Day 2 - 6 October 2022

10:00AM

(PDT)

Chairperson’s Welcome

10:15AM

(PDT)

Marquis Carroll

Tech Lead - Cloud and Compute Security

Twitter

Associated Talks:

10:15AM - Day 2

View Presentation: Key Security Automation for Compliance in The Cloud

03:35PM - Day 1

View Presentation: Important Considerations When Scaling Your Cloud Security Program

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Presentation: Key Security Automation for Compliance in The Cloud

– Understanding the goal for security automation in your public cloud.

– Implementing infrastructure automation solutions to build security at the base layer.

– Building a strong detection and automated remediation pipelines to address misconfigurations.

– Continuously improving your automation to fit compliance frameworks.

. Marquis Carroll, Tech Lead - Cloud and Compute Security, Twitter

10:45AM

(PDT)

Brianna Leddy

Director of Analysis

Darktrace

Associated Talks:

10:45AM - Day 2

View Presentation: How AI Can Think Like an Attacker

11:35AM - Day 2

View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Presentation: How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

. Brianna Leddy, Director of Analysis, Darktrace

11:15AM

(PDT)

Tim Mackey

Technical Evangelist

Synopsys

Associated Talks:

11:15AM - Day 2

View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

View Full Info

Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

The complexity of software supply chains, and the risks of getting supply chain management wrong are highlighted in President Biden’s Executive Order on Cybersecurity making this a top priority for all DevOps teams. This session will cover several common supply chain attacks, ranging from typo-squatting and project take-overs through to attacks on package managers that lead to dependency confusion.

. Tim Mackey, Technical Evangelist , Synopsys

11:35AM

(PDT)

Duncan MacRae

Editor in Chief

TechForge

View Full Info

Brianna Leddy

Director of Analysis

Darktrace

Associated Talks:

10:45AM - Day 2

View Presentation: How AI Can Think Like an Attacker

11:35AM - Day 2

View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Willy Fabritius

Global Head of Strategy & Business Development

SGS

Associated Talks:

11:35AM - Day 2

View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

  • Familiarisation with the cyber criminal’s toolkit: which threats are the panel most fearful of?
  • How have digital transformation initiatives exposed businesses to new attack vectors?
  • Understanding the reputational impact of an unmitigated cyber-attack.
Moderator: . Duncan MacRae, Editor in Chief, TechForge
. Brianna Leddy, Director of Analysis, Darktrace
. Willy Fabritius, Global Head of Strategy & Business Development, SGS

12:15PM

(PDT)

Brad Jones

CISO, VP of Information Security

Seagate Technology

Associated Talks:

12:15PM - Day 2

View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Presentation: Keeping Your Data Secure Amid Multicloud Friction

  • How to achieve data confidentiality, integrity, and availability in a multicloud environment.
  • Whether the cloud or on-prem is more secure.
  • The must-haves of data at scale.
  • The opportunities for safeguarding data at scale.
. Brad Jones, CISO, VP of Information Security, Seagate Technology

12:45PM

(PDT)

Jimmy Jones

Head of Security

Zariot

Associated Talks:

12:45PM - Day 2

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Colin Constable

CO-FOUNDER

Atsign

Associated Talks:

12:45PM - Day 2

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Presentation: Accelerating Digital Transformation – Flip the Approach

A clear integrated strategy is key to digital transformation and security must form the foundations.
Discover how a simple protocol overlay can remove friction from your IoT ad Digital transformation projects.
Learn how the opensource solution can consolidate security across your whole Operational technology (OT) and information technology (IT) estate.
. Jimmy Jones, Head of Security, Zariot
. Colin Constable, CO-FOUNDER , Atsign

12:55PM

(PDT)

Lunch & Networking

01:30PM

(PDT)

Bruce Kaalund

Cybersecurity Specialist

Governance, Risk & Compliance

Associated Talks:

01:30PM - Day 2

View Presentation: How Do You Know if Your Cybersecurity Program is Working?

View Full Info

Presentation: How Do You Know if Your Cybersecurity Program is Working?

  • Understanding how much better protected your data is with MFA. 
  • Learn how to establish the right MFA model for your needs. 
  • How MFA can be a key lynchpin for securing your digital transformation objectives. 
. Bruce Kaalund, Cybersecurity Specialist, Governance, Risk & Compliance

02:00PM

(PDT)

Garrett Bechler

Senior Director, World Wide Systems Engineering

Ermetic

Associated Talks:

02:00PM - Day 2

View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

View Full Info

Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

With so many different variables to consider when designing and implementing a security strategy for your cloud infrastructure, you need a clear plan for setting priorities and building a course of action. Best practices and compliance standards are a good first step. But they don’t give you a tool for assessing the maturity of your current cloud security practices and a roadmap for continuous improvement.

We created a lightweight and easy to understand framework to help you assess the maturity of your current cloud security practices and build a roadmap for continuous improvement.

In this workshop, we will introduce the Security Maturity framework and explain how to adapt it to the needs of your organization.

Find out how to:

  1. Gain a clear picture of where your organization currently stands on its path to a secure cloud environment
  2. Design a cloud security strategy for your enterprise in reachable, practical and clear milestones
  3. Create a common language between various stakeholders in your organization and getting them on-board
  4. Leverage automated solutions to help you on the road to cloud security maturity across AWS, Azure and GCP
. Garrett Bechler, Senior Director, World Wide Systems Engineering, Ermetic

02:20PM

Networking Break

02:50PM

(PDT)

Jim Nelson

Information Security Consultant

FRSecure

Associated Talks:

02:50PM - Day 2

View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

View Full Info

Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

  • Understanding the consequences of social engineering on businesses.
  • How to ensure your workforce is effectively trained and prepared for social engineering threats.
  • A best practice guide to social engineering prevention.
. Jim Nelson, Information Security Consultant , FRSecure

03:10PM

(PDT)

January Walker

Director of Product Management Cyber Security & Digital Identity

Fortune 200 Financial Company

Associated Talks:

03:10PM - Day 2

View Presentation: Returning Control of Identity

View Full Info

Presentation: Returning Control of Identity

  • Behavioural Biometrics.
  • AI and Machine Learning.
  • Privacy.
  • Blockchain Identity.
  • VR in metaverse.
. January Walker, Director of Product Management Cyber Security & Digital Identity , Fortune 200 Financial Company

03:40PM

(PDT)

End of Event

Reviewing what we mean by a Smart City.

Real Projects Discussed: Innovate Las Vegas.