Day 2 - 30 September 2021

09:30AM

(MST)

Christy Riccardi

Director, Governance, Risk and Remediation | Information Security Office

Capital One

View Full Info

Senior Representative, ProcessUnity

Associated Talks:

09:30AM - Day 2

View Panel : Strong to the core – Security for digital transformation

10:10AM - Day 1

View SASE: Security at the edge

View Full Info

Kurt John

Chief Cybersecurity Officer

Siemens USA

Associated Talks:

11:40AM - Day 1

View Cyber in the physical world

09:30AM - Day 2

View Panel : Strong to the core – Security for digital transformation

View Full Info

Sujeet Bambawale

Chief Information Security Officer

7-Eleven

Associated Talks:

09:30AM - Day 2

View Panel : Strong to the core – Security for digital transformation

View Full Info

Panel : Strong to the core – Security for digital transformation

  • The world is evolving, shifting workloads and applications into the cloud and generating exponentially more data. As a result, security teams must both keep pace with organizational changes and stay ahead of adversaries. Unfortunately, legacy SIEMs hinder modern security processes by preventing direct, centralized access to context from across the ecosystem. 
  • Achieving control starts with unlocking the data available within your SIEM, security analytics, EPP, EDR, and XDR deployment.  
  • With infinite search across all data, enterprises can power threat prevention, detection, and response. 
Moderator: . Christy Riccardi, Director, Governance, Risk and Remediation | Information Security Office, Capital One
. Senior Representative, ProcessUnity, ,
. Kurt John, Chief Cybersecurity Officer, Siemens USA
. Sujeet Bambawale, Chief Information Security Officer, 7-Eleven

10:10AM

(MST)

The ‘new normal’? Keeping secure in post-covid times

  • Understanding the unique needs of your new hybrid workforce – how has the pandemic expanded attack vectors and created new vulnerabilities? 
  • How to gain the visibility and control you need to apply security controls 
  • Why you should be implementing holistic security that goes beyond just web-apps 

10:40AM

(MST)

Future-proofing your security team

  • How to do secure, fast innovation in a corporate environment
  • Prioritising for the future – Automation, IoT & Cloud, where should you focus your time and resource? 
  • Becoming the agent for change within your organisation

11:00AM

(MST)

Adeel Khurshid

Director of Security Operations

GitHub

Associated Talks:

11:00AM - Day 2

View Panel: Access management & authentication – Ensuring digital trust

10:00AM - Day 2

View Presentation: Why you should automate your SecOps

View Full Info

Manish Gupta

Director, Global Cybersecurity Services

Starbucks

Associated Talks:

11:00AM - Day 2

View Panel: Access management & authentication – Ensuring digital trust

02:00PM - Day 1

View Panel: Would I lie to you? Navigating the Trust Landscape

View Full Info

Panel: Access management & authentication – Ensuring digital trust

  • Addressing both ‘identity’ and ‘access’ – how have these definitions changed? 
  • How has moving online impacted the way we do business – using examples in healthcare, retail, finance and education? 
  • How to build identity-aware infrastructure without damaging user experience.
. Adeel Khurshid, Director of Security Operations, GitHub
. Manish Gupta, Director, Global Cybersecurity Services, Starbucks

11:40AM

(MST)

Resilience in the new normal

  • How can organisations look at reducing the negative impact of the pandemic?   
  • Where to go for 2022 – how to create positive change  
  • Addressing new and systematic risk.  
  • Using technical skills to address non-security problems through collaboration and skill-sharing  

12:00PM

(MST)

Senior Representative, Skyflow

Associated Talks:

12:00PM - Day 2

View The limit does not exist – security for the enterprise of things

View Full Info

The limit does not exist – security for the enterprise of things

  • Decoupling security & IoT concerns  
  • Understanding the path of data and where vulnerabilities lie 
  • How can Zero-Trust be applied to device management? 
. Senior Representative, Skyflow, ,

12:20PM

(MST)

Christie Chaffee

Cloud Product Management Lead

JP Morgan Chase & Co.

Associated Talks:

12:20PM - Day 2

View Ready, set, build: product management essentials for a secure cloud

View Full Info

Ready, set, build: product management essentials for a secure cloud

  • How can you ensure your cloud products are both secure and user-friendly? 
  • Best practices for 3rd party management, backlog refinement and internal stakeholder management 
  • Creating security as a deep-rooted foundation 
. Christie Chaffee, Cloud Product Management Lead, JP Morgan Chase & Co.

12:40PM

(MST)

Smart Cyber: How can AI manage risk?

  • How can you leverage AI to improve your security capabilities?  
  • Moving from detection to investigation  
  • Evolving from traditional legacy approaches to security 

01:00PM

(MST)

Christy Riccardi

Director, Governance, Risk and Remediation | Information Security Office

Capital One

View Full Info

Johnnie Rogers

Director, Global Application Security Consulting

Nike

Associated Talks:

01:00PM - Day 2

View Panel: Something you forgot? Building secure applications

View Full Info

Nia Samir

Director Application Security and Forensics

Universal Music Group

Associated Talks:

01:00PM - Day 2

View Panel: Something you forgot? Building secure applications

View Full Info

Panel: Something you forgot? Building secure applications

  • What can organisations look at in their infrastructure to enable proactive defence?  
  • Mapping your attack surface – web, mobile and legacy 
  • The top application security vulnerabilities and how to combat them 
Moderator: . Christy Riccardi, Director, Governance, Risk and Remediation | Information Security Office, Capital One
. Johnnie Rogers, Director, Global Application Security Consulting, Nike
. Nia Samir, Director Application Security and Forensics, Universal Music Group

01:40PM

(MST)

Making the web safe

  • Discussing web-app vulnerabilities around authentication, validation and user input 
  • How to build websites to function as expected, even when under attack 
  • The importance of testing to reduce your risk exposure 

02:00PM

(MST)

Observable architecture – security for the SDLC

  • Is your security architecture actually working? 
  • Building a holistic AppSec program – code scanning, M&A risk assessments and quality control 
  • Adding capacity for innovation through comprehensive software security 

02:20PM

(MST)

Sharing the load: Tips for cloud workload protection

  • Understanding what your workload is – processes, applications and resources
  • Keeping cloud-based workloads secure whilst ensuring visibility and compliance
  • Simplifying protection in the hybrid era

02:40PM

End of Conference