Day 1 - 5 October 2022

10:00AM

(PDT)

M.K Palmore

Official Member

Forbes Technology Council

Associated Talks:

03:20PM - Day 1

View Chair’s Closing Remarks

04:00PM - Day 1

View Chair’s Closing Remarks

10:00AM - Day 2

View Chairperson’s Welcome

10:00AM - Day 1

View Chairperson’s Welcome

View Full Info

Chairperson’s Welcome

. M.K Palmore, Official Member, Forbes Technology Council

10:15AM

(PDT)

Srinivasan R.

Senior Manager Cyber - Technical

Capital One

Associated Talks:

10:15AM - Day 1

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Kavitha Venkataswamy

Director - Digital Product Security

Capital One

Associated Talks:

10:15AM - Day 1

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

  • In this talk, we will present the third party software supply chain attacks and defenses on web and mobile applications, and how ThreatModeling can help identify supply chain threats.
  • We will then discuss third party assessments and how Risk Management plans can then be developed to mitigate vulnerabilities presented from the increased threat surface created by third party vendor tools and SDKs.
. Srinivasan R., Senior Manager Cyber - Technical , Capital One
. Kavitha Venkataswamy, Director - Digital Product Security, Capital One

10:45AM

(PDT)

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Associated Talks:

10:45AM - Day 1

View VIRTUAL PRESENTATION: ProcessUnity

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

10:45AM - Day 1

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

  • Why is it important to assess vendor risk management?
  • How to develop effective strategies for addressing higher risk vendors.
  • Implementing ongoing oversight utilizing metrics and external alerts.
. Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity

11:15AM

(PDT)

Michael Fulton

Adjunct Faculty

The Ohio State University

View Full Info

Brian Jones

Head of Application Security & Vulnerability Management

Meta

Associated Talks:

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Steve Van Lare

VP of Engineering

Anjuna

Associated Talks:

11:55AM - Day 1

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

11:55AM - Day 1

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Panel: Addressing Cloud Computing Vulnerabilities

  • Discussing how to prevent compliance violations.
  • Understanding future cloud-based threat vectors; insecure APIs, hijacking, data breaches, malicious insiders & more.
  • Recognising the pitfalls of misconfiguring cloud storage.
Moderator: . Michael Fulton, Adjunct Faculty, The Ohio State University
. Brian Jones, Head of Application Security & Vulnerability Management , Meta
. Steve Van Lare, VP of Engineering, Anjuna

11:55AM

(PDT)

Steve Van Lare

VP of Engineering

Anjuna

Associated Talks:

11:55AM - Day 1

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

11:55AM - Day 1

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

  • Discussing the recent changes in public cloud technology and how Confidential Computing can be used to lock-down data and create a trusted environment, even in an environment shared by other customers, open to third parties, and in a geography that is considered untrusted.
  • Discovering how Enterprises can embrace the cloud and protect confidential data like PII, PHI, and more without recoding or refactoring applications
  • Examining the benefits of Confidential Computing for protecting sensitive workloads and applications
. Steve Van Lare, VP of Engineering, Anjuna

12:15PM

(PDT)

Lunch & Networking

eviewing what we mean by a Smart City.Real Projects Discussed: Innovate Las Vegas.

01:15PM

(PDT)

Presentation: Security and Compliance of Fintech Big Data

With the advent of Fintech companies, financial services are accessible to lot more people in the world. In addition, Fintech is opening up doors to exchange financial data across organizations and making the process simpler and faster. This session will look at…

  • Why In the last 5 years, the fintech consumers have doubled and today 64% of consumers across worldwide are using Fintech products and services.
  • Analysing how fintech services are becoming pervasive: Reviewing the rising risks of privacy, fraud, and non-compliance.
  • How The cyberattack is highest the in-banking industry and reached $18.3 million per year annually. Thus, it is vital to look into the cyber security measures and compliance measures.
  • The rest of the session details those measures specific to Fintech industry.

01:45PM

(PDT)

Derek Kernus

Director of Cybersecurity Operations

DTS

Associated Talks:

01:45PM - Day 1

View VIRTUAL PRESENTATION: DTS

01:45PM - Day 1

View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

View Full Info

Edward Tuorinsky

Managing Principal

DTS

Associated Talks:

01:45PM - Day 1

View VIRTUAL PRESENTATION: DTS

01:45PM - Day 1

View Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

View Full Info

Presentation: What Every Organization Needs to Know About Using Zero-Trust Architecture to Strengthen their Security Profile

. Derek Kernus, Director of Cybersecurity Operations, DTS
. Edward Tuorinsky, Managing Principal, DTS

02:05PM

(PDT)

Mel Reyes

Chief Information Officer | Chief Information Security Officer

Getaround

View Full Info

Elizabeth Cartier

Director - Information Security

Headspace Inc.

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Thorsten Stremlau

Co-Chair

TCG's Marketing Work Group - Trusted Computing Group

Associated Talks:

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Associated Talks:

10:45AM - Day 1

View VIRTUAL PRESENTATION: ProcessUnity

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

10:45AM - Day 1

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Oscar Minks

CTO

FRSecure

Associated Talks:

02:45PM - Day 2

View VIRTUAL PRESENTATION: FRSecure

02:45PM - Day 2

View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

02:05PM - Day 1

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Panel: How to Stay Ahead of Insider Threats

  • Deterrence is key: ensuring you have appropriate policies, strong encryption, and good access controls.
  • Assessing best practice detection and monitoring techniques.
  • What to do if you’ve identified an insider attack.
Moderator: . Mel Reyes, Chief Information Officer | Chief Information Security Officer, Getaround
. Elizabeth Cartier, Director - Information Security, Headspace Inc.
. Thorsten Stremlau, Co-Chair, TCG's Marketing Work Group - Trusted Computing Group
. Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity
. Oscar Minks, CTO, FRSecure

02:45PM

(PDT)

Coffee & Networking in the Exhibition Area

Reviewing what we mean by a Smart City.

Real Projects Discussed: Innovate Las Vegas.

03:15PM

(PDT)

Senior Representative, Hoxhunt

Associated Talks:

03:15PM - Day 1

View Presentation: Hoxhunt

View Full Info

Presentation: Hoxhunt

Content to Follow Soon…

. Senior Representative, Hoxhunt, ,

03:35PM

(PDT)

Senior Representative, n8n.io

Associated Talks:

03:35PM - Day 1

View Presentation: Securing Critical Infrastructure

View Full Info

Presentation: Securing Critical Infrastructure

  • Understanding what is driving the increased threat to critical infrastructure and the consequences for those involved.
  • Assessing the cybercriminals armoury – what should I be aware of?
  • A best practice guide to protecting your OT systems.
. Senior Representative, n8n.io, ,

03:45PM

(PDT)

Presentation: The Evolution of Ransomware Attacks and How to Prevent Them

  • Understanding the drivers behind the current rise in ransomware attacks.
  • How has the growth of digital currencies enabled an increase in nefarious activity?
  • How to create a ransomware toolkit – educating employees, effectively managing access, backing up data, multi-factor authentication, and more…

04:15PM

(PDT)

Dr. Josef Schroefl

Deputy Director/ CoI on Strategy and Defense

Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

Associated Talks:

04:15PM - Day 1

View Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure

View Full Info

Carmen Marsh

President & CEO

United Cybersecurity Alliance

Associated Talks:

04:15PM - Day 1

View Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure

View Full Info

Panel: Countering Hybrid Threats in the Global Supply Chain & Legal Implications of Using AI as a Countermeasure

The global supply chain is a life line for the international trade economy.  As part of this supply chain, commercial vessels and ports are vulnerable to hybrid threats in the form of sabotage, navigational spoofing, and cyberattacks. What existing technology could give us the much needed competitive advantage, and help us advance quickly in securing our physical and digital infrastructure?

  • AI and machine learning is the most promising and powerful technology for benefiting humanity with its “dual use” capabilities. Are we ready to harness the most powerful and world altering technology for the good of all humankind?
  • Get your key takeaways from experts in hybrid threats, cybersecurity and cyber law that will keep you appraised of the most acute global threats and ways to countermeasure them.
. Dr. Josef Schroefl, Deputy Director/ CoI on Strategy and Defense , Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats
. Carmen Marsh, President & CEO, United Cybersecurity Alliance

04:55PM

(PDT)

Chair’s Closing Remarks

Reviewing what we mean by a Smart City.

Real Projects Discussed: Innovate Las Vegas.

04:20PM

(PDT)

Close of Day 1

Reviewing what we mean by a Smart City.

Real Projects Discussed: Innovate Las Vegas.