Day 2 - 6 October 2022
10:00AM
(PDT)
Chairperson’s Welcome
10:15AM
(PDT)
Marquis Carroll
Tech Lead - Cloud and Compute Security

10:15AM - Day 2
View Presentation: Key Security Automation for Compliance in The Cloud

03:35PM - Day 1
View Presentation: Important Considerations When Scaling Your Cloud Security Program

11:15AM - Day 1
View Panel: Addressing Cloud Computing Vulnerabilities
Presentation: Key Security Automation for Compliance in The Cloud
– Understanding the goal for security automation in your public cloud.
– Implementing infrastructure automation solutions to build security at the base layer.
– Building a strong detection and automated remediation pipelines to address misconfigurations.
– Continuously improving your automation to fit compliance frameworks.
10:45AM
(PDT)
Brianna Leddy
Director of Analysis
Darktrace

10:45AM - Day 2
View Presentation: How AI Can Think Like an Attacker

11:35AM - Day 2
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!
Presentation: How AI Can Think Like an Attacker
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
11:15AM
(PDT)
Tim Mackey
Technical Evangelist
Synopsys

11:15AM - Day 2
View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success
Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success
The complexity of software supply chains, and the risks of getting supply chain management wrong are highlighted in President Biden’s Executive Order on Cybersecurity making this a top priority for all DevOps teams. This session will cover several common supply chain attacks, ranging from typo-squatting and project take-overs through to attacks on package managers that lead to dependency confusion.
11:35AM
(PDT)
Duncan MacRae
Editor in Chief
TechForge
Brianna Leddy
Director of Analysis
Darktrace

10:45AM - Day 2
View Presentation: How AI Can Think Like an Attacker

11:35AM - Day 2
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!
Willy Fabritius
Global Head of Strategy & Business Development
SGS

11:35AM - Day 2
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!
Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!
- Familiarisation with the cyber criminal’s toolkit: which threats are the panel most fearful of?
- How have digital transformation initiatives exposed businesses to new attack vectors?
- Understanding the reputational impact of an unmitigated cyber-attack.
12:15PM
(PDT)
Brad Jones
CISO, VP of Information Security
Seagate Technology

12:15PM - Day 2
View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1
View Panel: Addressing Cloud Computing Vulnerabilities
Presentation: Keeping Your Data Secure Amid Multicloud Friction
- How to achieve data confidentiality, integrity, and availability in a multicloud environment.
- Whether the cloud or on-prem is more secure.
- The must-haves of data at scale.
- The opportunities for safeguarding data at scale.
12:45PM
(PDT)
Jimmy Jones
Head of Security
Zariot

12:45PM - Day 2
View Presentation: Accelerating Digital Transformation – Flip the Approach
Colin Constable
CO-FOUNDER
Atsign

12:45PM - Day 2
View Presentation: Accelerating Digital Transformation – Flip the Approach
Presentation: Accelerating Digital Transformation – Flip the Approach
12:55PM
(PDT)
Lunch & Networking
01:30PM
(PDT)
Bruce Kaalund
Cybersecurity Specialist
Governance, Risk & Compliance

01:30PM - Day 2
View Presentation: How Do You Know if Your Cybersecurity Program is Working?
Presentation: How Do You Know if Your Cybersecurity Program is Working?
- Understanding how much better protected your data is with MFA.
- Learn how to establish the right MFA model for your needs.
- How MFA can be a key lynchpin for securing your digital transformation objectives.
02:00PM
(PDT)
Garrett Bechler
Senior Director, World Wide Systems Engineering
Ermetic

02:00PM - Day 2
View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework
Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework
With so many different variables to consider when designing and implementing a security strategy for your cloud infrastructure, you need a clear plan for setting priorities and building a course of action. Best practices and compliance standards are a good first step. But they don’t give you a tool for assessing the maturity of your current cloud security practices and a roadmap for continuous improvement.
We created a lightweight and easy to understand framework to help you assess the maturity of your current cloud security practices and build a roadmap for continuous improvement.
In this workshop, we will introduce the Security Maturity framework and explain how to adapt it to the needs of your organization.
Find out how to:
- Gain a clear picture of where your organization currently stands on its path to a secure cloud environment
- Design a cloud security strategy for your enterprise in reachable, practical and clear milestones
- Create a common language between various stakeholders in your organization and getting them on-board
- Leverage automated solutions to help you on the road to cloud security maturity across AWS, Azure and GCP
02:20PM
Networking Break
02:50PM
(PDT)
Jim Nelson
Information Security Consultant
FRSecure

02:50PM - Day 2
View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them
Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them
- Understanding the consequences of social engineering on businesses.
- How to ensure your workforce is effectively trained and prepared for social engineering threats.
- A best practice guide to social engineering prevention.
03:10PM
(PDT)
January Walker
Director of Product Management Cyber Security & Digital Identity
Fortune 200 Financial Company

03:10PM - Day 2
View Presentation: Returning Control of Identity
Presentation: Returning Control of Identity
- Behavioural Biometrics.
- AI and Machine Learning.
- Privacy.
- Blockchain Identity.
- VR in metaverse.
03:40PM
(PDT)
End of Event
Reviewing what we mean by a Smart City.
Real Projects Discussed: Innovate Las Vegas.