Network Security, Ransomware & IOT

The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving Ransomware.

Network Security, Ransomware & IOT Speakers

Aaron Ausherman
Aaron Ausherman

Engineer CrowdStrike

View

Aaron Ausherman
Brent Feller
Brent Feller

Senior Solutions Engineer eSentire

View

Brent Feller
Cameron Armstrong
Cameron Armstrong

Director of Channel Sales Darktrace

View

Cameron Armstrong
Dan Mathews
Dan Mathews

Sr. Director of Worldwide Sales Engineering  Lastline

View

Dan Mathews

Dan Mathews is the Sr. Director of Worldwide Sales Engineering at Lastline.  He has over 20 years experience in design and implementation of networking and security solutions for large enterprises.  Since 2006, Dan has consulted on information security strategy, tactical controls, regulatory compliance, governance frameworks and incident response planning. Dan has served in various technical, marketing and advisory capacities at Edward Jones, CompuServe, UUNet, MCI, Verizon, Cybertrust, CompuCom, and SecureWorks.

Jeff Cornelius
Jeff Cornelius

Executive Vice President Darktrace

View

Jeff Cornelius
Leonard Jacobs
Leonard Jacobs

President/CEO Netsecuris Inc.

View

Leonard Jacobs

Leonard Jacobs is the President/CEO of Netsecuris, a leading Managed Security Services Provider specializing in providing cyber security protections to businesses in several vertical markets. Leonard has over 31 years of hands-on technology management experience including 21 years in cyber security. He has spoken on many cyber security topics at conferences around the world and has written many cyber security whitepapers. He is considered an expert on cyber security incident handling and Industrial Control System cyber security. His first employment was with a major minicomputer manufacturer in the 1980s. Additionally, Leonard was employed as a field support engineer for several biomedical systems manufacturers, an IT Manager in healthcare, as the CISO at a major financial institution, and a Enterprise Cyber Security Architect at a major electric utility. He is currently studying for a MS degree in Cybersecurity Technology from University of Maryland; with graduation schedule for December 2018. Leonard holds MBA degree from University of Phoenix, BA degree from University of Florida, Certified SCADA Security Architect from IACRB, and CISSP certification from ISC2 since 2003. Leonard currently serves as co-chair on a U.S. government-funded cyber security working group tackling major cyber security issues. He is an Instructor with the Minnesota Cyber Range hosted by Metropolitan State University in St. Paul and teaching cyber security courses at this same institution of higher learning.

Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Patrick Hayes
Patrick Hayes

Managing Director, Managed Security Services Online Business Systems

View

Patrick Hayes

As Managing Director, Security Operations and Managed Security Services, Patrick is responsible for Online’s Security Operations Center (SOC) and our Managed Security Services team. Patrick is a transformational leader, innovator, and certified enterprise security architect. For the last 25 years, Patrick has focused on developing value-based services to enable customer innovation and growth. Prior to Online Business Systems, Patrick served as Senior Vice President for Hitachi Systems, responsible for Security Advisory Services in North America and Regional Vice President, US of Seccuris, as well as holding senior roles with IC Group, MTS Allstream and IBM.

Rob Carson
Rob Carson

CEO/Principal Consultant SemperSec

View

Rob Carson

Rob Carson founder of Semper Sec. Rob knows how to simplify the problem and deliver solutions.

His clients base includes:

- Fortune 200 Companies
- US Government Contractors
- State and Local Governments
- Fuel Retailers
- Software and hardware manufacturers

His distinguished career includes service as a Marine Corps Infantry Officer, as well as leading roles in IT and Security. Before devoting his work fulltime to facilitating his client's success, He built highly successful information security programs for ISO 27001:2005/2013, PCI, HIPAA, NIST 800-171, GDPR. He also volunteers his time as the Chief Security Officer for BSIDES Las Vegas, a non-profit educational organization designed to advance the body of Information Security.

Roger Boivin
Roger Boivin

Vice President  Cirries Technologies

View

Roger Boivin

Roger Boivin is a qualified executive with more than 30 years’ experience in the telecom and data management industries with emphasis on new technology. He has significant experience with emerging businesses focused on maturing innovative ideas into new products. He is particularly effective in building strong, beneficial relationships focused on achieving the organizations’ business goals. A graduate of SJTI in St. John, New Brunswick, Roger spent more than a decade in operations, engineering and management roles with the New Brunswick Telephone Company before joining Northern Telecom Canada. He then transferred to Richardson, Texas, and was quickly promoted to vice president of cellular sales and marketing for Northern Telecom. He was instrumental in nurturing that business from startup to a multi-million- dollar-a- year opportunity. Roger subsequently enjoyed success at Hughes Network, Ericsson, National Telemanagement Corporation and as president of COM DEV Wireless, a Canadian company with its USA headquarters in Richardson Texas. He then accepted a position as president and COO of ISCO International, a company providing interference solutions for the wireless industry using cryogenically cooled filters. In his most recent position as general manager for the Americas at jNetX Inc., Roger was responsible for all sales and strategic alliances of next-generation IMS service layer platform for North America, Latin America, and South America. He closed a major partnership agreement with CGI worldwide and assisted in carrier RFI and RF responses with IBM, Sun and Stratus Computing. He authored the complete sales and technical courses on convergent networks and the evolution to IP Multimedia Subsystems (IMS).

TJ Adamowicz
TJ Adamowicz

Lead Sales Engineer Mimecast

View

TJ Adamowicz
Tony Porras
Tony Porras

Attorney Porras Law

View

Tony Porras

Tony Porras is owner of Porras Law, a law firm focused on cybersecurity, compliance, incident response, and data privacy and protection.
 
Tony spent more than 20 years as an IT/cybersecurity engineer before entering the legal profession. Tony provides practical expertise in cybersecurity and risk management necessary in today’s unique cybersecurity environment. As an attorney, he blends technology experience with legal expertise to consult with firms large and small.
 
In 2005, Tony launched an independent consulting firm focused on data security and compliance for clients ranging in size from small- and medium-sized firms to Fortune 100 companies. In 2014, he became a member of the State Bar of California.
 
When serving as an of counsel attorney in matters related to cybersecurity, Tony becomes a strategic partner to his clients in reducing business risk and helping them meet data security obligations to their customers. Porras Law’s goal is to help clients protect the trusted relationship they have with their customers through sound cybersecurity policies and practices.
 
 

Network Security, Ransomware & IOT Seminars

  • Wed 31th Oct 09:30 - 10:00
  • Lessons Learned from High Profile Breaches – And How to Stop the Next One Aaron Ausherman  |   CrowdStrike   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 09:30 to 10:00

    Lessons Learned from High Profile Breaches – And How to Stop the Next One

    This exclusive session delves into details of some of CrowdStrike’s most eye-opening breach investigations of the past year, and their implications for organizations of all sizes, regardless of their industry or country of origin. Also: New research on “breakout time” –the time from initial  intrusion to the first signs of lateral movement that  precede a breach –and what defenders must do to respond before adversaries can press their attack.

    What the audience will learn:
    Aaron will provide insights into the new methods of attacks such as credential theft and whitelist bypassing and other real-world examples of attacks against organizations. Attendees will learn the countermeasures that can be implemented to prevent such attacks.  

    Another take away for attendees is the meaning behind “breakout time”, and what it takes to respond in time to protect an organization’s data and networks.

    Speaker

    Photo Speaker Name Profile
    Aaron Ausherman Aaron Ausherman View Profile
  • Wed 31th Oct 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Brent Feller  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join Brent Feller, Senior Solutions Engineer at eSentire who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Wed 31th Oct 11:30 - 12:00
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Cameron Armstrong  |   Darktrace   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 11:30 to 12:00

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

    Speaker

    Photo Speaker Name Profile
    Cameron Armstrong Cameron Armstrong View Profile
  • Wed 31th Oct 01:00 - 01:30
  • Introduction to Internet of Things (IoT) and Industrial Internet of Things (IIoT) Leonard Jacobs  |   Netsecuris Inc.  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 01:00 to 01:30

    Introduction to Internet of Things (IoT) and Industrial Internet of Things (IIoT)

    The Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices communicate more effectively with publish-subscribe-based lightweight messaging protocols as compared to utilizing the traditional request-response nature of TCP/IP communication.  The presentation provides a review of the prominent messaging protocols (MQTT, OpenFMB, and others) utilized today with IoT and IIoT communications. The cyber security protection mechanisms for these messaging protocols will be addressed.
     
     

    Speaker

    Photo Speaker Name Profile
    Leonard Jacobs Leonard Jacobs View Profile
  • Wed 31th Oct 01:40 - 02:10
  • Brought to you by Cyreonix

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 01:40 to 02:10

  • Wed 31th Oct 02:20 - 02:50
  • Why Security Incidents are Different from IT Incidents Patrick Hayes  |   Online Business Systems  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 02:20 to 02:50

    Why Security Incidents are Different from IT Incidents

    Organizations are challenged with ensuring that their customers and staff have access to the systems and services needed to conduct business. Often times what could be perceived as a simple disruption to service can become a serious and damaging security breach. If treated and remediated without the due care of a security incident, you may lack the important steps necessary in addressing the serious nature of the event.  With data breaches at an all-time high, ensuring that organizations are properly addressing security incidents is paramount in protecting corporate and customer information, as well as maintaining the availability of services.

    Speaker

    Photo Speaker Name Profile
    Patrick Hayes Patrick Hayes View Profile
  • Wed 31th Oct 03:00 - 03:30
  • Navigating the Slew of Laws and Regulations of Cybersecurity Tony Porras   |   Porras Law  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 03:00 to 03:30

    Navigating the Slew of Laws and Regulations of Cybersecurity

    How to decipher the many laws and regulation imposed on businesses today by State, Federal and Foreign Governments and how to create a technical framework to comply that at the same time will give you a stronger cybersecurity posture. We will go over the major laws governing cybersecurity requirements and a technical framework that will help make sense of your cybersecurity investments. We will also review how to implement a plan that makes sense for your organization. This plan will not only help you combat the bad guys but also help you comply with the many laws and regulations.

    Speaker

    Photo Speaker Name Profile
    Tony Porras Tony Porras View Profile
  • Wed 31th Oct 03:30 - 04:30
  • MEETUP: Women in Cyber Secuirty

    Network Security, Ransomware & IOT Theatre

    Wed 31th Oct 03:30 to 04:30

  • Thu 1th Nov 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Morey J. Haber  |   BeyondTrust  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 1th Nov 10:10 - 10:40
  • The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense Jeff Cornelius   |   Darktrace   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 10:10 to 10:40

    The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense

    There is an urgent need for a new approach to combat the next generation of cyber-threats, across both OT and IT environments. While total prevention of compromise is untenable, utilizing automated self-learning technologies to detect and respond to emerging threats within a network is an achievable cyber security goal, irrespective of whether the suspicious behavior originated on the corporate network or ICS.

    Speaker

    Photo Speaker Name Profile
    Jeff Cornelius Jeff Cornelius View Profile
  • Thu 1th Nov 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Brent Feller  |   eSentire   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join Brent Feller, Senior Solutions Engineer at eSentire who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Thu 1th Nov 11:30 - 12:00
  • Lessons Learned from High Profile Breaches – And How to Stop the Next One Aaron Ausherman  |   CrowdStrike   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 11:30 to 12:00

    Lessons Learned from High Profile Breaches – And How to Stop the Next One

    This exclusive session delves into details of some of CrowdStrike’s most eye-opening breach investigations of the past year, and their implications for organizations of all sizes, regardless of their industry or country of origin. Also: New research on “breakout time” –the time from initial  intrusion to the first signs of lateral movement that  precede a breach –and what defenders must do to respond before adversaries can press their attack.

    What the audience will learn:
    Aaron will provide insights into the new methods of attacks such as credential theft and whitelist bypassing and other real-world examples of attacks against organizations. Attendees will learn the countermeasures that can be implemented to prevent such attacks.  

    Another take away for attendees is the meaning behind “breakout time”, and what it takes to respond in time to protect an organization’s data and networks.

    Speaker

    Photo Speaker Name Profile
    Aaron Ausherman Aaron Ausherman View Profile
  • Thu 1th Nov 01:00 - 01:30
  • The Importance of Cyber Resilience for Email TJ Adamowicz  |   Mimecast   |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 01:00 to 01:30

    Speaker

    Speaker Name Profile
    TJ Adamowicz View Profile
  • Thu 1th Nov 01:40 - 02:10
  • Use of Guerrilla Warfare for the Blue Team Rob Carson  |   SemperSec  |   Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 01:40 to 02:10

    Use of Guerrilla Warfare for the Blue Team

    Blue Team Security is a hard job. It's not sexy, and it is always complicated navigating between the people, processes, and technology of the organization. Blue teams try to defend meanwhile breaches still happen. Why? adversaries (external AND internal) just need to find a pin-hole or create one. Or buy one. That simple.

    Its time, we start thinking and acting like a guerrilla and adopt some practices from irregular warfare.  Irregular warfare has a long history of defeating larger and better-equipped adversaries while using limited resources.  Let’s talk about how we can adopt these tools, technique and procedures to win.

    Speaker

    Photo Speaker Name Profile
    Rob Carson Rob Carson View Profile
  • Thu 1th Nov 02:20 - 02:50
  • Managing Risk in Cloud/Hybrid Cloud Operations Tech Leaders  |  Network Security, Ransomware & IOT

    Network Security, Ransomware & IOT Theatre

    Thu 1th Nov 02:20 to 02:50

    Speakers

    Speaker Name Profile
    Dan Mathews View Profile
    Roger Boivin View Profile
Top