Day 1 - 5 October 2022
10:00AM
(PDT)
M.K Palmore
Official Member
Forbes Technology Council
03:20PM - Day 1
View Chair’s Closing Remarks
04:00PM - Day 1
View Chair’s Closing Remarks
10:00AM - Day 2
View Chairperson’s Welcome
10:00AM - Day 1
View Chairperson’s Welcome
Chairperson’s Welcome
10:15AM
(PDT)
Srinivasan R.
Senior Manager Cyber - Technical
Capital One
10:15AM - Day 1
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Kavitha Venkataswamy
Director - Digital Product Security
Capital One
10:15AM - Day 1
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
- In this talk, we will present the third party software supply chain attacks and defenses on web and mobile applications, and how ThreatModeling can help identify supply chain threats.
- We will then discuss third party assessments and how Risk Management plans can then be developed to mitigate vulnerabilities presented from the increased threat surface created by third party vendor tools and SDKs.
10:45AM
(PDT)
Andrew Egoroff
Senior Cybersecurity Specialist
ProcessUnity
10:45AM - Day 1
View VIRTUAL PRESENTATION: ProcessUnity
02:05PM - Day 1
View Panel: How to Stay Ahead of Insider Threats
10:45AM - Day 1
View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy
Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy
- Why is it important to assess vendor risk management?
- How to develop effective strategies for addressing higher risk vendors.
- Implementing ongoing oversight utilizing metrics and external alerts.
11:15AM
(PDT)
Michael Fulton
Adjunct Faculty
The Ohio State University
Brian Jones
Head of Application Security & Vulnerability Management
Meta
11:15AM - Day 1
View Panel: Addressing Cloud Computing Vulnerabilities
Steve Van Lare
VP of Engineering
Anjuna
11:55AM - Day 1
View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise
11:55AM - Day 1
View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise
11:15AM - Day 1
View Panel: Addressing Cloud Computing Vulnerabilities
Panel: Addressing Cloud Computing Vulnerabilities
- Discussing how to prevent compliance violations.
- Understanding future cloud-based threat vectors; insecure APIs, hijacking, data breaches, malicious insiders & more.
- Recognising the pitfalls of misconfiguring cloud storage.
11:55AM
(PDT)
Steve Van Lare
VP of Engineering
Anjuna
11:55AM - Day 1
View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise
11:55AM - Day 1
View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise
11:15AM - Day 1
View Panel: Addressing Cloud Computing Vulnerabilities
Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise
- Discussing the recent changes in public cloud technology and how Confidential Computing can be used to lock-down data and create a trusted environment, even in an environment shared by other customers, open to third parties, and in a geography that is considered untrusted.
- Discovering how Enterprises can embrace the cloud and protect confidential data like PII, PHI, and more without recoding or refactoring applications
- Examining the benefits of Confidential Computing for protecting sensitive workloads and applications
12:15PM
(PDT)
Lunch & Networking
eviewing what we mean by a Smart City.Real Projects Discussed: Innovate Las Vegas.
01:15PM
(PDT)
Presentation: Security and Compliance of Fintech Big Data
With the advent of Fintech companies, financial services are accessible to lot more people in the world. In addition, Fintech is opening up doors to exchange financial data across organizations and making the process simpler and faster. This session will look at…
- Why In the last 5 years, the fintech consumers have doubled and today 64% of consumers across worldwide are using Fintech products and services.
- Analysing how fintech services are becoming pervasive: Reviewing the rising risks of privacy, fraud, and non-compliance.
- How The cyberattack is highest the in-banking industry and reached $18.3 million per year annually. Thus, it is vital to look into the cyber security measures and compliance measures.
- The rest of the session details those measures specific to Fintech industry.
01:45PM
(PDT)
Derek Kernus
Director of Cybersecurity Operations
DTS
01:45PM - Day 1
View VIRTUAL PRESENTATION: DTS
01:45PM - Day 1
View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile
Edward Tuorinsky
Managing Principal
DTS
01:45PM - Day 1
View VIRTUAL PRESENTATION: DTS
01:45PM - Day 1
View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile
Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile
02:05PM
(PDT)
Mel Reyes
Chief Information Officer | Chief Information Security Officer
Getaround
Elizabeth Cartier
Director - Information Security
Headspace Inc.
02:05PM - Day 1
View Panel: How to Stay Ahead of Insider Threats
Thorsten Stremlau
Co-Chair
TCG's Marketing Work Group - Trusted Computing Group
02:05PM - Day 1
View Panel: How to Stay Ahead of Insider Threats
Andrew Egoroff
Senior Cybersecurity Specialist
ProcessUnity
10:45AM - Day 1
View VIRTUAL PRESENTATION: ProcessUnity
02:05PM - Day 1
View Panel: How to Stay Ahead of Insider Threats
10:45AM - Day 1
View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy
Oscar Minks
CTO
FRSecure
02:45PM - Day 2
View VIRTUAL PRESENTATION: FRSecure
02:45PM - Day 2
View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them
02:05PM - Day 1
View Panel: How to Stay Ahead of Insider Threats
Panel: How to Stay Ahead of Insider Threats
- Deterrence is key: ensuring you have appropriate policies, strong encryption, and good access controls.
- Assessing best practice detection and monitoring techniques.
- What to do if you’ve identified an insider attack.
02:45PM
(PDT)
Coffee & Networking in the Exhibition Area
Reviewing what we mean by a Smart City.
Real Projects Discussed: Innovate Las Vegas.
03:15PM
(PDT)
Senior Representative, Hoxhunt
03:15PM - Day 1
View Presentation: Hoxhunt
Presentation: Hoxhunt
Content to Follow Soon…
03:35PM
(PDT)
Senior Representative, n8n.io
03:35PM - Day 1
View Presentation: Securing Critical Infrastructure
Presentation: Securing Critical Infrastructure
- Understanding what is driving the increased threat to critical infrastructure and the consequences for those involved.
- Assessing the cybercriminals armoury – what should I be aware of?
- A best practice guide to protecting your OT systems.
03:45PM
(PDT)
Presentation: The Evolution of Ransomware Attacks and How to Prevent Them
- Understanding the drivers behind the current rise in ransomware attacks.
- How has the growth of digital currencies enabled an increase in nefarious activity?
- How to create a ransomware toolkit – educating employees, effectively managing access, backing up data, multi-factor authentication, and more…
04:15PM
(PDT)
Dr. Josef Schroefl
Deputy Director/ CoI on Strategy and Defense
Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats
04:15PM - Day 1
View Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure
Carmen Marsh
President & CEO
United Cybersecurity Alliance
04:15PM - Day 1
View Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure
Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure
The global supply chain is a life line for the international trade economy. As part of this supply chain, commercial vessels and ports are vulnerable to hybrid threats in the form of sabotage, navigational spoofing, and cyberattacks. What existing technology could give us the much needed competitive advantage, and help us advance quickly in securing our physical and digital infrastructure?
- AI and machine learning is the most promising and powerful technology for benefiting humanity with its “dual use” capabilities. Are we ready to harness the most powerful and world altering technology for the good of all humankind?
- Get your key takeaways from experts in hybrid threats, cybersecurity and cyber law that will keep you appraised of the most acute global threats and ways to countermeasure them.
04:55PM
(PDT)
Chair’s Closing Remarks
Reviewing what we mean by a Smart City.
Real Projects Discussed: Innovate Las Vegas.
04:20PM
(PDT)
Close of Day 1
Reviewing what we mean by a Smart City.
Real Projects Discussed: Innovate Las Vegas.