Day 1, Sunday, August 12, 2018
1:15 pm - 1:25 pm Orientation
1:25 pm - 1:35 pm Chairperson's Opening Remarks
1:35 pm - 2:05 pm Empowering Proactive Security While Integrating and Maximizing Automation
Enterprises strive to balance the use of people and technology to achieve cyber security resilience. Practical risk management is a mind-set. Executives must keep in balance the interests of stakeholders, the mission, asset value and the real impact of an attack. Breaches will happen, the focus needs to be how should the organization minimize disruptions, handle ransomware and other attacks including proactive incident response and business continuity measures. Efforts to automate include integrating existing security tools and bolstering processes to protect from human errors. Executives must convey security is a continued enterprise investment.
In this session:
•Navigating barriers to digitization objectives
•Balancing automation and expert human analysis
•Keeping and testing plans and backups
•Maintaining and sharing threat intelligence
2:05 pm - 2:35 pm Reclaiming Control and Reducing Risk in Application Security
Knowing is half the battle when it comes to protecting applications and their sensitive data.
Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality — not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol.
This session will review real-life case studies about enterprises that are adopting a savvy, new approach to protecting sensitive data and mitigating threats real-time. Explore available game-changing tools that are placed at the front of the line—directly in the application’s operating environment—to immediately lower risk and act as a compensating control at runtime.
In the case studies, explore ways to improve forensics, see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Through a demonstration observe live production attacks and generation of real-time security event logs and reports. Security teams can then correlate pre-production vulnerability scan results with runtime attack logs to go back, remediate based on actual risk—not just hypothetical threats. The result? Improved forensics.
2:40 pm - 3:10 pm Business Meetings
3:10 pm - 3:40 pm Business Meetings
3:40 pm - 4:10 pm Business Meetings
MasterClass4:15 pm - 5:00 pm Impacting Security Awareness, Attitudes and Action
Cyber criminals continue to successfully and consistently exploit human nature to accomplish their goals. With the erosion of traditional networks a deep-rooted trust in social networks fuels some human behaviors. Employees are often the last line of defense between a sophisticated phishing scheme and internal systems, data, and customers. This session will provide practical advice to help organizations leverage timely and consistent security awareness and behavior management practices to strengthen the human link.
In this session;
•Providing relatable and relevant case studies to engage employees
•Outlining how and where tools are helpful
•Emerging industry trends
•Shifting to detection and response
BrainWeave4:15 pm - 5:00 pm Reducing Risk Through Actionable Intelligence and Automation
New cyber security threats occur daily. Data and analytics allow the quick identification of anomalies and potential advanced threat actors. The availability of big data and analytical tools has led to a broader understanding of customers’ risk for actions ranging from defaulting on debt to suffering a major security incident. Some of the biggest gaps in data analysis include identifying advanced malware, credential theft, and insider threats. Big data assists in the visualization of cyberattacks which allows classification and categorization of cyber threats in order to build baseline behaviors and prevent attacks.
In this session:
•Utilizing broad-base risk modelling to identify and define a customer profile
•Classifying and categorizing data into clear potential attack patterns
•Deploying cloud intelligence and automation to detect and respond to suspicious activity