Future Cyber Tech, Application Security & DevOps

Future Cyber Tech, Application Security & DevOps

Businesses are acutely aware that there is an increasingly sophisticated criminal threat to their systems and data. Being fully protected against these threats has never been more imperative given the legislative and PR implications of high profile breaches. In this theater you can learn from the vendors at the front-line in the battle with cyber criminals about how future cyber tech solutions will counter the evolving threats.

Future Cyber Tech, Application Security & DevOps Speakers

Eric Jeffery
Eric Jeffery

Security Intelligence & Operations Consulting – Managing Consultant IBM

View

Eric Jeffery

Eric has 20+ years' experience with Information Security including stints in the Technology, Retail, Aerospace, Defense, Hardware, Entertainment and Healthcare industries. Mr. Jeffery's focus involves network design, network implementations and network security. Eric has a Bachelor of Arts degree in Economics from the University of Colorado at Boulder. Mr. Jeffery recently joined IBM as a Managing Consultant where he advises and assists customers with designing, deploying and managing Security Operations Centers (SOC).  Eric resides in Southern Colorado with his wife, enjoys playing trivia and video games.

Jim Motes
Jim Motes

Managing Partner Knights View Consulting, LLC

View

Jim Motes

Jim Motes recently founded Knights View Consulting, LLC, a veteran owned, bespoke security advisory practice specializing in cybersecurity solutions and compliance for businesses of all sizes.  Jim has held numerous executive security roles to include; VP Cyber Security -  Kohler Co., VP and Chief Security Officer - Rockwell Automation; VP Information Security - Invensys PLC, Chief Information Security and Privacy Officer - Perot Systems.
 
Jim’s experience in cybersecurity spans 20 years and he is a Certified Information Systems Security Professional (CISSP), Certified Information System Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified in the Governance of Enterprise IT (CGEIT), and National Security Agency InfoSec Assessment Methodology Certified (NSA-IAM).
 
Jim served as a commissioned officer in the United States Army including duty in the Middle East as an M1A1 heavy tank platoon leader.
 
He spends his free time traveling with his wife, is an avid photographer and antique automobile buff.

Future Cyber Tech, Application Security & DevOps Seminars

  • Wed 31th Oct 09:30 - 10:00
  • Brought to you by BlackDuck

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 31th Oct 09:30 to 10:00

  • Wed 31th Oct 13:40 - 14:10
  • Developing and Retaining Excellence in a Competitive Market Jim Motes  |   Knights View Consulting, LLC  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Wed 31th Oct 13:40 to 14:10

    Developing and Retaining Excellence in a Competitive Market

    It's no secret that we are currently experiencing a critical shortage of trained and experienced cyber security practitioners.  The competition for qualified team members is fierce and long-term retention of your valuable team members is a key success factor for creating and maintaining a first-rate security team.  Exceptional security personnel are looking for opportunities to perform interesting and challenging work.  Too often those same personnel are relegated to perform mundane and repetitive tasks that fail to adequately engage and develop them professionally. CISOs/CSOs wishing to retain and mature their organizations should look for opportunities to drive efficiencies and optimize their security program while minimizing the administrative burden on their teams.  

    Low-cost, high-return activities such as establishing formal or semi-formal collaborative relationships with their peers for mutual security support and training opportunities combined with conducting security program rationalization and optimization projects can deliver significant value and introduce fresh insight into your security program.  Security executives should also consider how machine learning and Security Orchestration, Automation, and Response (SOAR) solutions may reduce time spent on lower skill, repetitive tasks, and improve overall team competency and retention.

    Speaker

    Photo Speaker Name Profile
    Jim Motes Jim Motes View Profile
  • Thu 1th Nov 09:30 - 10:00
  • Cyber Security Defense Maturity Model (CSDMM) Eric Jeffery  |   IBM  |   Future Cyber Tech, Application Security & DevOps

    Future Cyber Tech, Application Security & DevOps Theatre

    Thu 1th Nov 09:30 to 10:00

    Cyber Security Defense Maturity Model (CSDMM)

    Discuss cyber security defense maturity model (CSDMM) that places technology families on a scatter plot delineating capability level with defensive maturity. Organizations need controls in place and an understanding of their defensive position. Too often, organizations use a whack a mole process or they defend against the risk of the day or, worse yet, what vendors tell them to buy. The CSDMM provides entities with an understanding of where they are so they can determine where they want to go. This model delineates what technologies entities need to implement so they can achieve a more sophisticate and mature defensive posture.

    Speaker

    Photo Speaker Name Profile
    Eric Jeffery Eric Jeffery View Profile
Top