Day 2 - 29 November 2018

Enterprise Security – Emerging Tech & Regulations

Day 2 of the Enterprise Security track will focus on the impact that new technologies such as blockchain, artificial intelligence and machine learning will have on cybersecurity.  Using case studies from healthcare and the financial services sector, we will examine threats to data, the legal implications of data breaches and the role of standards and regulations.

09:30AM

Sean Sposito

Industry Analyst, Security

Javelin Strategy & Research

Associated Talks:

09:30AM - Day 2

View Enterprise Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

View Full Info

Enterprise Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

. Sean Sposito, Industry Analyst, Security, Javelin Strategy & Research
Hide Details
More Details

09:50AM

Sean Sposito

Industry Analyst, Security

Javelin Strategy & Research

Associated Talks:

09:30AM - Day 2

View Enterprise Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

View Full Info

Brian Byrne

Director of Operations

EMVCo

Associated Talks:

09:50AM - Day 2

View Panel: The role of regulations & standards for enterprise cybersecurity

View Full Info

Jeff Wilbur

Director

Online Trust Alliance Initiative

Associated Talks:

09:50AM - Day 2

View Panel: The role of regulations & standards for enterprise cybersecurity

View Full Info

Randy Vanderhoof

Executive Director

Secure Technology Alliance

Associated Talks:

09:50AM - Day 2

View Panel: The role of regulations & standards for enterprise cybersecurity

View Full Info

Auston Davis

CISO

Stanford Children's Health

Associated Talks:

09:50AM - Day 2

View Panel: The role of regulations & standards for enterprise cybersecurity

View Full Info

Panel: The role of regulations & standards for enterprise cybersecurity

  • What does the concept of standards really mean in the context of cybersecurity?
  • Exploring corporate association vs government based policies such as those from DHS, NIST, Cloud Security Alliance, FTC etc…
  • Can a verticalized approach to standards work?
  • What is current US regulation in this area?
Moderator: . Sean Sposito, Industry Analyst, Security, Javelin Strategy & Research
. Brian Byrne, Director of Operations, EMVCo
. Jeff Wilbur, Director, Online Trust Alliance Initiative
. Randy Vanderhoof, Executive Director, Secure Technology Alliance
. Auston Davis, CISO, Stanford Children's Health
Hide Details
More Details

10:30AM

Anil John

Technical Director

U.S. Department of Homeland Security S&T Silicon Valley Innovation Program (SVIP)

Associated Talks:

10:30AM - Day 2

View Keynote: Adapting Innovation in Blockchain and IoT for DHS

View Full Info

Keynote: Adapting Innovation in Blockchain and IoT for DHS

This session will describe the security, privacy and interoperability lessons learned in adapting Blockchain and IoT technology to meet the needs of the Homeland Security Enterprise, and how the DHS Silicon Valley Innovation Program (SVIP) is partnering with the global innovation community to adapt and harness cutting-edge technologies to address the needs of DHS Operations at startup, rather than government, speed.

. Anil John, Technical Director, U.S. Department of Homeland Security S&T Silicon Valley Innovation Program (SVIP)
Hide Details
More Details

11:00AM

Ashish Gupta

Director of Technology, Identity Access Management

Target

Associated Talks:

11:00AM - Day 2

View Top trends in IAM

12:00PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Top trends in IAM

  • How IAM evolved in last decade? Manual fulfilment to automated CI/CD build and deployments
  • IAM changed from compliance focused to user focused without compromising on security (Simple, Seamless and Secure)
  • Top trends in Identity Access Governance and Authentication
. Ashish Gupta, Director of Technology, Identity Access Management, Target
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Abhi Dugar

Research Director, Network Infrastructure and IoT Security

IDC

View Full Info

Brajesh Goyal

VP Engineering

Cavirin

Associated Talks:

12:00PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Ashish Gupta

Director of Technology, Identity Access Management

Target

Associated Talks:

11:00AM - Day 2

View Top trends in IAM

12:00PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

BG Badriprasad

Chief Security Architect

Ross Stores

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

12:00PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Panel: Exploring Identity Access Management

Despite the best efforts of cyber security professionals to update systems and protect against vulnerabilities, if access to these systems is not managed correctly, attackers could gain access resulting in costly data breaches.  Hence identity & access management (IAM) is a key component of modern cyber security planning and implementation. Controlling the use and issuance of administrative passwords in key.  This panel will analyse the following:

  • What factors need to be considered when implementing IAM systems?
  • The role will technologies like Blockchain, and biometrics have in IAM?
  • How important is IAM for cloud based systems, and what do security professionals have to consider differently?
Moderator: . Abhi Dugar, Research Director, Network Infrastructure and IoT Security, IDC
. Brajesh Goyal, VP Engineering, Cavirin
. Ashish Gupta, Director of Technology, Identity Access Management, Target
. BG Badriprasad, Chief Security Architect, Ross Stores
Hide Details
More Details

12:40PM

James St Pierre

Deputy Director of the Information Technology Laboratory

National Institute of Standards and Technology

Associated Talks:

12:40PM - Day 2

View Afternoon Keynote: NIST’s Role in Cyber Security and IoT Standards

View Full Info

Afternoon Keynote: NIST’s Role in Cyber Security and IoT Standards

  • NIST IR 8228 – “Considerations for Managing IoT Cybersecurity and Privacy” out for public comment until Oct. 24th
  • Cybersecurity baseline for IOT
  • The importance of public/private partnerships in standards development
. James St Pierre, Deputy Director of the Information Technology Laboratory, National Institute of Standards and Technology
Hide Details
More Details

01:10PM

Dan Trimble

President & CEO

bitLens Inc.

View Full Info

Tom Schmitt

Global Director for Threat Intelligence

Anheuser-Busch InBev

Associated Talks:

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Aaron Campbell

Security Team Lead

WordPress

Associated Talks:

03:50PM - Day 2

View Lessons Learned by the WordPress Security Team

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Linh Huynh

Director of Business Development

SecureKey

Associated Talks:

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Hema Lakkaraju

Global Software and IT Compliance Lead | Founder & CEO

PerkinElmer | ANSA Solutions

Associated Talks:

03:50PM - Day 2

View Vision for the future: Role of Cyber risk and security in Digital Healthcare

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Keynote Panel: Evolving cyber intelligence landscapes

  • Role of private, enterprise and governmental agencies in cyber intelligence – how is information shared across these?
  • What is the difference between tactical, technical, strategic and operational cyber threat intelligence?
  • The increasing role of automation, AI and machine learning for gathering and processing intelligence relating to cyber threats
  • Discussion of best practices for gathering and acting upon cyber threat intelligence
Moderator: . Dan Trimble, President & CEO, bitLens Inc.
. Tom Schmitt, Global Director for Threat Intelligence, Anheuser-Busch InBev
. Aaron Campbell, Security Team Lead, WordPress
. Linh Huynh, Director of Business Development, SecureKey
. Hema Lakkaraju, Global Software and IT Compliance Lead | Founder & CEO, PerkinElmer | ANSA Solutions
Hide Details
More Details

01:50PM

Networking Break

02:50PM

Professor Dawn Song

Professor, Computer Science | CEO

UC Berkeley | Oasis Labs

Associated Talks:

02:50PM - Day 2

View Privacy-preserving cloud computing

View Full Info

Privacy-preserving cloud computing

. Professor Dawn Song, Professor, Computer Science | CEO, UC Berkeley | Oasis Labs
Hide Details
More Details

03:20PM

Nasir Khan

Sr. Director, Digital Product Security and Security Architecture

Capital One

Associated Talks:

03:20PM - Day 2

View Cybersecurity Challenges in Financial Companies when they are going through Digital Transformation

View Full Info

Cybersecurity Challenges in Financial Companies when they are going through Digital Transformation

Usually, companies tend to associate Cloud, Agile or Micro services with Digital Transformation. These are all infrastructure, project management and architectural enablers; the main transformation that happens is that companies start making Digital Products. That’s the key delta area for cyber security organizations that they have to deal with, and find it challenging to do so. Nasir will  focus on what is the mindset change needed, the technical change needed, the setup change needed, for security organizations to deal with Digital Products.

. Nasir Khan, Sr. Director, Digital Product Security and Security Architecture, Capital One
Hide Details
More Details

03:50PM

Hema Lakkaraju

Global Software and IT Compliance Lead | Founder & CEO

PerkinElmer | ANSA Solutions

Associated Talks:

03:50PM - Day 2

View Vision for the future: Role of Cyber risk and security in Digital Healthcare

01:10PM - Day 2

View Keynote Panel: Evolving cyber intelligence landscapes

View Full Info

Vision for the future: Role of Cyber risk and security in Digital Healthcare

In the present innovative healthcare industry( where IT, software are the key components of products), challenges prevail on appropriate regulations existence that ensure the safety and security of the patients/ customer. This presentation is an attempt to share the importance of cyber risk and compliance in the healthcare industry

This presentation is on the following points

  • role of IT  in digital healthcare
  • role of cyber risk and compliance in digital Healthcare
  • advantages of integrated cyber risk and compliance framework  in digital healthcare
. Hema Lakkaraju, Global Software and IT Compliance Lead | Founder & CEO, PerkinElmer | ANSA Solutions
Hide Details
More Details

04:20PM

Session Close