor View Profile
  • Wed 31st Oct 13:40 - 14:10
  • Brought to you by Kickbox Add to Schedule Emily Freeman  |   Kickbox   |   The Keynote

    The Keynote Theatre

    Wed 31st Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Emily Freeman Emily Freeman View Profile
  • Developing and Retaining Excellence in a Competitive Market Add to Schedule Jim Motes  |   Knights View Consulting, LLC  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 31st Oct 13:40 to 14:10

    Developing and Retaining Excellence in a Competitive Market

    It's no secret that we are currently experiencing a critical shortage of trained and experienced cyber security practitioners.  The competition for qualified team members is fierce and long-term retention of your valuable team members is a key success factor for creating and maintaining a first-rate security team.  Exceptional security personnel are looking for opportunities to perform interesting and challenging work.  Too often those same personnel are relegated to perform mundane and repetitive tasks that fail to adequately engage and develop them professionally. CISOs/CSOs wishing to retain and mature their organizations should look for opportunities to drive efficiencies and optimize their security program while minimizing the administrative burden on their teams.  

    Low-cost, high-return activities such as establishing formal or semi-formal collaborative relationships with their peers for mutual security support and training opportunities combined with conducting security program rationalization and optimization projects can deliver significant value and introduce fresh insight into your security program.  Security executives should also consider how machine learning and Security Orchestration, Automation, and Response (SOAR) solutions may reduce time spent on lower skill, repetitive tasks, and improve overall team competency and retention.

    Speaker

    Photo Speaker Name Profile
    Jim Motes Jim Motes View Profile
  • Thu 1st Nov 09:30 - 10:00
  • Criminal Perspectives: Former US Most Wanted Cybercriminal Brett Johnson Discusses His History of Cybercrime, Its Current State, and Where Its Going Add to Schedule Brett Johnson  |     |   The Keynote

    The Keynote Theatre

    Thu 1st Nov 09:30 to 10:00

    Criminal Perspectives: Former US Most Wanted Cybercriminal Brett Johnson Discusses His History of Cybercrime, Its Current State, and Where Its Going

    Join "The Original Internet Godfather" Brett Johnson for a one of a kind presentation on cybercrime. Brett will detail his cybercrime past before walking the audience through the current state of online crime and showing the audience exactly how todays cybercriminals commit Synthetic Fraud, Business Email Compromise, Account Takeovers, and more. Learn how crooks commit those crime, but more importantly learn what you can do to protect yourself and your business.

    Speaker

    Photo Speaker Name Profile
    Brett Johnson Brett Johnson View Profile
  • How to Protect Next Generation Technology from Modern Threats Add to Schedule Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 1st Nov 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense Add to Schedule

    IoT Security Theatre

    Thu 1st Nov 09:30 to 10:00

    The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense

    There is an urgent need for a new approach to combat the next generation of cyber-threats, across both OT and IT environments. While total prevention of compromise is untenable, utilizing automated self-learning technologies to detect and respond to emerging threats within a network is an achievable cyber security goal, irrespective of whether the suspicious behavior originated on the corporate network or ICS.

  • Cyber Security Defense Maturity Model (CSDMM) Add to Schedule Eric Jeffery  |   IBM  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 1st Nov 09:30 to 10:00

    Cyber Security Defense Maturity Model (CSDMM)

    Discuss cyber security defense maturity model (CSDMM) that places technology families on a scatter plot delineating capability level with defensive maturity. Organizations need controls in place and an understanding of their defensive position. Too often, organizations use a whack a mole process or they defend against the risk of the day or, worse yet, what vendors tell them to buy. The CSDMM provides entities with an understanding of where they are so they can determine where they want to go. This model delineates what technologies entities need to implement so they can achieve a more sophisticate and mature defensive posture.

    Speaker

    Photo Speaker Name Profile
    Eric Jeffery Eric Jeffery View Profile
  • Thu 1st Nov 10:50 - 11:20
  • Brought to you by McAfee Add to Schedule Mark Mincin  |   McAfee  |   The Keynote

    The Keynote Theatre

    Thu 1st Nov 10:50 to 11:20

    Speaker

    Photo Speaker Name Profile
    Mark Mincin Mark Mincin View Profile
  • Minimizing the detection to recovery timeframe Add to Schedule Brent Feller  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 1st Nov 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Thu 1st Nov 11:30 - 12:10
  • Brought to you by Forcepoint Add to Schedule

    Cyber Hack Theatre

    Thu 1st Nov 11:30 to 12:10

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top