August 12 - 14, 2018
SEAPORT HOTEL, BOSTON, MA

Day 1, Sunday, August 12, 2018

11:00 am - 11:45 am Registration



11:45 am - 1:15 pm Networking Lunch



1:15 pm - 1:25 pm Orientation

1:25 pm - 1:35 pm Chairperson's Opening Remarks

1:35 pm - 2:05 pm Empowering Proactive Security While Integrating and Maximizing Automation

Enterprises strive to balance the use of people and technology to achieve cyber security resilience. Practical risk management is a mind-set.  Executives must keep in balance the interests of stakeholders, the mission, asset value and the real impact of an attack. Breaches will happen, the focus needs to be how should the organization minimize disruptions, handle ransomware and other attacks including proactive incident response and business continuity measures. Efforts to automate include integrating existing security tools and bolstering processes to protect from human errors. Executives must convey security is a continued enterprise investment.
In this session:
•Navigating barriers to digitization objectives
•Balancing automation and expert human analysis
•Keeping and testing plans and backups
•Maintaining and sharing threat intelligence 

2:05 pm - 2:35 pm Reclaiming Control and Reducing Risk in Application Security

Knowing is half the battle when it comes to protecting applications and their sensitive data.
Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices.  Enterprises resort to using theoretical levels of criticality — not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order.  Many vulnerabilities often undergo an exception process and make it into protocol.
This session will review real-life case studies about enterprises that are adopting a savvy, new approach to protecting sensitive data and mitigating threats real-time. Explore available game-changing tools that are placed at the front of the line—directly in the application’s operating environment—to immediately lower risk and act as a compensating control at runtime.
In the case studies, explore ways to improve forensics, see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process.  Through a demonstration observe live production attacks and generation of real-time security event logs and reports.  Security teams can then correlate pre-production vulnerability scan results with  runtime attack logs to go back, remediate based on actual risk—not just hypothetical threats.  The result? Improved forensics.



2:40 pm - 3:10 pm Business Meetings

3:10 pm - 3:40 pm Business Meetings

3:40 pm - 4:10 pm Business Meetings

MasterClass

4:15 pm - 5:00 pm Impacting Security Awareness, Attitudes and Action
Cyber criminals continue to successfully and consistently exploit human nature to accomplish their goals. With the erosion of traditional networks a deep-rooted trust in social networks fuels some human behaviors. Employees are often the last line of defense between a sophisticated phishing scheme and internal systems, data, and customers. This session will provide practical advice to help organizations leverage timely and consistent security awareness and behavior management practices to strengthen the human link. 
In this session;
•Providing relatable and relevant case studies to engage employees
•Outlining how and where tools are helpful
•Emerging industry trends
•Shifting to detection and response 



BrainWeave

4:15 pm - 5:00 pm Reducing Risk Through Actionable Intelligence and Automation
New cyber security threats occur daily. Data and analytics allow the quick identification of anomalies and potential advanced threat actors. The availability of big data and analytical tools has led to a broader understanding of customers’ risk for actions ranging from defaulting on debt to suffering a major security incident. Some of the biggest gaps in data analysis include identifying advanced malware, credential theft, and insider threats. Big data assists in the visualization of cyberattacks which allows classification and categorization of cyber threats in order to build baseline behaviors and prevent attacks.
In this session:
•Utilizing broad-base risk modelling to identify and define a customer profile
•Classifying and categorizing data into clear potential attack patterns
•Deploying cloud intelligence and automation to detect and respond to suspicious activity



5:00 pm - 5:15 pm Networking Break

Ignite Session- 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:15 pm - 5:50 pm Securely Share Files Beyond Your Enterprise Borders with Full Governance and Control




Ignite Session- 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:15 pm - 5:50 pm AI- Anticipating Attacks or Striking Back?

Ignite Session- 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:15 pm - 5:50 pm Rising Importance of Risk Scores: Supply Chain Management

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm A. Proactive Patching and Mitigation Against Spectre and Meltdown and Other Vulnerabilities

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm B. IoT: Considerations for Security Frameworks

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm C. Scalable Security- Balancing People and Technology

6:30 pm - 7:30 pm Networking Cocktail Discussion