Day 1 - 5 October 2022

10:00AM

(PDT)

Dr. Joerg Borchert

President and Chairman

Trusted Computing Group

Associated Talks:

04:55PM - Day 1

View Chair’s Closing Remarks

10:00AM - Day 1

View Chairperson’s Welcome

03:55PM - Day 1

View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards

View Full Info

Chairperson’s Welcome

. Dr. Joerg Borchert, President and Chairman , Trusted Computing Group

10:15AM

(PDT)

Srinivasan R.

Senior Manager Cyber - Technical

Capital One

Associated Talks:

10:15AM - Day 1

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Kavitha Venkataswamy

Director - Digital Product Security

Capital One

Associated Talks:

10:15AM - Day 1

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

  • In this talk, we will present the third party software supply chain attacks and defenses on web and mobile applications, and how ThreatModeling can help identify supply chain threats.
  • We will then discuss third party assessments and how Risk Management plans can then be developed to mitigate vulnerabilities presented from the increased threat surface created by third party vendor tools and SDKs.
. Srinivasan R., Senior Manager Cyber - Technical , Capital One
. Kavitha Venkataswamy, Director - Digital Product Security, Capital One

10:45AM

(PDT)

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

10:45AM - Day 1

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

  • Why is it important to assess vendor risk management?
  • How to develop effective strategies for addressing higher risk vendors.
  • Implementing ongoing oversight utilizing metrics and external alerts.
. Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity

11:15AM

(PDT)

Michael Fulton

Adjunct Faculty

The Ohio State University

View Full Info

Brad Jones

CISO, VP of Information Security

Seagate Technology

Associated Talks:

12:15PM - Day 2

View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Marquis Carroll

Tech Lead - Cloud and Compute Security

Twitter

Associated Talks:

10:15AM - Day 2

View Presentation: Key Security Automation for Compliance in The Cloud

03:35PM - Day 1

View Presentation: Important Considerations When Scaling Your Cloud Security Program

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Steve Van Lare

VP of Engineering

Anjuna

Associated Talks:

11:55AM - Day 1

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

11:55AM - Day 1

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Panel: Addressing Cloud Computing Vulnerabilities

  • Discussing how to prevent compliance violations.
  • Understanding future cloud-based threat vectors; insecure APIs, hijacking, data breaches, malicious insiders & more.
  • Recognising the pitfalls of misconfiguring cloud storage.
Moderator: . Michael Fulton, Adjunct Faculty, The Ohio State University
. Brad Jones, CISO, VP of Information Security, Seagate Technology
. Marquis Carroll, Tech Lead - Cloud and Compute Security, Twitter
. Steve Van Lare, VP of Engineering, Anjuna

11:55AM

(PDT)

Steve Van Lare

VP of Engineering

Anjuna

Associated Talks:

11:55AM - Day 1

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

11:55AM - Day 1

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

  • Discussing the recent changes in public cloud technology and how Confidential Computing can be used to lock-down data and create a trusted environment, even in an environment shared by other customers, open to third parties, and in a geography that is considered untrusted.
  • Discovering how Enterprises can embrace the cloud and protect confidential data like PII, PHI, and more without recoding or refactoring applications.
  • Examining the benefits of Confidential Computing for protecting sensitive workloads and applications.
. Steve Van Lare, VP of Engineering, Anjuna

12:15PM

(PDT)

Lunch & Networking

eviewing what we mean by a Smart City.Real Projects Discussed: Innovate Las Vegas.

01:15PM

(PDT)

Altaf Bora

Trust and Safety - Developer Platform Investigations Manager

Fortune 200 Social Media Company

Associated Talks:

01:15PM - Day 1

View Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

To Follow Soon…

. Altaf Bora, Trust and Safety - Developer Platform Investigations Manager, Fortune 200 Social Media Company

01:45PM

(PDT)

Derek Kernus

Director of Cybersecurity Operations

DTS

Associated Talks:

01:45PM - Day 1

View VIRTUAL PRESENTATION: DTS

01:45PM - Day 1

View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

View Full Info

Edward Tuorinsky

Managing Principal

DTS

Associated Talks:

01:45PM - Day 1

View VIRTUAL PRESENTATION: DTS

01:45PM - Day 1

View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

View Full Info

Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

It’s become imperative for organizations from Main Street to the DoD to fundamentally rethink cyber security. It’s not something that any business can ignore; it’s a new operational reality and part of the cost of doing business. Yet too often we hear from organizations that haven’t planned or budgeted for cybersecurity—they aren’t prepared to make the investment or do the hard work.

CISA’s Zero Trust Maturity Model provides an excellent roadmap for organizations with a crawl-walk-run approach to maturing cybersecurity practice.

In this presentation, DTS Director of Cybersecurity Derek Kernus and Managing Principal Edward Tuorinsky will present both the technical thinking around Zero Trust and a leadership perspective as they discuss:

  • The key element of zero-trust
  • Why it’s the right model to use
  • The steps involved in implementing a zero-trust architecture
  • The role of culture and leadership in adoption
  • Additional benefits gained through robust cybersecurity

Policies and processes are one challenge but any security effort’s success ultimately comes down to people and culture. Zero trust may require a change in an organization’s mindset around cybersecurity, but it’s an essential need for every organization.

. Derek Kernus, Director of Cybersecurity Operations, DTS
. Edward Tuorinsky, Managing Principal, DTS

02:05PM

(PDT)

Altaf Bora

Trust and Safety - Developer Platform Investigations Manager

Fortune 200 Social Media Company

Associated Talks:

01:15PM - Day 1

View Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Aakash Ravi

Program Manager for Privacy and Compliance

Whatsapp

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Katherine McGauley

Senior Technical Manager, US-West

Darktrace

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Elizabeth Cartier

Director - Security

Maven Clinic

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

10:45AM - Day 1

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Panel: How to Stay Ahead of Insider Threats

  • Deterrence is key: ensuring you have appropriate policies, strong encryption, and good access controls.
  • Assessing best practice detection and monitoring techniques.
  • What to do if you’ve identified an insider attack.
. Altaf Bora, Trust and Safety - Developer Platform Investigations Manager, Fortune 200 Social Media Company
. Aakash Ravi, Program Manager for Privacy and Compliance , Whatsapp
. Katherine McGauley, Senior Technical Manager, US-West, Darktrace
. Elizabeth Cartier, Director - Security, Maven Clinic
. Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity

02:45PM

(PDT)

Coffee & Networking in the Exhibition Area

Reviewing what we mean by a Smart City.

Real Projects Discussed: Innovate Las Vegas.

03:15PM

(PDT)

Jeff Platon

Chief Marketing Officer

Hoxhunt

Associated Talks:

03:15PM - Day 1

View VIRTUAL PRESENTATION: Hoxhunt

03:15PM - Day 1

View Presentation: Learnings from 25 million Phishing Simulations

View Full Info

Presentation: Learnings from 25 million Phishing Simulations

Jeff Platon, CMO , shares insights and experiences from a Hoxhunt conducted study with 25 million phishing simulations and attacks seen in the wild. Learn key findings from the study that help transfer away from” just awareness” to effectively reducing risk together with the workforce.

. Jeff Platon, Chief Marketing Officer, Hoxhunt

03:35PM

(PDT)

Marquis Carroll

Tech Lead - Cloud and Compute Security

Twitter

Associated Talks:

10:15AM - Day 2

View Presentation: Key Security Automation for Compliance in The Cloud

03:35PM - Day 1

View Presentation: Important Considerations When Scaling Your Cloud Security Program

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Presentation: Important Considerations When Scaling Your Cloud Security Program

– Understanding the key concepts of a cloud security program.

– Identifying the appropriate responsibility matrix for your program,

– Understanding the importance of centralized governance controls.

– Discussing the benefits of implementing infrastructure-as-code (IaC).

– Examining how vendor relationships help build your program.

. Marquis Carroll, Tech Lead - Cloud and Compute Security, Twitter

03:55PM

(PDT)

Dr. Joerg Borchert

President and Chairman

Trusted Computing Group

Associated Talks:

04:55PM - Day 1

View Chair’s Closing Remarks

10:00AM - Day 1

View Chairperson’s Welcome

03:55PM - Day 1

View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards

View Full Info

Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards

  • To Follow Soon…
. Dr. Joerg Borchert, President and Chairman , Trusted Computing Group

04:15PM

(PDT)

Dr. Josef Schroefl

Deputy Director/ CoI on Strategy and Defense

Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

Associated Talks:

04:15PM - Day 1

View Panel: The Power of Cyber in Hybrid Threats and Securing the Global Supply Chain with Help of AI

View Full Info

Carmen Marsh

President & CEO

United Cybersecurity Alliance

Associated Talks:

04:15PM - Day 1

View Panel: The Power of Cyber in Hybrid Threats and Securing the Global Supply Chain with Help of AI

View Full Info

Panel: The Power of Cyber in Hybrid Threats and Securing the Global Supply Chain with Help of AI

The emergence of new and disruptive cyber technologies will change the reaches of cyber operations. How do we limit or mitigate the exploitation of the cyber domain by hostile actors in hybrid campaigns? We will also touch on the role of AI in securing the global supply chain as it relates to protecting our critical infrastructure.

. Dr. Josef Schroefl, Deputy Director/ CoI on Strategy and Defense , Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats
. Carmen Marsh, President & CEO, United Cybersecurity Alliance

04:55PM

(PDT)

Dr. Joerg Borchert

President and Chairman

Trusted Computing Group

Associated Talks:

04:55PM - Day 1

View Chair’s Closing Remarks

10:00AM - Day 1

View Chairperson’s Welcome

03:55PM - Day 1

View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards

View Full Info

Chair’s Closing Remarks

. Dr. Joerg Borchert, President and Chairman , Trusted Computing Group

05:00PM

(PDT)

End of Day