Day 1 - 17 May 2023
09:40AM
(PDT)
Shamako Donae Noble
Cyber Security Fellow | Cloud Computing Security
Springboard

09:40AM - Day 1
View Enterprise Security: Chairperson’s Welcome
Enterprise Security: Chairperson’s Welcome
Chairpersons welcome and opening remarks.
09:55AM
(PDT)
Pranusha Soma
Senior Security Engineer
Lark Health

02:50PM - Day 2
View Panel: Cloud Vulnerabilities and Cyber Resilience

09:55AM - Day 1
View Presentation: The Cyber Security Landscape in 2023 and Beyond
Presentation: The Cyber Security Landscape in 2023 and Beyond
- Implementing new procedures due to the challenges brought about by remote working, the increase of device usage, and more online activity through additional technologies.
- Describing challenges around the increase of cyber-attacks on a global scale.
- Introducing a culture of cyber security in organisations, with more businesses now introducing relevant policies.
10:25AM
(PDT)
Chris McHenry
Solutions Engineer Leader
Aviatrix

10:25AM - Day 1
View Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know
Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know
- Understanding different approaches to network and perimeter security in the public cloud and why a lift-and-shift approach will fail
- Building a common framework across multiple clouds and how to leverage it in order to control your cloud network perimeter, enforce policies, and gain insight into critical business telemetry
- Working across business stakeholders in the C-suite, security teams, network engineering, cloud teams, DevOps, finance, and more to achieve a secure cloud network while removing business barriers
10:45AM
(PDT)
Alex Arango
Head of Cyber Threat Management
Mercury Financial
Raj Sahu
Senior Manager Cloud DevSecOps Engineering
Aptiv

10:45AM - Day 1
View Fireside Chat: State Sponsored Cyber Attacks
Sachin Shah
Cyber Security Lead, Smart Manufacturing
Clarios

10:45AM - Day 1
View Fireside Chat: State Sponsored Cyber Attacks
Fireside Chat: State Sponsored Cyber Attacks
- Examples of motivations for posing threats to national critical infrastructure.
- An update of recent global hacking incidents against government authorities.
- How to embed security awareness in your company culture.
11:15AM
Networking Break
11:45AM
(PDT)
Shamako Donae Noble
Cyber Security Fellow | Cloud Computing Security
Springboard

09:40AM - Day 1
View Enterprise Security: Chairperson’s Welcome
Aras Memisyazici
Lead Cloud DevSecOps Architect
Aon Global Services Inc.

11:45AM - Day 1
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach
Rosalia Hajek
Enterprise Business Information Security Officer
MGM Resorts International

11:45AM - Day 1
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach
Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach
- Explaining the importance of a zero-trust approach, and how it strengthens a company.
- Outlining the steps involved when implementing a zero-trust architecture.
- Adopting culture and leadership skills to sustain a mature cyber security practice.
12:25PM
(PDT)
Benjamin Benhan
Global Privacy Attorney
eBay

12:25PM - Day 1
View Presentation: Inside the Mind of a CISO: What Keeps Them Up at Night?
Presentation: Inside the Mind of a CISO: What Keeps Them Up at Night?
- The balancing act of business disruption or data exposure.
- Staying abreast of new strategies, technologies and regulations to protect the organisation.
- Understanding how all areas of the company work, seeing the bigger picture.
12:55PM
(PDT)
Jo Lintzen
Managing Director
Cryptomathic Inc

12:55PM - Day 1
View Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing
Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing
– Explanation of the need for cryptographic agility and post-quantum computing.
– Overview of challenges and best practices for achieving cryptographic agility.
– Recommendations for organizations to prepare for post-quantum computing.
01:15PM
Networking Break & Lunch
02:20PM
(PDT)
Ken Westin
Security Evangelist
Panther

02:20PM - Day 1
View Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code
Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code
- SIEMs have evolved over the past few decades due to the evolving threat landscape, increasingly complex architectures, and ever-increasing data volume and velocity. In this session, we will cover the history of SIEMs and introduce a new strategy leveraging the concept of detection-as-code to optimize detections and threat hunting.
- Taking a detection-as-code approach will show how to use a language most already know — Python and SQL. Leveraging the detection-as-code approach, we will also show how to write detections, test them, and introduce software development lifecycle best practices that can be used for version control, collaboration, and integration with your CI/CD pipeline.
02:40PM
(PDT)
Thomas Tran
Privacy Program Manager
Meta

02:40PM - Day 1
View Presentation: How to Maintain a Culture of Privacy in the Workplace
Presentation: How to Maintain a Culture of Privacy in the Workplace
- Creating information security policies which are transparent and commonly understood across the organisation.
- Making employees feel rewarded, empowered, and supported, so they react positively to company guidelines.
- Introducing a top-down plus a bottom-up approach.
03:00PM
(PDT)
Justin Lim
VP of Customer Success
Clumio

03:00PM - Day 1
View Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)
Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)
Data is the most valuable asset of the modern organization, and as that data continues to grow exponentially, so too do increasingly sophisticated threats, internal risks from deletions, and software-based overwrites to compromise that asset. The holistic challenge of recovering data that’s been deleted or lost is an expensive and time-consuming endeavor that requires a reliable end-to-end backup and recovery strategy that folds into your disaster recovery (DR) plan.
Join a data protection specialist from Clumio as we unravel how to overcome these four data recoverability challenges:
- Finding the data you need to recover
- Recovering only the data you need, rather than the whole bucket, volume or instance
- Recovering to another environment if the primary is compromised
- Getting instant access to large volumes of data
03:20PM
(PDT)
Jim Mandelbaum
Field CTO
Gigamon

03:20PM - Day 1
View Presentation: Going Blind in The Cloud
Presentation: Going Blind in The Cloud
In the modern hybrid cloud, we are all flying blind. With the rapid expansion into a hybrid and multi cloud we are dealing with multiple data types, multiple tools, and simply not enough context to understand the risks.
Let’s have a short chat about the high-level aspects of the issue and some suggestions on how to get a handle on the problem.
03:30PM
(PDT)
William Glazier
Director of Threat Research
Cequence Security

03:30PM - Day 1
View Presentation: APIs: The Number One Attack Vector into The Enterprise
Presentation: APIs: The Number One Attack Vector into The Enterprise
- Protecting APIs requires a unified and fully integrated approach that works across the entire API protection lifecycle, protecting all APIs, across all API implementations, channels, and infrastructure environments
- Public, private and cloud infrastructures are dynamic with developers constantly creating new APIs resulting in an ever-changing API attack surface. Security and services to manage and secure these APIs have not kept up with the pace of infrastructure changes and increased use of APIs.
- In this session, we’ll look at:
- The challenges around API protection
- What CISOs can do to build a strong API protection program
- The Cequence approach to Unified API Protection
03:40PM
Networking Break
03:50PM
(PDT)
Kapil Anand
Engineering Manager & Tech Lead
Upasna Saluja
Principal Architect
AT&T

03:50PM - Day 1
View Panel: Are We Entering a Passwordless World?
Sachin Vaidya
EVP Chief Information Officer
Heritage Bank of Commerce

03:50PM - Day 1
View Panel: Are We Entering a Passwordless World?
Saul Tenzer
Sr. Manager Digital Security, Governance, Risk and Compliance
Solar Turbines

12:00PM - Day 2
View Panel: Latest Trends Within Social Engineering

03:50PM - Day 1
View Panel: Are We Entering a Passwordless World?
Lovlesh Chhabra
Managing Director, Product Management
Goldman Sachs

03:50PM - Day 1
View Panel: Are We Entering a Passwordless World?
Panel: Are We Entering a Passwordless World?
- Recent developments in MFA, biometrics, ZZO, SSO, and other alternatives to entering passwords; how these are evolving.
- The pros and cons of eliminating passwords altogether.
- Technological improvements to assist with authentication processes.
04:30PM
(PDT)
Michael Marriott
Director of Product Marketing
Oort

04:30PM - Day 1
View Presentation: Are you paying attention to your identities? Your attackers are.
Presentation: Are you paying attention to your identities? Your attackers are.
80% of breaches last year were the result of account takeover. Identities are incredibly hard to protect because the tools used to manage them are not built for security teams and attackers are taking advantage.
Join this session to discover:
– The most common identity-based attacks you will face this year
– How to get a handle on your entire identity population/attack surface
– Common approaches to identity threat detection
– Best practices for responding to identity threats
04:40PM
(PDT)
Sateesh Bolloju
Global Director, R&D - Product Security
Alcon

04:40PM - Day 1
View Presentation: Cyber Challenges in the Healthcare Sector
Presentation: Cyber Challenges in the Healthcare Sector
The advent of the COVID-19 pandemic and the ongoing economic crisis quickly accelerated the evolution of healthcare and its ecosystem. The adaption of digital technologies in healthcare continues to improve healthcare outcomes, such as minimizing costs and improving productivity and patient experience. However, digital technologies also increase cybersecurity risks and related challenges. All stakeholders must understand the cybersecurity challenges to healthcare and act on them.
The following are the significant challenges that the industry is facing when it comes to protecting patient safety, security, and privacy:
1) Increased cybersecurity risks
2) Changing regulatory needs
3) The rapid adoption of digital health, including medical devices, electronic records, & IT networks
4) Emerging health technologies
5) Sustaining legacy systems
6) Visibility to third-party risks.
5:10PM
(PDT)
Ernest Castellanos
Senior Cyber Security Manager
San Ysidro Health

5:10PM - Day 1
View End of Day

12:00PM - Day 2
View Panel: Latest Trends Within Social Engineering
End of Day
View day 2 content here: