Day 1 - 28 November 2018

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2018, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced and current and potential solutions.

09:30AM

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Forrester

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

. Merritt Maxim, Principal Analyst Serving Security & Risk Professionals , Forrester
Hide Details
More Details

09:50AM

John Grimm

Senior Director of IoT Security Strategy

Thales eSecurity

Associated Talks:

09:50AM - Day 1

View Keynote: Unlock the IoT’s potential by establishing trust

View Full Info

Keynote: Unlock the IoT’s potential by establishing trust

IoT projects, the backbone of enterprise digital transformation, have the tantalizing potential to improve operations and deliver customer value. However, if you can’t trust your IoT data and the “things” that produce it, there’s no point in undertaking the massive effort to buy and connect devices, collect and analyze their data, or worst of all make business decisions based on questionable data. This session will reveal strategies to enable trust in the IoT, turning it from a barrier and source of new vulnerabilities to a competitive differentiator.

. John Grimm, Senior Director of IoT Security Strategy, Thales eSecurity
Hide Details
More Details

10:20AM

Aditya Balapure

Team Lead, Information Security

Grubhub

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

10:20AM - Day 1

View Common cyber security mistakes made by enterprises and how to avoid them

View Full Info

Common cyber security mistakes made by enterprises and how to avoid them

The technological disruption and innovation is bringing in a rapid shift to the global threat landscape. As enterprises are preparing to get better equipped with tools, technologies and resources to reduce their cyber security risks, so are the adversaries trying to stay ahead of the game. The common security problems at the core still remain the same; only the scale, the emerging technologies and the risks to the business have evolved over time. This presentation will cover some of the most common cyber security mistakes made by enterprises and the business impacts that come along with them. With enterprises moving away from a perimeter-based approach to zero trust networks, the security strategy is only as strong as the weakest link. Key takeaways for those attending include how to stay ahead of the conventional attacks that usually occur from common misses in a company’s security strategy and the necessity to plan for actions that could be potential emerging risks for organizations

. Aditya Balapure, Team Lead, Information Security, Grubhub
Hide Details
More Details

10:50AM

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Forrester

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Christopher Witbracht

Global Director, Data Protection

Anheuser-Busch InBev

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

View Full Info

Jennifer Silk

Senior Advisor for Cybersecurity, Office of the Chief Information Officer

U.S. Department of Energy

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

03:30PM - Day 1

View Beyond IT: DOE Case Study

View Full Info

BG Badriprasad

Chief Security Architect

Ross Stores

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

12:00PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Aditya Balapure

Team Lead, Information Security

Grubhub

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

10:20AM - Day 1

View Common cyber security mistakes made by enterprises and how to avoid them

View Full Info

Panel: The importance of collaboration for enterprise cybersecurity

  • Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
  • How can companies across the ecosystem collaborate to ensure stronger security? 
  • What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each? 
  • Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security. 
Moderator: . Merritt Maxim, Principal Analyst Serving Security & Risk Professionals , Forrester
. Christopher Witbracht, Global Director, Data Protection, Anheuser-Busch InBev
. Jennifer Silk, Senior Advisor for Cybersecurity, Office of the Chief Information Officer, U.S. Department of Energy
. BG Badriprasad, Chief Security Architect, Ross Stores
. Aditya Balapure, Team Lead, Information Security, Grubhub
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Mike Armistead

Co-Founder & CEO

Respond Software

Associated Talks:

12:00PM - Day 1

View The Security Status Quo is Killing Us

View Full Info

The Security Status Quo is Killing Us

I get it, it is tough to move on from how we did things yesterday. In the security world, this is particularly true, and it is really holding us back from fighting ever advancing and sophisticated security threats. Today we are approaching 50 Billion devices on the Internet, which amounts to 7 per human. We must change how we approach the problem of securing this mess.

In this session, Mike Armistead will talk about many of these changes that we must adopt: For example reevaluating security operations and relying on entry-level security professionals to perform console monitoring. If the human analyst is distracted, fatigued, lacks domain knowledge, or is biased, the alert is likely to be dismissed without further review. We must shift from human-led security to machine-led security, from black and white thinking to working in the gray areas, and applying mathematics and probability theory to advance our security operations.

. Mike Armistead, Co-Founder & CEO, Respond Software
Hide Details
More Details

12:20PM

Matt Short

Senior Research Director, Internet of Things

IHS Markit

View Full Info

Israr Khan

Senior Software Engineer, Security

Roku

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Darron Antill

CEO

Device Authority

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Gorav Arora

Director of Technology, CTO Office

Gemalto

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Mark Hearn

Head of IoT Security

Cloakware by Irdeto

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information 
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc. 
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities? 
  • Importance of other aspects of IoT security; testing, education of staff and physical security for devices
Moderator: . Matt Short, Senior Research Director, Internet of Things, IHS Markit
. Israr Khan, Senior Software Engineer, Security, Roku
. Darron Antill, CEO , Device Authority
. Gorav Arora, Director of Technology, CTO Office , Gemalto
. Mark Hearn, Head of IoT Security, Cloakware by Irdeto
Hide Details
More Details

01:00PM

Robert Lembree

Cyber Security Architect

Schneider Electric

Associated Talks:

01:00PM - Day 1

View IoT Security: PKI and Beyond

View Full Info

Jon Ferguson

Senior Product Manager, IoT Security

Entrust Datacard

Associated Talks:

01:00PM - Day 1

View IoT Security: PKI and Beyond

View Full Info

IoT Security: PKI and Beyond

This presentation will discuss best practices for identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things (IoT) deployment. It will delve into the benefits of using Public Key Infrastructure (PKI) technology and its key role in providing reliable identity assurance and encryption for billions of endpoints. It will also explore where traditional enterprise use of PKI presents challenges in IoT environments and the alternative services and approaches organizations should consider to optimally establish trust in their IoT ecosystem.

. Robert Lembree, Cyber Security Architect, Schneider Electric
. Jon Ferguson, Senior Product Manager, IoT Security, Entrust Datacard
Hide Details
More Details

01:30PM

Networking Break

02:40PM

Paresh Joshi

Director Product Management

SonicWall Inc

Associated Talks:

02:40PM - Day 1

View Network Security Analytics & Centralized Management In IoT and Cloud World

View Full Info

Network Security Analytics & Centralized Management In IoT and Cloud World

. Paresh Joshi, Director Product Management, SonicWall Inc
Hide Details
More Details

03:00PM

Tim Casto

Business Development Manager, IoT

Lanner Electronics

Associated Talks:

03:00PM - Day 1

View Securing the Smart Factory and Critical Infrastructure

View Full Info

Securing the Smart Factory and Critical Infrastructure

The past few years have seen an increase in Cyber threats and attacks in the industrial and energy sectors. Lanner describes the best practices of securing the devices and networks used to provide services and some of the new products to prevent and manage these threats.

 

. Tim Casto, Business Development Manager, IoT, Lanner Electronics
Hide Details
More Details

03:30PM

Jennifer Silk

Senior Advisor for Cybersecurity, Office of the Chief Information Officer

U.S. Department of Energy

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity

03:30PM - Day 1

View Beyond IT: DOE Case Study

View Full Info

Beyond IT: DOE Case Study

Advancing cybersecurity is a core priority for the Department of Energy (DOE). DOE is approaching the cybersecurity challenge as an enterprise effort, incorporating assets and capabilities from across our programs and National Laboratories. The DOE Cybersecurity Strategy (2018-2020) defines a highly collaborative approach to strengthening the cybersecurity and resilience of the Department’s networks and systems including the operational technology assets it owns.

  • Informed and engaged customers are more likely to become invested partners.
  • Managing risks to the Department’s own science, technology, nuclear security, and energy infrastructure.
  • Approach to deliver high quality IT and cybersecurity, continuously improve our cybersecurity posture, transition from IT owner to IT broker, and excel as stewards of taxpayer dollars.
. Jennifer Silk, Senior Advisor for Cybersecurity, Office of the Chief Information Officer, U.S. Department of Energy
Hide Details
More Details

04:00PM

Session Close

Networking Party – 6pm – Hyatt Regency Hotel

An evening of networking on November 28 from 6pm. Access for Ultimate, Gold & Expo Plus holders in addition to speakers, sponsors, press and exhibitors. Taking place in the attached Hyatt Regency Hotel, join us from drinks, nibbles and networking at the Pool Area from 6pm. Further details to follow