Wednesday, November 8, 2017 | 7:30AM to 6:00PM | The Westin Copley Place, Boston | 10 Huntington Ave Boston, MA, 02116
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Your organization is valuable, and the cyber criminals know it. Malicious actors constantly attempt to exploit users for privileged access to your enterprise network. Recognizing the anomalous network behavior that occurs when threats breach traditional security architecture is very difficult. Flow and metadata collection from your existing network coupled with Network Traffic Analytics delivers powerful and actionable insight into network and security incidents.
In this session, learn how you can:You have lots of security-related data, and it’s not all created equal. Effective threat hunting and incident response require you to pivot quickly and efficiently between the low- and high-fidelity data that exists across firewalls, intrusion prevention systems, security information event management platforms, flow collectors, etc. Understanding the common data elements across these disparate systems allows your team to efficiently pivot from low fidelity data used for rapid root-cause analysis to high-fidelity data that can be a means of conviction.
In this session, we will:All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard. The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
All auditors want one thing: Compliance. And the list of requirements isn’t a short one–it can include operational/security policies, regulatory mandates, industry standards, software patches, software license agreements and more. Adding to the complexity is the push for greater compliance–especially for security and patching–at a lower run rate on a mounting population of Windows, Mac and *nix endpoints. This is particularly true given the recent and highly damaging WannaCry and Petya attacks, which preyed on unpatched or non-compliant endpoints. This panel will discuss the challenges of meeting security compliance issues and key imperatives of keeping enterprises and their endpoints continuously patched, secure and compliant in today’s volatile world. We’ll also share tips on how to identify threats that are most relevant to your organization, and how to remediate them faster.
With the ever-increasing rate of cyber incidents, today’s cyber security leaders are facing an equally substantial shift: Prevention is not enough, nor is it realistic – at some point, a cyber incident will occur. The organizations that have accepted this reality are morphing into a state of resiliency. Cyber Resilience is the ability to operate and recover from a cyber incident with the most minimal impact to the business. Resilience is not inherent to organizations and is attained through strategic planning, ongoing communication, collaboration and nimble tactics in order to operate fluidly in today’s cyber risk landscape.
In this session we will:Highly targeted, low volume spear phishing – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of these imposter attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload, but things are changing. New email authentication technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
Join Proofpoint as we dive into tactics to help you:
In this session, we’re going to discuss how Brinqa customers are creating a new breed of cyber risk intelligence programs by making vulnerability management a central focus of their efforts.
These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration and correlation of data from multiple sources, prioritization of vulnerability and asset risks, creation and management of tickets based on optimal remediation strategies, or representation and distribution of real-time metrics and KPIs. By extending these core capabilities to additional sources of security data – asset inventory, network management, web application scanning, BC/DR, policy compliance, IDS/IPS, change and configuration management, directory services, SIEM, etc. – these programs are providing security analysts, business owners and executives with actionable insights that were previously unattainable.
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |