Day 2 - 18 May 2023
10:00AM
(PDT)
Shea Lovan
Chief Technology Officer
UC Santa Barbara

10:00AM - Day 2
View Accelerating Digital Transformation: Chairperson’s Welcome
Accelerating Digital Transformation: Chairperson’s Welcome
10:15AM
(PDT)
Ravi Gunturi
Sr. Manager, Information Security Officer / Consultant - Digital Product Security
Capital One

10:15AM - Day 2
View Presentation: Making your Cyber Security Program Effective in 2023
Kavitha Venkataswamy
Director - Digital Product Security
Capital One

10:15AM - Day 2
View Presentation: Making your Cyber Security Program Effective in 2023

10:15AM - Day 1
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Presentation: Making your Cyber Security Program Effective in 2023
- Building an effective cybersecurity program requires a commitment to people, processes, and technology. This includes maintaining asset inventory, vulnerability management, developing cyber security strategy, security awareness, security automation, risk management and more.
- The Why: This session covers the importance in building a cyber security program and will share the tips for building it from ground up that everyone in the organization can understand and rely on to effectively manage risk.
- Key Takeaways:
– Building cyber security program
– Roadmap to mature cyber security program
– Optimizing your cyber security program
– Participation of a diverse set of people across an organization
10:45AM
(PDT)
Tejas Chopra
Senior Software Engineer
Netflix

10:45AM - Day 2
View Presentation: Upskilling for a multi-cloud world
Presentation: Upskilling for a multi-cloud world
11:05AM
(PDT)
Kaushik Krishna Sahay
IT Technical Program Manager
Pacific Gas and Electric Company

11:05AM - Day 2
View Presentation: The Acceleration of AI and ML in Cyber Security
Presentation: The Acceleration of AI and ML in Cyber Security
- By the end of 2025, it is expected to have 27 billion connected devices across the globe. Looking at the global level, we need to have a strong secured ecosystem for all the connected devices. We should have both approaches enabled- “Top to Bottom” and “Bottom to Top” so that our connected devices are 100% secured from any types of threats (external/internal).
- Every day the way we are building a new digital era, it is nowhere near possible to secure it traditionally. It needs to have modern solutions. For the modern solutions, it is no wonder to choose the path of AI and ML for our cyber security domain because if it is designed in certain ways, the framework will keep learning new patterns of malicious activities and does self-implementations in real-time to prevent any threats as proactive action.
11:35AM
Networking Break
12:00PM
(PDT)
Rosalia Hajek
Enterprise Business Information Security Officer
MGM Resorts International

11:45AM - Day 1
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach
Ernest Castellanos
Senior Cyber Security Manager
San Ysidro Health

5:10PM - Day 1
View End of Day

12:00PM - Day 2
View Panel: Latest Trends Within Social Engineering
Saul Tenzer
Sr. Manager Digital Security, Governance, Risk and Compliance
Solar Turbines

12:00PM - Day 2
View Panel: Latest Trends Within Social Engineering

03:50PM - Day 1
View Panel: Are We Entering a Passwordless World?
Richard Paz
Cyber Security Engineer
NASA Jet Propulsion Laboratory

12:00PM - Day 2
View Panel: Latest Trends Within Social Engineering
Panel: Latest Trends Within Social Engineering
- Exploring the damaging consequences which social engineering brings to an organisation.
- Analysing common misconceptions people may have when it comes to engaging with threat actors.
- Highlighting key trends and behaviours demonstrated by attackers, to increase awareness.
12:40PM
(PDT)
Brian Boarts
Enterprise Account Executive
Keepit

12:40PM - Day 2
View Presentation: You are not secure if you cannot recover
Presentation: You are not secure if you cannot recover
– IT Security has been #1 spend last 4 years – but are you more secure?
– Cyber events are real and happen in multiple ways
– Your cloud data is your responsibility
– Where Keepit plays a key part in your cyber recovery readiness
01:00PM
(PDT)
Karan Dwivedi
Security Engineering Manager

01:00PM - Day 2
View Presentation: Bootstrapping and Scaling a Detection and Response Program
Presentation: Bootstrapping and Scaling a Detection and Response Program
- Are you eager to detect and respond to threats as they show up on your infrastructure? Are you constrained by resources to get a detection program up and running? If so, then this talk is for you!
- We walk through how you can go about building a detection and response program using open-source tools at minimal cost.
- We discuss the major components of a detection and response program and steps (including people, process and technology) to bring your program to existence.
- Finally, we discuss metrics and a maturity model for your program to scale it further.
01:30PM
Networking Break & Lunch
02:20PM
(PDT)
Jobert Nombrado
Principal Cyber Systems Engineer
Northrop Grumman

02:20PM - Day 2
View Presentation: Dodging and Detecting Deepfake Attacks
Presentation: Dodging and Detecting Deepfake Attacks
- Providing examples of deepfake technologies being used, and the harm caused.
- How to spot a deepfake, the signs to watch out for.
- Useful methods and frameworks which can be applied to combat deepfake attacks.
(PDT)
Day 2 | Paid | Accelerating Digital Transformation
02:50PM
(PDT)
Aras Memisyazici
Lead Cloud DevSecOps Architect
Aon Global Services Inc.

11:45AM - Day 1
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach
Stephen Chen
Sr Vice President, Technology & Security
NuCompass Mobility Services Inc.

02:50PM - Day 2
View Panel: Cloud Vulnerabilities and Cyber Resilience
Pranusha Soma
Senior Security Engineer
Lark Health

02:50PM - Day 2
View Panel: Cloud Vulnerabilities and Cyber Resilience

09:55AM - Day 1
View Presentation: The Cyber Security Landscape in 2023 and Beyond
Kishore Viswanathan
Senior Technical Program Manager - Cybersecurity and Compliance
Lucid Motors

02:50PM - Day 2
View Panel: Cloud Vulnerabilities and Cyber Resilience
Panel: Cloud Vulnerabilities and Cyber Resilience
- Understanding various cloud computing services and how they are used.
- Discussing best practices within cloud security, in order to be proactive rather than reactive.
- Choosing the right cloud provider which protects against misconfigurations, cyber-attacks, authentication, and access management.