Day 1 - 13 November 2019

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2020, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced with current solutions.

10:30AM

Christy Riccardi

Regional Director, Region IX

Cybersecurity and Infrastructure Security Agency

Associated Talks:

10:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks

View Full Info

Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks

. Christy Riccardi, Regional Director, Region IX, Cybersecurity and Infrastructure Security Agency

10:50AM

Istvan Berko

Vice President

(ISC)2 East Bay Chapter

View Full Info

Edwin Covert

Director, Security Assessments and Infrastructure Engineering

WarnerMedia

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Sujeet Bambawale

Chief Information Security Officer

7-Eleven

Associated Talks:

02:30PM - Day 2

View Defining security culture: establishing non-negotiables

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Nabil Zoldjalali

Senior Cyber Security Technology Manager

Darktrace

Associated Talks:

11:50AM - Day 1

View Cyber AI: Fighting Back with Autonomous Response

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Paul Nicholson

Snr Director of Product Marketing

A10 Networks

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Panel: The evolution of cloud for enterprise cybersecurity

  • Discussing the benefits vs challenges of implementing cloud based systems at enterprise scale – what do CISOs and CIOs need to consider?
  • Public, Private or Hybrid: How cloud architecture impacts enterprise security
  • Addressing the risks of the Cloud as a big data centre – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
Moderator: . Istvan Berko, Vice President, (ISC)2 East Bay Chapter
. Edwin Covert, Director, Security Assessments and Infrastructure Engineering, WarnerMedia
. Sujeet Bambawale, Chief Information Security Officer, 7-Eleven
. Nabil Zoldjalali, Senior Cyber Security Technology Manager , Darktrace
. Paul Nicholson, Snr Director of Product Marketing, A10 Networks

11:30AM

Networking Break

11:50AM

Nabil Zoldjalali

Senior Cyber Security Technology Manager

Darktrace

Associated Talks:

11:50AM - Day 1

View Cyber AI: Fighting Back with Autonomous Response

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Cyber AI: Fighting Back with Autonomous Response

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.

Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:
• Why only Autonomous Response can counter today’s machine-speed attacks
• Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
• What achieving 100% visibility can reveal about your organization’s risk profile
• How the Cyber AI Analyst reduces the time spent triaging threats by 92%

. Nabil Zoldjalali, Senior Cyber Security Technology Manager , Darktrace

12:20PM

Ashwin Krishnan

COO

UberKnowledge

View Full Info

Chad Childers

Connected Vehicle Security

Ford Motor Company

Associated Talks:

02:30PM - Day 1

View Cyber security & the supply chain: a virtual case study

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Joseph W. Fisher

President

Affinity IoT Security Labs

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Lester Chan

Chief Information Security Officer

ChargePoint

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information 
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc. 
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities? 
  • Importance of other aspects of IoT security; testing, education of staff and physical security for devices
Moderator: . Ashwin Krishnan, COO, UberKnowledge
. Chad Childers, Connected Vehicle Security, Ford Motor Company
. Joseph W. Fisher, President, Affinity IoT Security Labs
. Lester Chan, Chief Information Security Officer, ChargePoint

01:00PM

Marian Merritt

Lead for Industry Engagement, NICE

NIST

Associated Talks:

01:00PM - Day 1

View Fresh Workforce Resources to Help You Find Cybersecurity Talent

View Full Info

Fresh Workforce Resources to Help You Find Cybersecurity Talent

If it takes six months (on average) to find your next cybersecurity professional, what can you do differently to accelerate and improve your process? What tools and ideas can you leverage from the federal government to widen the funnel of talent applying for your positions? What is your competition doing to develop talent from within? Is there a talent pool you might be overlooking?

. Marian Merritt, Lead for Industry Engagement, NICE, NIST

01:30PM

Networking Break

02:30PM

Chad Childers

Connected Vehicle Security

Ford Motor Company

Associated Talks:

02:30PM - Day 1

View Cyber security & the supply chain: a virtual case study

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Cyber security & the supply chain: a virtual case study

This talk will take you through specific threats distilled from more than ten years of experience into a single case study that embodies a few of the most critical supply chain issues – from integrating supplier designed devices to cloud hosting, from configuration to data storage. Learn best in class mitigations, work more effectively with your suppliers, and write requirements that take third party providers into account.

. Chad Childers, Connected Vehicle Security, Ford Motor Company

03:00PM

Tony Batalla

Chief Technology Officer

City of Leandro

Associated Talks:

03:00PM - Day 1

View Smart & Secure Cities: Balancing Innovation & Security

View Full Info

Smart & Secure Cities: Balancing Innovation & Security

Smart cities will utilize technology, data, sensors, to drive innovations in service delivery and outcomes in their communities. At the same time, municipal governments have become targets for ransomware attacks. Cities must find ways to implement IoT and digital technologies in secure, resilient ways that protect both their operations and the privacy of their residents. This session will explore the strategies public sector organizations can use to achieve this balance.

. Tony Batalla, Chief Technology Officer, City of Leandro

03:30PM

Pim Donkers

CEO & Co-founder

ARMA Instruments

Associated Talks:

03:30PM - Day 1

View Neutrality and Intent in Secure Communication

02:00PM - Day 2

View Neutrality and Intent in Secure Communication

View Full Info

Neutrality and Intent in Secure Communication

  • The risk in smartphones
  • Threat posed by tech giants and nation state actors
  • ARMA G1 Secure Communicator
. Pim Donkers, CEO & Co-founder, ARMA Instruments

03:40PM

Christy Riccardi

Regional Director, Region IX

Cybersecurity and Infrastructure Security Agency

Associated Talks:

10:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks

View Full Info

Subbu Iyer

Vice President Of Product Management

Cequence Security

Associated Talks:

03:40PM - Day 1

View Panel: Red Hot Cyber: Updates on the start-up world

View Full Info

Arasu Dhanasekar

CEO

Ampcus Cyber

Associated Talks:

03:40PM - Day 1

View Panel: Red Hot Cyber: Updates on the start-up world

View Full Info

Lebin Cheng

Founder & CTO

CloudVector

Associated Talks:

03:40PM - Day 1

View Panel: Red Hot Cyber: Updates on the start-up world

View Full Info

Rohan Puri

Co-Founder

SecurityAdvisor

Associated Talks:

03:40PM - Day 1

View Panel: Red Hot Cyber: Updates on the start-up world

View Full Info

Panel: Red Hot Cyber: Updates on the start-up world

With the cybersecurity market looking like it could exceed $300 billion in the next 5 years, it’s not surprising that the market is one of the hottest areas in innovation.

  • What are the best things to happen in the cyber arena in the last 18 months, and where is the future of the industry headed?
  • How are start-ups approaching new and evolved threat models, and how can they ensure they can keep up with a constant new set of challenges?
  • With over 3,000 new cyber companies every year, how can you differentiate yourself from the crowd?
Moderator: . Christy Riccardi, Regional Director, Region IX, Cybersecurity and Infrastructure Security Agency
. Subbu Iyer, Vice President Of Product Management, Cequence Security
. Arasu Dhanasekar, CEO, Ampcus Cyber
. Lebin Cheng, Founder & CTO , CloudVector
. Rohan Puri, Co-Founder, SecurityAdvisor

04:20PM

Session Close

Networking Party – 6pm – The Levi’s Stadium

An evening of networking on Wednesday, November 13 from 6pm. Access for Ultimate, Gold & Expo Plus holders in addition to speakers, sponsors, press & exhibitors. Taking place at The Levi’s Stadium, this legendary location has some pretty impressive views & is located just a few minutes walk from the expo venue.  Join us for drinks & networking.