Day 2 - 29 November 2018

Developing Cloud Security Solutions

Gartner predicts that over $75 billion will be spent worldwide on infrastructure protection and security services in 2018.  As cloud computing takes a forefront for both consumer and enterprise computing, development of cloud security solutions is due to make up a large proportion of that spending.  With so much data now being stored in the cloud, the need for secure infrastructure is imperative.  Hear from industry professionals about how to develop robust solutions and strategies, plus how the future of cloud security will utilise technologies from AI and Machine Learning to Blockchain.

09:30AM

Craig Matsumoto

Senior Analyst

451 Research

Associated Talks:

09:30AM - Day 2

View Developing cloud security solutions: Chair’s welcome and opening comments

09:50AM - Day 2

View Fireside Chat: National Cybersecurity Strategy at the DHS

View Full Info

Developing cloud security solutions: Chair’s welcome and opening comments

. Craig Matsumoto, Senior Analyst, 451 Research
Hide Details
More Details

09:50AM

Hala Furst

Director, Cybersecurity and Innovation

U.S. Department of Homeland Security

Associated Talks:

09:50AM - Day 2

View Fireside Chat: National Cybersecurity Strategy at the DHS

View Full Info

Craig Matsumoto

Senior Analyst

451 Research

Associated Talks:

09:30AM - Day 2

View Developing cloud security solutions: Chair’s welcome and opening comments

09:50AM - Day 2

View Fireside Chat: National Cybersecurity Strategy at the DHS

View Full Info

Fireside Chat: National Cybersecurity Strategy at the DHS

A one on one discussion with Director for Cybersecurity & Innovation covering:

  •  The recently released National Cybersecurity Strategy and DHS Cybersecurity Strategy, and what implementation means for industry.
  • The Department’s risk-based posture towards cybersecurity threats
  • Best practices and resources for businesses of any size

Plus an opportunity to ask your questions.

. Hala Furst, Director, Cybersecurity and Innovation, U.S. Department of Homeland Security
. Craig Matsumoto, Senior Analyst, 451 Research
Hide Details
More Details

10:20AM

Khelan Bhatt

Global Director, Security Architecture

Anheuser-Busch InBev

Associated Talks:

10:20AM - Day 2

View Keynote: Here for the beer! How the world’s leading brewer is embracing the cloud and IoT securely.

View Full Info

Keynote: Here for the beer! How the world’s leading brewer is embracing the cloud and IoT securely.

  • AB InBev is the world’s leading beer brewer and a top CPG company. With hundreds of thousands of employees and thousands of facilities globally, scaling up high technology and innovation are key to our digital transformation.
  • As ABI embraces the cloud, industrial automation, IoT and Artificial Intelligence, we are faced with many challenges. Learn how we think about security and view it as an opportunity to save money, achieve our sustainability goals and make our consumers happy.
  • Inside our breweries around the world, we rely heavily on automation, sensors and technology. Take a walk through a typical brewery and learn how our SOC leverages inputs from Industrial IoT / SCADA security systems to ensure the beer keeps flowing.
. Khelan Bhatt, Global Director, Security Architecture, Anheuser-Busch InBev
Hide Details
More Details

10:50AM

Craig Matsumoto

Senior Analyst

451 Research

Associated Talks:

09:30AM - Day 2

View Developing cloud security solutions: Chair’s welcome and opening comments

09:50AM - Day 2

View Fireside Chat: National Cybersecurity Strategy at the DHS

View Full Info

Senior Representative, Illumio

Associated Talks:

10:50AM - Day 2

View Panel: Am I using the cloud securely?

12:20PM - Day 2

View It’s not you, it’s me: How the shared responsibility model for cloud security still slips through

View Full Info

Bill Yue Chen

Chief Security Architect

Multinational Financial Services Company

Associated Talks:

10:50AM - Day 2

View Panel: Am I using the cloud securely?

01:00PM - Day 2

View The Secrets to Build Enterprise Worthy Secure Cloud Services

View Full Info

Sam Fuller

Director of Strategy & Solutions Marketing, Digital Networking

NXP Semiconductor

Associated Talks:

10:50AM - Day 2

View Panel: Am I using the cloud securely?

View Full Info

Panel: Am I using the cloud securely?

  • Examining the current state of cloud security vs traditional IT systems
  • How do organisation develop cloud strategies that are secure, and account for data storage?
  • What innovations are there, and what more do we need to see to counter emerging threats in the next five years?
Moderator: . Craig Matsumoto, Senior Analyst, 451 Research
. Senior Representative, Illumio, ,
. Bill Yue Chen, Chief Security Architect, Multinational Financial Services Company
. Sam Fuller, Director of Strategy & Solutions Marketing, Digital Networking, NXP Semiconductor
Hide Details
More Details

11:30AM

Networking Break

11:50AM

Senior Representative, Darktrace

Associated Talks:

11:50AM - Day 2

View How machine learning is improving cyber security

View Full Info

How machine learning is improving cyber security

  • Detecting threats before they happen
  • Securing organisations’ entire portfolio of cloud apps
  • How cloud providers, third-party vendors and users can all work together
  • The impact of machine learning on compliance
. Senior Representative, Darktrace, ,
Hide Details
More Details

12:20PM

Senior Representative, Illumio

Associated Talks:

10:50AM - Day 2

View Panel: Am I using the cloud securely?

12:20PM - Day 2

View It’s not you, it’s me: How the shared responsibility model for cloud security still slips through

View Full Info

It’s not you, it’s me: How the shared responsibility model for cloud security still slips through

Security in the cloud is – and always has been – a two-way street defined as the vendor being responsible for security ‘of’ the cloud – software and hardware – while the customer is responsible for security ‘in’ the cloud – data, OS, identity and access management, and so forth. So why do companies still struggle?

This talk will address:

  • Examples of where shares responsibility model has been effective, and examples where it has failed.
  • Where does the vendors responsibility end and the customers start?
  • The role of standards and compliance to aiding share responsibility models.
. Senior Representative, Illumio, ,
Hide Details
More Details

12:50PM

Yan Michalevsky

CTO

Anjuna

Associated Talks:

12:50PM - Day 2

View Abstracting Application Security in the Cloud using Secure Enclaves

View Full Info

Abstracting Application Security in the Cloud using Secure Enclaves

Traditionally, organizations had to worry about the security of their infrastructure in order to ensure privacy, integrity and confidentiality for their critical applications. It required securing the actual machines that the applications were running on. Recent advances in processor architecture introduced support for Secure Enclaves – execution units that enable hardware-grade isolation for application logic, protecting it from compromised or misconfigured infrastructure and creating a tighter security perimeter around the application itself. We explore how this paradigm shift bears the potential to revolutionize application security”.

. Yan Michalevsky, CTO, Anjuna
Hide Details
More Details

01:00PM

Bill Yue Chen

Chief Security Architect

Multinational Financial Services Company

Associated Talks:

10:50AM - Day 2

View Panel: Am I using the cloud securely?

01:00PM - Day 2

View The Secrets to Build Enterprise Worthy Secure Cloud Services

View Full Info

The Secrets to Build Enterprise Worthy Secure Cloud Services

  • Why it is important
  • Top challenges and gaps cloud service companies fail to meet enterprise security requirement
  • Deep dive – how to build enterprise worthy secure cloud services
  • Silver bullet of open standard for cloud security
  • The evolving landscape – what’s next
. Bill Yue Chen, Chief Security Architect, Multinational Financial Services Company
Hide Details
More Details

01:30PM

Networking Break

02:40PM

Michael Sheppard

Manager, Application Security

Domino's

Associated Talks:

02:40PM - Day 2

View Keynote: Domino’s Delivery of a Faster Response was no Standard Order

03:10PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars 

View Full Info

Keynote: Domino’s Delivery of a Faster Response was no Standard Order

This talk presents Domino’s cutting-edge Automated Application Security Risk Engagement process leveraging integration between Atlassian Confluence and JIRA as well as highlights our custom Risk Form Handler which automatically creates and assigns Security Requirements Tickets in JIRA.   Lastly, we will present our Splunk ITSI Application Security KPI Dashboard illustrating our Domino’s E-Comm, Pulse and NGP Development Security Posture and related KPIs.

. Michael Sheppard, Manager, Application Security, Domino's
Hide Details
More Details

03:10PM

Abhi Dugar

Research Director, Network Infrastructure and IoT Security

IDC

View Full Info

Kathy Yang

Security Architect

JD.com

Associated Talks:

03:10PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars 

View Full Info

Mark Jackson

Scientific Lead, Business Development

Cambridge Quantum Computing

Associated Talks:

03:10PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars 

View Full Info

Michael Sheppard

Manager, Application Security

Domino's

Associated Talks:

02:40PM - Day 2

View Keynote: Domino’s Delivery of a Faster Response was no Standard Order

03:10PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars 

View Full Info

Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars 

  • Artificial intelligence, machine learning, and blockchain, are emerging tech cited as key in an increasingly complex security environment, but what challenges do these technologies pose?
  • Many key players are using security awareness and infrastructure is a key feature to differentiate themselves within the cloud wars, so how will this dictate how the market evolves?
  • As the hyperscalers are moving further up the stack to find the latest battleground – so who is going to come out on top?
  • Real life examples of where AI, ML and Blockchain are being utilised for security
Moderator: . Abhi Dugar, Research Director, Network Infrastructure and IoT Security, IDC
. Kathy Yang, Security Architect, JD.com
. Mark Jackson, Scientific Lead, Business Development, Cambridge Quantum Computing
. Michael Sheppard, Manager, Application Security, Domino's
Hide Details
More Details

03:50PM

Aaron Campbell

Security Team Lead

WordPress

Associated Talks:

03:50PM - Day 2

View Lessons Learned by the WordPress Security Team

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Lessons Learned by the WordPress Security Team

Managing security for the WordPress project is a challenge to say the least. The sheer volume of reports, the resulting noise, securing an ageing codebase, handling disclosure – all difficult to handle, but just the tip of the iceberg. How do you keep sites and users secure with so much third-party code? What do you do about hosting environments? How do you educate users? When is it okay to break things to fix security issues and how do you manage reputation when you do? They may not have it all figured out, but over the years they’ve learned a lot – often the hard way. Aaron shares their hard-learned lessons in hopes that it makes things easier on everyone else!

. Aaron Campbell, Security Team Lead, WordPress
Hide Details
More Details

04:10PM

Session Close