Day 1 - 17 May 2023

09:40AM

(PDT)

Shamako Donae Noble

Cyber Security Fellow | Cloud Computing Security

Springboard

Associated Talks:

09:40AM - Day 1

View Enterprise Security: Chairperson’s Welcome

View Full Info

Enterprise Security: Chairperson’s Welcome

Chairpersons welcome and opening remarks.

. Shamako Donae Noble, Cyber Security Fellow | Cloud Computing Security, Springboard

09:55AM

(PDT)

Pranusha Soma

Senior Security Engineer

Lark Health

Associated Talks:

12:50PM - Day 2

View Presentation: Privacy-Driven Security: Turning Compliance into an Advantage

View Full Info

Presentation: The Cyber Security Landscape in 2023 and Beyond

  • Implementing new procedures due to the challenges brought about by remote working, the increase of device usage, and more online activity through additional technologies. 
  • Describing challenges around the increase of cyber-attacks on a global scale. 
  • Introducing a culture of cyber security in organisations, with more businesses now introducing relevant policies. 
. Pranusha Soma, Senior Security Engineer, Lark Health

10:25AM

(PDT)

Chris McHenry

Solutions Engineer Leader

Aviatrix

Associated Talks:

10:25AM - Day 1

View Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know 

View Full Info

Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know 

  • Understanding different approaches to network and perimeter security in the public cloud and why a lift-and-shift approach will fail
  • Building a common framework across multiple clouds and how to leverage it in order to control your cloud network perimeter, enforce policies, and gain insight into critical business telemetry
  • Working across business stakeholders in the C-suite, security teams, network engineering, cloud teams, DevOps, finance, and more to achieve a secure cloud network while removing business barriers
. Chris McHenry, Solutions Engineer Leader, Aviatrix

10:45AM

(PDT)

Alex Arango

Head of Cyber Threat Management

Nomi Health

View Full Info

Raj Sahu

Senior Manager Cloud DevSecOps Engineering

Aptiv

Associated Talks:

10:45AM - Day 1

View Fireside Chat: State Sponsored Cyber Attacks

View Full Info

Sachin Shah

Cyber Security Lead, Smart Manufacturing

Clarios

Associated Talks:

10:45AM - Day 1

View Fireside Chat: State Sponsored Cyber Attacks

View Full Info

Fireside Chat: State Sponsored Cyber Attacks

  • Examples of motivations for posing threats to national critical infrastructure. 
  • An update of recent global hacking incidents against government authorities. 
  • How to embed security awareness in your company culture. 
Moderator: . Alex Arango, Head of Cyber Threat Management, Nomi Health
. Raj Sahu, Senior Manager Cloud DevSecOps Engineering, Aptiv
. Sachin Shah, Cyber Security Lead, Smart Manufacturing, Clarios

11:15AM

Networking Break

11:45AM

(PDT)

Shamako Donae Noble

Cyber Security Fellow | Cloud Computing Security

Springboard

Associated Talks:

09:40AM - Day 1

View Enterprise Security: Chairperson’s Welcome

View Full Info

Aras Memisyazici

Lead Cloud DevSecOps Architect

Aon Global Services Inc.

Associated Talks:

11:45AM - Day 1

View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

View Full Info

Rosalia Hajek

Enterprise Business Information Security Officer

MGM Resorts International

Associated Talks:

11:45AM - Day 1

View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

View Full Info

Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

  • Explaining the importance of a zero-trust approach, and how it strengthens a company. 
  • Outlining the steps involved when implementing a zero-trust architecture. 
  • Adopting culture and leadership skills to sustain a mature cyber security practice. 
Moderator: . Shamako Donae Noble, Cyber Security Fellow | Cloud Computing Security, Springboard
. Aras Memisyazici, Lead Cloud DevSecOps Architect, Aon Global Services Inc.
. Rosalia Hajek, Enterprise Business Information Security Officer, MGM Resorts International

12:25PM

(PDT)

Benjamin Benhan

Global Privacy Attorney

eBay

Associated Talks:

10:15AM - Day 2

View Keynote Panel: Navigating Compliance and Risk Management Challenges in Cybersecurity

03:05PM - Day 1

View A conversation with … Navigating the Intersection: Cybersecurity and AI Law

View Full Info

Presentation: Inside the Mind of a CISO: What Keeps Them Up at Night?

  • The balancing act of business disruption or data exposure. 
  • Staying abreast of new strategies, technologies and regulations to protect the organisation. 
  • Understanding how all areas of the company work, seeing the bigger picture. 
. Benjamin Benhan, Global Privacy Attorney, eBay

12:55PM

(PDT)

Jo Lintzen

Managing Director

Cryptomathic Inc

Associated Talks:

12:55PM - Day 1

View Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing

View Full Info

Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing

– Explanation of the need for cryptographic agility and post-quantum computing.  

– Overview of challenges and best practices for achieving cryptographic agility.  

– Recommendations for organizations to prepare for post-quantum computing. 

. Jo Lintzen, Managing Director, Cryptomathic Inc

01:15PM

Networking Break & Lunch

02:20PM

(PDT)

Ken Westin

Security Evangelist

Panther

Associated Talks:

02:20PM - Day 1

View Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code

View Full Info

Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code

  • SIEMs have evolved over the past few decades due to the evolving threat landscape, increasingly complex architectures, and ever-increasing data volume and velocity. In this session, we will cover the history of SIEMs and introduce a new strategy leveraging the concept of detection-as-code to optimize detections and threat hunting.  
  • Taking a detection-as-code approach will show how to use a language most already know — Python and SQL. Leveraging the detection-as-code approach, we will also show how to write detections, test them, and introduce software development lifecycle best practices that can be used for version control, collaboration, and integration with your CI/CD pipeline. 
. Ken Westin, Security Evangelist, Panther

02:40PM

(PDT)

Thomas Tran

Privacy Program Manager

Meta

Associated Talks:

02:40PM - Day 1

View Presentation: How to Maintain a Culture of Privacy in the Workplace

View Full Info

Presentation: How to Maintain a Culture of Privacy in the Workplace

  • Creating information security policies which are transparent and commonly understood across the organisation. 
  • Making employees feel rewarded, empowered, and supported, so they react positively to company guidelines. 
  • Introducing a top-down plus a bottom-up approach. 
. Thomas Tran, Privacy Program Manager, Meta

03:00PM

(PDT)

Justin Lim

VP of Customer Success

Clumio

Associated Talks:

03:00PM - Day 1

View Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)

View Full Info

Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)

Data is the most valuable asset of the modern organization, and as that data continues to grow exponentially, so too do increasingly sophisticated threats, internal risks from deletions, and software-based overwrites to compromise that asset.  The holistic challenge of recovering data that’s been deleted or lost is an expensive and time-consuming endeavor that requires a reliable end-to-end backup and recovery strategy that folds into your disaster recovery (DR) plan. 

Join a data protection specialist from Clumio as we unravel how to overcome these four data recoverability challenges: 

  • Finding the data you need to recover 
  • Recovering only the data you need, rather than the whole bucket, volume or instance 
  • Recovering to another environment if the primary is compromised 
  • Getting instant access to large volumes of data 
. Justin Lim, VP of Customer Success, Clumio

03:20PM

(PDT)

Jim Mandelbaum

Field CTO

Gigamon

Associated Talks:

03:20PM - Day 1

View Presentation: Going Blind in The Cloud

View Full Info

Presentation: Going Blind in The Cloud

In the modern hybrid cloud, we are all flying blind. With the rapid expansion into a hybrid and multi cloud we are dealing with multiple data types, multiple tools, and simply not enough context to understand the risks.     

Let’s have a short chat about the high-level aspects of the issue and some suggestions on how to get a handle on the problem. 

. Jim Mandelbaum, Field CTO, Gigamon

03:30PM

(PDT)

William Glazier

Director of Threat Research

Cequence Security

Associated Talks:

03:30PM - Day 1

View Presentation: APIs: The Number One Attack Vector into The Enterprise

View Full Info

Presentation: APIs: The Number One Attack Vector into The Enterprise

  • Protecting APIs requires a unified and fully integrated approach that works across the entire API protection lifecycle, protecting all APIs, across all API implementations, channels, and infrastructure environments 
  • Public, private and cloud infrastructures are dynamic with developers constantly creating new APIs resulting in an ever-changing API attack surface. Security and services to manage and secure these APIs have not kept up with the pace of infrastructure changes and increased use of APIs. 
  • In this session, we’ll look at: 
  • The challenges around API protection 
  • What CISOs can do to build a strong API protection program 
  • The Cequence approach to Unified API Protection 
. William Glazier, Director of Threat Research, Cequence Security

03:40PM

Networking Break

03:50PM

(PDT)

Kapil Anand

Engineering Manager & Tech Lead

Google

View Full Info

Upasna Saluja

Principal Architect

AT&T

Associated Talks:

03:50PM - Day 1

View Panel: Are We Entering a Passwordless World?

View Full Info

Sachin Vaidya

EVP Chief Information Officer

Heritage Bank of Commerce

Associated Talks:

03:50PM - Day 1

View Panel: Are We Entering a Passwordless World?

View Full Info

Saul Tenzer

Sr. Manager Digital Security, Governance, Risk and Compliance

Solar Turbines

Associated Talks:

12:00PM - Day 2

View Panel: Latest Trends Within Social Engineering

03:50PM - Day 1

View Panel: Are We Entering a Passwordless World?

View Full Info

Lovlesh Chhabra

Managing Director, Product Management

Goldman Sachs

Associated Talks:

03:50PM - Day 1

View Panel: Are We Entering a Passwordless World?

View Full Info

Panel: Are We Entering a Passwordless World?

  • Recent developments in MFA, biometrics, ZZO, SSO, and other alternatives to entering passwords; how these are evolving. 
  • The pros and cons of eliminating passwords altogether. 
  • Technological improvements to assist with authentication processes. 
Moderator: . Kapil Anand, Engineering Manager & Tech Lead, Google
. Upasna Saluja, Principal Architect, AT&T
. Sachin Vaidya, EVP Chief Information Officer, Heritage Bank of Commerce
. Saul Tenzer, Sr. Manager Digital Security, Governance, Risk and Compliance, Solar Turbines
. Lovlesh Chhabra, Managing Director, Product Management, Goldman Sachs

04:30PM

(PDT)

Michael Marriott

Director of Product Marketing

Oort

Associated Talks:

04:30PM - Day 1

View Presentation: Are you paying attention to your identities? Your attackers are.

View Full Info

Presentation: Are you paying attention to your identities? Your attackers are.

80% of breaches last year were the result of account takeover. Identities are incredibly hard to protect because the tools used to manage them are not built for security teams and attackers are taking advantage. 

Join this session to discover: 

– The most common identity-based attacks you will face this year 

– How to get a handle on your entire identity population/attack surface 

– Common approaches to identity threat detection 

– Best practices for responding to identity threats 

. Michael Marriott, Director of Product Marketing, Oort

04:40PM

(PDT)

Sateesh Bolloju

Global Director, R&D - Product Security

Alcon

Associated Talks:

04:40PM - Day 1

View Presentation: Cyber Challenges in the Healthcare Sector

View Full Info

Presentation: Cyber Challenges in the Healthcare Sector

The advent of the COVID-19 pandemic and the ongoing economic crisis quickly accelerated the evolution of healthcare and its ecosystem. The adaption of digital technologies in healthcare continues to improve healthcare outcomes, such as minimizing costs and improving productivity and patient experience. However, digital technologies also increase cybersecurity risks and related challenges. All stakeholders must understand the cybersecurity challenges to healthcare and act on them.  

The following are the significant challenges that the industry is facing when it comes to protecting patient safety, security, and privacy:

1) Increased cybersecurity risks 

2) Changing regulatory needs  

3) The rapid adoption of digital health, including medical devices, electronic records, & IT networks  

4) Emerging health technologies  

5) Sustaining legacy systems  

6) Visibility to third-party risks. 

 

. Sateesh Bolloju, Global Director, R&D - Product Security, Alcon

5:10PM

(PDT)

Ernest Castellanos 

Senior Cyber Security Manager

San Ysidro Health

Associated Talks:

5:10PM - Day 1

View End of Day

12:00PM - Day 2

View Panel: Latest Trends Within Social Engineering

View Full Info

End of Day

View day 2 content here:

. Ernest Castellanos , Senior Cyber Security Manager, San Ysidro Health