Full Schedule | ||
Date/Time | Session | Room |
9/20/2018 11:00 AM -to- 11:15 AM | Welcome Laszlo Gonc Caren Shiozaki |
General Session |
9/20/2018 11:15 AM -to- 12:01 PM | The Ever-Evolving Threat Landscape – Reducing Risk from Cybercrime to Cyber Espionage Eduardo E Cabrera The threat landscape is constantly evolving from global digital extortion attacks and Business Email Compromises to international cyberespionage campaigns distilling cyber propaganda during national elections. Learn what makes these attacks successful to better understand how you need to defend your networks, data, users. Only by having a deep understanding of the threats you face and the vulnerabilities you have, can you successfully reduce the risk your organizations face |
General Session |
9/20/2018 12:01 PM -to- 12:05 PM | Cyber Insights Laszlo Gonc Caren Shiozaki |
General Session |
9/20/2018 12:05 PM -to- 12:35 PM | Life After an Anonymous Attack on My City Mike Maier This session will discuss the Anonymous attack on the city of Fort Lauderdale, Florida in late 2014 and how the city has changed its ways – both technologically, and behaviorally, in the time since. The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks. The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 that was brought on by a dispute over a city ordinance that had recently become heated. The city proactively shut down internet access while ensuring its files were secure. The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. |
Risk |
9/20/2018 12:05 PM -to- 12:35 PM | Building a Cyber Work Force – Opportunities and Challenges Dr. Suku Nair This session will address the difficulty in the finding of qualified workers in the cyber area. Statistics on qualified positions is staggering. We will discuss how the crisis impacts national security and the economy. Further, it will discuss various initiatives that are trying to mitigate the problem. The main theme of the webinar is the current status of the cyber workforce. In addition to the various challenges in building and maintaining the workforce. It will discuss various opportunities surrounding the problem. This session will include discussions on Threat landscape, Various Actors Cyber Workforce Crisis, Cyber Security Education, and Research- with a discussion on sample programs and a way forward. |
Strategy |
9/20/2018 12:35 PM -to- 12:55 PM | Global Cyber News Coffee Break & Cyber Insights Laszlo Gonc Caren Shiozaki |
General Session |
9/20/2018 12:55 PM -to- 1:25 PM | Stop the Breach. The Case for Real-Time Automated Endpoint Security Andy Singer The threat landscape has changed yet again. What was several years ago an era of advanced attackers seeking valuable data, has transformed to be global disruptive data related plagues, backwinded by nation-states seeking to dictate agenda and terms. In respect to the evolving threat landscape, organizations came to realize that compromise is inevitable and have started to look for ways to respond and quickly, automatically and in real-time in order to prevent the next data breach or disruption. The evolving incident response process holds in store a great challenge as the process effectiveness metric is fairly easy to measure. Do you actually know how effective is your current SOC/IR/MDR in detecting, validating, containing and remediating infections in the environment? Are you ready to win the race to your own data? |
General Session |
9/20/2018 1:25 PM -to- 2:10 PM | Exhibit Hall Take a breather from programming in our virtual exhibit hall. Visit our sponsor booths from the comfort and convenience of your computer and learn how their solutions can enhance your cybersecurity efforts. Browse at your convenience! |
General Session |
9/20/2018 2:10 PM -to- 2:30 PM | Leveraging Blockchain to Create Trusted Data Assets Live with Margaret Mitchell Margaret Mitchell Learn how to leverage blockchain to increase the value of your company's core data assets by wrapping them in unbreakable trust. As more of your company’s assets become digitized the need for a trusted history of those digitize assets becomes more important. But it is easy for the origination, ownership and history of that data to get lost. In this Quick Tip you will learn how to leverage blockchain to turn a data asset into a trusted data asset. In this session you will learn what is a trusted data asset and why creating trusted data assets is important to creating long-term value for your company. Topics covered are: Learn how to:
|
Strategy |
9/20/2018 2:10 PM -to- 2:40 PM | Shawn Murray CEO at Murray Security Services Dr. Shawn Murray Everywhere we turn, we hear that there is a shortage of cyber security professionals with highly sought-after skill sets and experienced tradecraft to fill widening cyber security program requirements. I have sat on workforce development panels with federal, state and city government leaders, education professionals and industry partners looking for ways to address the problem. I have seen many startup companies claiming they have the key to filling the needs of various industries. I have also seen well-established organizations realigning current training & certification programs in an effort to keep up with the startups. While very few are embedded into true workforce development initiatives, most companies are jumping on the bandwagon and trying to capitalize on a new revenue stream called “Cyber” or “Cyber Security”. My take away is that the issue is more complex than just finding the right person with the right skills to fill a need. There are several factors that need to be considered when analyzing the problem, which do not revolve around training and certification. |
Risk |
9/20/2018 2:30 PM -to- 2:40 PM | Live with Margaret Mitchell Laszlo Gonc Caren Shiozaki Margaret Mitchell |
Strategy |
9/20/2018 2:40 PM -to- 2:55 PM | Cyber Trends 2016 - 2019 Dr. Chris Maurer
While cybersecurity is commonly mentioned as a top organizational priority, are organizations really doing everything they can to protect their networks and data? For the past three years, the SIM IT Trends Study has been investigating this issue and some surprising results have emerged. |
Risk |
9/20/2018 2:40 PM -to- 2:55 PM | Cybersecurity: A “Competitive Advantage” or an over Hyped term? Don Devine This session will explore the question of whether Cybersecurity is or can be a “Competitive Advantage” or is that just Hype. For the past several years, and for good reason, Cybersecurity has been a much talked about topic in the Boardroom. We have read and heard countless articles and industry presentations touting that more and more top executives have embraced cybersecurity as a strategic priority and "Competitive Advantage." There is no doubt that cybersecurity is a top priority for most organizations, but can it truly be a competitive advantage or is that just sales/marketing hype? |
Strategy |
9/20/2018 2:55 PM -to- 3:00 PM | Cyber Insights Laszlo Gonc Caren Shiozaki |
General Session |
9/20/2018 3:00 PM -to- 3:45 PM | Resilience in Apps & Applications Carlos Pero
Apps and application both utilize a Web site exposed to the Internet, and that is where the real Cyber risk to an enterprise exists. This session reviews basic concepts, the well-known risks, and how to be resilient to defend against attacks and not provide opportunity in the first place. |
General Session |
9/20/2018 3:45 PM -to- 3:50 PM | Cyber Insights Laszlo Gonc Caren Shiozaki |
General Session |
9/20/2018 3:50 PM -to- 4:35 PM | Closing Keynote: Make it a Win-Win Proposition Dr. Rebecca Wynn How to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity This is an enlightening and entertaining presentation on how to successfully resolve conflicts between business leaders, security, compliance, and human behavior while keeping your sanity! Real-world examples are used to teach you practical tools you can use to quickly align people to one purpose. |
General Session |
9/20/2018 4:35 PM -to- 4:45 PM | Wrap-Up Laszlo Gonc Caren Shiozaki |
General Session |