Day 1 - 4 November 2020

10:30AM

(PST)

Adeel Khurshid

Director of Security Operations

GitHub

Associated Talks:

10:30AM - Day 1

View Presentation: Why you should automate your SecOps

View Full Info

Presentation: Why you should automate your SecOps

  • How automating security can help you streamline processes
  • Examples of how Github has successfully used automation – ChatOps, self-service and IAM

 

. Adeel Khurshid, Director of Security Operations, GitHub

10:50AM

(PST)

Presentation: Secure Scalability: DevSecOps for the Agile Business

  • How to make your security agile – updating Appsec for a DevOps world 
  • Defining application security – cloud, mobile and web 
  • Discussing common development vulnerabilities and how to secure your data against them 
  • Best practices to ensure your processes run smoothly 

11:10AM

(PST)

Presentation: Software as a Service – Fuelling a Competitive Security Advantage?

  • From Google to Facebook: Defining SaaS 
  • How is it shaping the way we work, play and connect? 
  • Exploring the ways SaaS is making your daily life more secure 

11:30AM

(PST)

Presentation: Time to grow up – how mature is your organization?

  • Why being aware of your security maturity is important
  • Is security really a part of your culture or are you just paying lip service?
  • How to optimize your security program to align with industry best practices.

11:50AM

(PST)

Presentation: Winning the Cyber Security Arms Race

  • What are the best tools you can have in your arsenal? 
  • The importance of innovation 
  • Overcoming the challenges in building security software 

12:10PM

(PST)

Presentation: Remote Working – a Blessing or a Curse?

  • Closing the gap between desktop and mobile security can be a horrendous task for security teams How can you ensure devices are protected without invading privacy? 
  • Is isolation good for security? 
  • How can you ensure your email security is up to scratch? 

12:30PM

Lunch & Speed Networking on Grip

02:00PM

(PST)

Presentation: Driving Progress in a Digital World – Reducing Risk in your Supply Chain

  • Effective risk management allows organisations to take full advantage of new opportunities. How can you ensure you can trust your partners?  
  • How to insure against future risk  
  • Ensuring collaboration is your best protection 

On-Demand Presentation

02:20PM

(PST)

Presentation: Are You Breach Ready?

  • Do you have plans in place to respond and recover from a breach? 
  • How to equip your board  
  • Ensuring you have the correct crisis support 

02:40PM

(PST)

Presentation: From Developer to Deployment: How to streamline application security testing

  • How can security solutions help you integrate security into your DevOps environment? 
  • Breaking through traditional testing processes and tools 
  • Building secure high-quality software faster 

03:00PM

(PST)

Presentation: The Role of Emerging Technology in Security

  • The biggest advancements in cyber security tech and what can we expect from the next 5 years? 
  • What is the impact of increased use of Artificial Intelligence, Machine Learning and Deep Learning? 
  • What role will technologies like blockchain, behavioural analytics and biometrics have in securing our future identities and combating fraud? 

Day 2 - 5 November 2020

10:30AM

(PST)

Ashish Gupta

Director of Technology, Identity Access Management

Target

Associated Talks:

10:30AM - Day 2

View Presentation: Using a practical approach to govern privileged identities

View Full Info

Presentation: Using a practical approach to govern privileged identities

Details to follow…

. Ashish Gupta, Director of Technology, Identity Access Management, Target

10:50AM

(PST)

Presentation: Zero Trust: Balancing Resilience and User Experience

  • How can Zero Trust architecture address today’s security challenges of a mobile workforce and data in the cloud? 
  • How can you exert control and reduce your attack surface? 
  • Protecting user identity, devices and applications 

11:10AM

(PST)

Presentation: Is your data a tough nut to crack?

  • Locating and prioritising your data – encrypting at rest and in transit 
  • Choosing the best key management solution 
  • The role of emerging technologies – blockchain & quantum computing 

11:30AM

(PST)

Presentation: The 2020 Threat Landscape

  • A deep dive into predictions for the 2020 threat landscape 
  • Key actions you can take to protect yourself as an organisation 
  • Top resources to support your efforts 

11:50AM

(PST)

Presentation: How to get more from your penetration testing

  • How modern digital environments require a continuous approach to pen testing 
  • Examining the routes malicious users can take and how these attacks can be recreated & prevented 
  • Does good security create good compliance? 

12:10PM

(PST)

Presentation: Bug Bounty Programs: The devil you know?

  • What role can white and grey hat hackers play in developing secure systems? 
  • Benefits and challenges – getting senior level buy in and best practices when considering a hack 
  • Examples of organisations doing this successfully 

12:30PM

Lunch & Speed Networking on Grip

11:50AM

(PST)

Presentation: Cyber Crime: detection, prevention and recovery

  • What is cybercrime and how is it different from public perception?
  • How can you protect yourself?
  • Recent examples of organizations falling foul to online criminals

02:40PM

(PST)

Presentation: Detect & Protect – navigating network vulnerability

  • The basics – discovery, reporting, prioritization & response 
  • How vulnerability management fits into risk and governance policies 
  • The importance of continuous vulnerability management 

02:40PM

(PST)

Presentation: Under the Microscope with Network Forensics

  • What is network forensics? 
  • Evaluating ‘catch-it-as-you-can’ and ‘stop, look and listen’ systems 
  • How real time analytics can influence better decision making 

03:00PM

(PST)

Presentation: Multiply your Impact: Managed Services

  • Defining managed services 
  • Top 10 benefits of using managed services 
  • Best practices for selecting a provider