Session List
Full Schedule
Date/Time Session Room
9/20/2018 11:00 AM -to- 11:15 AM Welcome
Laszlo Gonc
Caren Shiozaki
 
General Session
9/20/2018 11:15 AM -to- 12:01 PM The Ever-Evolving Threat Landscape – Reducing Risk from Cybercrime to Cyber Espionage
Eduardo E Cabrera

The threat landscape is constantly evolving from global digital extortion attacks and Business Email Compromises to international cyberespionage campaigns distilling cyber propaganda during national elections. Learn what makes these attacks successful to better understand how you need to defend your networks, data, users. Only by having a deep understanding of the threats you face and the vulnerabilities you have, can you successfully reduce the risk your organizations face

General Session
9/20/2018 12:01 PM -to- 12:05 PM Cyber Insights
Laszlo Gonc
Caren Shiozaki
 
General Session
9/20/2018 12:05 PM -to- 12:35 PM Life After an Anonymous Attack on My City
Mike Maier
This session will discuss the Anonymous attack on the city of Fort Lauderdale, Florida in late 2014 and how the city has changed its ways – both technologically, and behaviorally, in the time since.

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 that was brought on by a dispute over a city ordinance that had recently become heated. The city proactively shut down internet access while ensuring its files were secure.

The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades.
Risk
9/20/2018 12:05 PM -to- 12:35 PM Building a Cyber Work Force – Opportunities and Challenges
Dr. Suku Nair
This session will address the difficulty in the finding of qualified workers in the cyber area. Statistics on qualified positions is staggering. We will discuss how the crisis impacts national security and the economy. Further, it will discuss various initiatives that are trying to mitigate the problem.

The main theme of the webinar is the current status of the cyber workforce. In addition to the various challenges in building and maintaining the workforce. It will discuss various opportunities surrounding the problem.

This session will include discussions on Threat landscape, Various Actors Cyber Workforce Crisis, Cyber Security Education, and Research- with a discussion on sample programs and a way forward.
Strategy
9/20/2018 12:35 PM -to- 12:55 PM Global Cyber News Coffee Break & Cyber Insights
Laszlo Gonc
Caren Shiozaki
 
General Session
9/20/2018 12:55 PM -to- 1:25 PM Stop the Breach. The Case for Real-Time Automated Endpoint Security
Andy Singer
The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond and quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data?
General Session
9/20/2018 1:25 PM -to- 2:10 PM Exhibit Hall
 
Take a breather from programming in our virtual exhibit hall. Visit our sponsor booths from the comfort and convenience of your computer and learn how their solutions can enhance your cybersecurity efforts. Browse at your convenience!
General Session
9/20/2018 2:10 PM -to- 2:30 PM Leveraging Blockchain to Create Trusted Data Assets Live with Margaret Mitchell
Margaret Mitchell
Learn how to leverage blockchain to increase the value of your company's core data assets by wrapping them in unbreakable trust.

As more of your company’s assets become digitized the need for a trusted history of those digitize assets becomes more important. But it is easy for the origination, ownership and history of that data to get lost. In this Quick Tip you will learn how to leverage blockchain to turn a data asset into a trusted data asset.

In this session you will learn what is a trusted data asset and why creating trusted data assets is important to creating long-term value for your company. Topics covered are:

Learn how to:
  • What is a trusted data asset; how traditional data management techniques can create a data trust vacuum
  • The basics of how block chain
  • How to use blockchain to transform data assets into trusted data assets
  • How those trusted data assets can create long-term sustainable value for your company.
Strategy
9/20/2018 2:10 PM -to- 2:40 PM Shawn Murray CEO at Murray Security Services
Dr. Shawn Murray
Everywhere we turn, we hear that there is a shortage of cyber security professionals with highly sought-after skill sets and experienced tradecraft to fill widening cyber security program requirements. I have sat on workforce development panels with federal, state and city government leaders, education professionals and industry partners looking for ways to address the problem. I have seen many startup companies claiming they have the key to filling the needs of various industries. I have also seen well-established organizations realigning current training & certification programs in an effort to keep up with the startups. While very few are embedded into true workforce development initiatives, most companies are jumping on the bandwagon and trying to capitalize on a new revenue stream called “Cyber” or “Cyber Security”. My take away is that the issue is more complex than just finding the right person with the right skills to fill a need. There are several factors that need to be considered when analyzing the problem, which do not revolve around training and certification.
Risk
9/20/2018 2:30 PM -to- 2:40 PM Live with Margaret Mitchell
Laszlo Gonc
Caren Shiozaki
Margaret Mitchell
 
Strategy
9/20/2018 2:40 PM -to- 2:55 PM Cyber Trends 2016 - 2019
Dr. Chris Maurer

While cybersecurity is commonly mentioned as a top organizational priority, are organizations really doing everything they can to protect their networks and data?  For the past three years, the SIM IT Trends Study has been investigating this issue and some surprising results have emerged.

This data-driven session will summarize key findings from the last three years to provide insight into organizational cybersecurity practices.  In addition to an organizational analysis, industries will be evaluated to demonstrate how some industries are better positioned to address cybersecurity threats than others.  By combining organizational cybersecurity practices with previous breach experience and cybersecurity investment, we will start to understand why there is significant room for improvement across nearly all industry sectors.

The presentation will conclude with thoughts on the future trends related to cybersecurity and what organizations should be looking out for in 2019 and beyond. 

Risk
9/20/2018 2:40 PM -to- 2:55 PM Cybersecurity: A “Competitive Advantage” or an over Hyped term?
Don Devine
This session will explore the question of whether Cybersecurity is or can be a “Competitive Advantage” or is that just Hype.

For the past several years, and for good reason, Cybersecurity has been a much talked about topic in the Boardroom. We have read and heard countless articles and industry presentations touting that more and more top executives have embraced cybersecurity as a strategic priority and "Competitive Advantage." There is no doubt that cybersecurity is a top priority for most organizations, but can it truly be a competitive advantage or is that just sales/marketing hype?
Strategy
9/20/2018 2:55 PM -to- 3:00 PM Cyber Insights
Laszlo Gonc
Caren Shiozaki
 
General Session
9/20/2018 3:00 PM -to- 3:45 PM Resilience in Apps & Applications
Carlos  Pero

Apps and application both utilize a Web site exposed to the Internet, and that is where the real Cyber risk to an enterprise exists. This session reviews basic concepts, the well-known risks, and how to be resilient to defend against attacks and not provide opportunity in the first place.

A functional Web application, exposed to the Internet, is literally asking for trouble by opening port 80 and 443 on network firewalls to allow Web requests to come into a data center and be executed. A poorly-coded Web application can compromise the server, the network, and your business. The OWASP Top 10 list of critical security risks provides a good starting point to make sure you are aware of and have appropriate controls in place for these risks, but you can only protect what you are aware of, and your developers need to prevent vulnerabilities from being exposed in the first place.

General Session
9/20/2018 3:45 PM -to- 3:50 PM Cyber Insights
Laszlo Gonc
Caren Shiozaki
 
General Session
9/20/2018 3:50 PM -to- 4:35 PM Closing Keynote: Make it a Win-Win Proposition
Dr. Rebecca Wynn
How to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity

This is an enlightening and entertaining presentation on how to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity! Real-world examples are used to teach you practical tools you can use to quickly align people to one purpose.
General Session
9/20/2018 4:35 PM -to- 4:45 PM Wrap-Up
Laszlo Gonc
Caren Shiozaki
 
General Session