Day 1 - 13 November 2019

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2020, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced with current solutions.

09:30AM

Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks

Hide Details

09:50AM

Threats to infrastructure: cyber security for energy

Hide Details

10:20AM

Keynote: Common cyber security mistakes made by enterprises and how to avoid them

Examining the common mistakes made my enterprises globally, and what business leaders can do to mitigate them. How cyber security can tackle the exponential growth in data from business systems that are incorporating more and more digital technology into their day to day business activities. Covering cloud, big data, AI, IOT and mobile devices and the security sensors meant to protect them from bad agents.

Hide Details
More Details

10:50AM

Paul Nicholson

Snr Director of Product Marketing

A10 Networks

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Panel: The evolution of cloud for enterprise cybersecurity

  • Discussing the benefits vs challenges of implementing cloud based systems at enterprise scale – what do CISOs and CIOs need to consider?
  • Public, Private or Hybrid: How cloud architecture impacts enterprise security
  • Addressing the risks of the Cloud as a big data centre – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
. Paul Nicholson, Snr Director of Product Marketing, A10 Networks
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Case Study: Securing ICS/SCADA

Hide Details

12:20PM

Chad Childers

Connected Vehicle Security

Ford Motor Company

Associated Talks:

03:40PM - Day 1

View Cyber security for the automotive industry

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Senior Representative, Affinity IT

Affinity IT

.

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Lester Chan

Chief Information Security Officer

ChargePoint

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information 
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc. 
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities? 
  • Importance of other aspects of IoT security; testing, education of staff and physical security for devices
. Chad Childers, Connected Vehicle Security, Ford Motor Company
. Senior Representative, Affinity IT, Affinity IT, .
. Lester Chan, Chief Information Security Officer, ChargePoint
Hide Details
More Details

01:00PM

Marian Merritt

Lead for Industry Engagement, NICE

NIST

Associated Talks:

01:00PM - Day 1

View Fresh Workforce Resources to Help You Find Cybersecurity Talent

View Full Info

Fresh Workforce Resources to Help You Find Cybersecurity Talent

If it takes six months (on average) to find your next cybersecurity professional, what can you do differently to accelerate and improve your process? What tools and ideas can you leverage from the federal government to widen the funnel of talent applying for your positions? What is your competition doing to develop talent from within? Is there a talent pool you might be overlooking?

. Marian Merritt, Lead for Industry Engagement, NICE, NIST
Hide Details
More Details

01:30PM

Networking Break

02:30PM

Rajan Kapoor

Director of Security

Dropbox

Associated Talks:

02:30PM - Day 1

View Managing Supply Chain Risk: How to do better Vendor Security Assessments

View Full Info

Managing Supply Chain Risk: How to do better Vendor Security Assessments

Addressing vendor security is a significant and inescapable problem for any modern company. Digital supply chain risk continues to make headlines as attackers successfully leverage vendor compromises to reach their actual targets. At the same time, the prevailing method of adding security check boxes in an RFI is not enough to truly understand the ongoing security posture of a third-party. The reviews are painful for both the vendors and the security team assessing the vendors and fall short of providing the confidence needed. At Dropbox, we’ve taken an innovative approach to make sure vendor security assessments result in real security. Come learn how Dropbox is leading the way on modern security practices to improve our vendor security reviews.

. Rajan Kapoor, Director of Security, Dropbox
Hide Details
More Details

03:00PM

Tony Batalla

Chief Technology Officer

City of Leandro

Associated Talks:

03:00PM - Day 1

View Case Study: Securing a smart city

View Full Info

Case Study: Securing a smart city

. Tony Batalla, Chief Technology Officer, City of Leandro
Hide Details
More Details

03:30PM

Koen Lockefeer

Co-Founder & Board Member

ARMA Instruments

Associated Talks:

03:30PM - Day 1

View Neutrality and Intent in Secure Communication

02:00PM - Day 2

View Neutrality and Intent in Secure Communication

View Full Info

Neutrality and Intent in Secure Communication

  • The risk in smartphones
  • Threat posed by tech giants and nation state actors
  • ARMA G1 Secure Communicator
. Koen Lockefeer, Co-Founder & Board Member, ARMA Instruments
Hide Details
More Details

03:40PM

Chad Childers

Connected Vehicle Security

Ford Motor Company

Associated Talks:

03:40PM - Day 1

View Cyber security for the automotive industry

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Cyber security for the automotive industry

This talk will cover a specific case study from the automotive industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.

. Chad Childers, Connected Vehicle Security, Ford Motor Company
Hide Details
More Details

04:00PM

Case Study: IoT, endpoint and mobile security – what lessons can we learn from BYOD initiatives?

Enterprises have long since been getting their heads around bring your own device (BYOD) – but with smartphones and tablets being superseded by wearables, sensors and more, what will this mean for the enterprise network – and the enterprise network manager? 

  • How can the performance of IoT devices on the network be securely managed without disrupting performance?
  • The ownership of security from the manufacturer and the enterprise perspective
  • What lessons can be learned from BYOD rollouts? 
Hide Details
More Details

04:20PM

Session Close