The Keynote

The Keynote

The Keynote Theater at Cyber Security Dallas invovles a deep analysis on the latest attack vectors and techniques hackers, nation states and social engineers are using against organizations like yours. This unique theater showcases some of the best new technologies and practices in the industry, enabling you understand the impact and capabilities of machine learning and artificial intelligence based defences. There is also be some incredibly valuable insight in to building cyber teams and company culture to ensure that the entire organization are working together to stay protected. The programme for 2018 will be a mixture of demonstrations, presentations and panel debates from a world class line up of experts.

The Keynote Speakers

Brett Johnson
Brett Johnson

Security Consultant & Public Speaker 

View

Brett Johnson

Former United States Most Wanted, Brett “GOllumfun” Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for almost 20 years. Mr. Johnson built and was leader of ShadowCrew, the precursor to today’s darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.

Upon his capture, the United States Secret Service hired Mr Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions.

Today, Brett works as a security consultant and public speaker. He has worked with groups such as the FBI, Microsoft, Eailage, NextCaller,IDology, AARP, BBWest, TIB, The ACFE, The Card Not Present Group, The Identity Theft Resource Council, PRO, Universities, and many others.

Brett has been featured on numerous media outlets, most recently NBC, CNN Money, RT TV, ArsTechnica, The Independent, and more.
Mr. Johnson can be contacted via www.anglerphish.com

Mark Mincin
Mark Mincin

Senior Vice President, Chief Information Officer McAfee

View

Mark Mincin

Mark Mincin is Senior Vice President and Chief Information Officer at McAfee. He is responsible for McAfee’s corporate systems, IT infrastructure, and for leading the company’s transformation to the Cloud. With more than two decades of experience in corporate IT, he understands the importance and value of aligning technology and services with business strategy, partnering with product and sales teams, leveraging digital technologies to amplify innovation and grow revenue, and creating a positive customer experience.
Mincin was previously Executive Vice President and CIO at Epicor Software. Before joining Epicor, he served as Vice President, CIO at Caradigm, a Microsoft-GE healthcare joint venture. He also held leadership roles at Microsoft, AT&T Wireless, and The Nasdaq Stock Market.
Mincin has a bachelor’s degree in Marketing-Management, with a minor emphasis in Computer Science from Virginia Tech.

Matthew O’Connor
Matthew O’Connor

Technical Director, Cloud Office of the CTO Google

View

Matthew O’Connor

Matthew O’Connor is a Technical Director in the Cloud Office of the CTO based in Sunnyvale, CA. He specializes in Security, Compliance, Privacy, Policy, and large scale software services.

Prior to joining the Office of the CTO, Matthew was responsible for Security and Compliance products on Google Cloud Platform.  He established the key foundations for Cloud Compliance Program and many of the early Cloud Platform security products. Matthew also built products for Google Enterprise, having joined Google via the acquisition of Postini in 2007.

Before Google, Matthew held product management and engineering roles building scaled services at Postini, Tellme Networks, AOL, Netscape, Inflow, and Hewlett-Packard. His career started as a US Air Force officer on the MILSTAR satellite program. Matthew has an executive MBA from the University of California and earned a bachelor’s degree in Computer Science Engineering from Santa Clara University.

Nicole Eagan
Nicole Eagan

CEO Darktrace

View

Nicole Eagan

As Chief Executive Officer of Darktrace, Nicole Eagan has established the company as the global leader of AI cyber defense. Her extensive career spans 25 years working for Oracle and early to late-stage growth companies. Named 'AI Leader of the Year' in 2017, Nicole has introduced disruptive machine learning to enterprises of all sizes. Today, Darktrace has a valuation of $1.25 billion and counts Insight, KKR, Summit Partners, and Samsung among its investors. Darktrace’s innovative approach to cyber security has won over 100 awards and the company has been named to WSJ’s Tech Companies to Watch, Fast Company's Most Innovative Companies, and the CNBC Disruptor 50.

Samy Kamkar
Samy Kamkar

Security Researcher  Independent

View

Samy Kamkar

Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, the fastest spreading virus of all time. His open source software, hardware and research highlights the insecurities and privacy implications in everyday technologies, from the Evercookie which produces virtually immutable respawning cookies, to SkyJack, a drone that wirelessly hijacks and autonomously controls other drones. His work has been cited by the NSA, triggered hearings on Capitol Hill, and has been the basis for security advancements across virtually all major web browsers, smartphones, and other technologies.

Tim Medin
Tim Medin

Founder Red Siege

View

Tim Medin

Tim Medin is the founder of Red Siege, a company focused to adversary emulation and penetration testing. He is also the SANS MSISE Program Director, the coauthor of multiple SANS courses, and a member of the IANS Faculty. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to a organizations around the world. Tim is the creator of the Kerberoasting, a technique to extract Kerberos tickets to offline attack the passwords of enterprise service accounts.

Wendy Nather
Wendy Nather

Director, Advisory CISOs Duo Security

View

Wendy Nather

Wendy Nather is Principal Security Strategist at Duo Security. She was formerly a CISO in the public and private sectors, led the security practice at independent analyst firm 451 Research, and helped to launch the Retail Cyber Intelligence Sharing Center in the U.S. A co-author of the “Cloud Security Rules,” she was listed as one of SC Magazine's Women in IT Security "Power Players" in 2014.

Zeus Kerravala
Zeus Kerravala

Founder and Principal Analyst  ZK Research

View

Zeus Kerravala

Zeus Kerravala is the founder and principal analyst with ZK Research, and provides a mix of tactical advice to help his clients in the current business climate and long-term strategic advice. Kerravala provides research and advice to end-user IT and network managers, vendors of IT hardware, software and services and the financial community looking to invest in the companies that he covers.

The Keynote Seminars

  • Wed 31th Oct 08:30 - 09:20
  • The State of Hacking & Cybercrime Samy Kamkar   |   Independent   |   The Keynote

    The Keynote Theatre

    Wed 31th Oct 08:30 to 09:20

    The State of Hacking & Cybercrime

    Samy Kamkar: Fun, Fascinating, Terrifying

     

    Meet the man who changed the internet forever.

     

    Best known for creating the fastest spreading virus of all time, the MySpace Worm, Samy Kamkar is a cyber security expert whose work is cited by the NSA, triggers hearings on Capitol Hill, and is used as the basis for security advancements across virtually all web browsers, smartphones, and other technologies. He is speaking at Cyber Security Dallas about the insecurities in every day technologies in his seminar “The State of Hacking and Cyber Crime” which is described as revealing something fun, fascinating and terrifying. Expect eye opening live hacks, demonstrations & audience involvement from the hacker that changed the internet forever.

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Wed 31th Oct 09:30 - 10:00
  • AI-Based Autonomous Response: Are Humans Ready? Nicole Eagan  |   Darktrace  |   The Keynote

    The Keynote Theatre

    Wed 31th Oct 09:30 to 10:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

    Speaker

    Photo Speaker Name Profile
    Nicole Eagan Nicole Eagan View Profile
  • Wed 31th Oct 10:50 - 11:20
  • Can You Be Just a Little Bit Beyond? Wendy Nather   |   Duo Security   |   The Keynote

    The Keynote Theatre

    Wed 31th Oct 10:50 to 11:20

    Can You Be Just a Little Bit Beyond?

    Some organizations are afraid that going to a zero-trust model (such as Google's BeyondCorp) means all or nothing, and that they may face security risks in the middle of migrating. Even Google didn’t do it in a day, so let’s talk about incremental changes that don’t require a sudden switchover.

    Speaker

    Photo Speaker Name Profile
    Wendy Nather Wendy Nather View Profile
  • Wed 31th Oct 11:30 - 12:00
  • Hacking Dumberly, Just Like the Bad Guys Tim Medin  |   Red Siege  |   The Keynote

    The Keynote Theatre

    Wed 31th Oct 11:30 to 12:00

    Hacking Dumberly, Just Like the Bad Guys

    Tim will discuss the dumbest red team tricks and hacks he's encountered over the years. He is going to take the A out of APT, because so few attackers really need to use advanced techniques. He'll also discuss the simple defenses that make an attacker's life much more difficult.

    Speaker

    Photo Speaker Name Profile
    Tim Medin Tim Medin View Profile
  • Wed 31th Oct 13:00 - 13:30
  • Global Scale Vulnerability Management Matthew O’Connor   |   Google  |   The Keynote

    The Keynote Theatre

    Wed 31th Oct 13:00 to 13:30

    Global Scale Vulnerability Management

    Heartbleed, ShellShock, POODLE, Spectre, and Meltdown! How do you manage and protect against vulnerabilities which affect the entire internet? In this session, you will learn about Google’s approach to managing large-scale security vulnerabilities, coordinating efforts  and communications across businesses, engineering the solution, and working cross-industry to ensure commercial and consumer customers are safe and secure.

    Speaker

    Photo Speaker Name Profile
    Matthew O’Connor Matthew O’Connor View Profile
  • Thu 1th Nov 09:30 - 10:00
  • Criminal Perspectives: Former US Most Wanted Cybercriminal Brett Johnson Discusses His History of Cybercrime, Its Current State, and Where Its Going Brett Johnson  |     |   The Keynote

    The Keynote Theatre

    Thu 1th Nov 09:30 to 10:00

    Criminal Perspectives: Former US Most Wanted Cybercriminal Brett Johnson Discusses His History of Cybercrime, Its Current State, and Where Its Going

    Join "The Original Internet Godfather" Brett Johnson for a one of a kind presentation on cybercrime. Brett will detail his cybercrime past before walking the audience through the current state of online crime and showing the audience exactly how todays cybercriminals commit Synthetic Fraud, Business Email Compromise, Account Takeovers, and more. Learn how crooks commit those crime, but more importantly learn what you can do to protect yourself and your business.

    Speaker

    Photo Speaker Name Profile
    Brett Johnson Brett Johnson View Profile
  • Thu 1th Nov 10:50 - 11:20
  • CIO, CISO and Cloud Transformation: Who’s watching the watcher? Mark Mincin  |   McAfee  |   The Keynote

    The Keynote Theatre

    Thu 1th Nov 10:50 to 11:20

    CIO, CISO and Cloud Transformation: Who’s watching the watcher?

    If all InfoSec-related tasks in Information Technology were performed by a member of the Information Security team, we wouldn’t need an IT team at all. Do we even need an IT team? Mark will discuss what IT does in organizations using a hybrid cloud strategy, for Public and Private cloud.  What’s the practical and good-practice boundary between InfoSec and IT? What are the most important cloud security priorities and who covers what tasks for which?

    Speaker

    Photo Speaker Name Profile
    Mark Mincin Mark Mincin View Profile
  • Thu 1th Nov 13:40 - 14:10
  • Brought to you by ZK Research Zeus Kerravala   |   ZK Research   |   The Keynote

    The Keynote Theatre

    Thu 1th Nov 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Zeus Kerravala Zeus Kerravala View Profile
Top