Wednesday, November 29, 2017 | 7:45AM to 6:00PM | The Beverly Hilton | 9876 Wilshire Blvd, Beverly Hills, CA 90210
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
The cyber-threat landscape is changing. In addition to high-speed attacks, today’s most sophisticated threat-actors are playing a longer game – one that is silent and stealthy. Their objective is to disrupt operations, undermine trust, or simply learn trade secrets by going undetected inside networks.
Digital environments are changing too. Increasing digitization, the surge of IoT devices, and the cloud mean that network boundaries are more porous than ever. Securing the perimeter simply isn’t possible.
To defend against threats that are continually evolving, tomorrow’s cyber security must go beyond looking for yesterday’s attacker – it must find what it doesn’t know to look for. AI technologies have led to the emergence of self-learning, self-defending networks that achieve this – detecting and autonomously responding to in-progress attacks in real time. These cyber immune systems enable the security team to focus on high-value tasks, can counter even machine-speed threats, and work in all environments, including the cloud.
In this session, learn about:
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Presented by Dave Masson, Director of Enterprise Cyber Defense, DarktraceAll auditors want one thing: Compliance. And the list of requirements isn’t a short one–it can include operational/security policies, regulatory mandates, industry standards, software patches, software license agreements and more. Adding to the complexity is the push for greater compliance–especially for security and patching–at a lower run rate on a mounting population of Windows, Mac and *nix endpoints. This is particularly true given the recent and highly damaging WannaCry and Petya attacks, which preyed on unpatched or non-compliant endpoints. This panel will discuss the challenges of meeting security compliance issues and key imperatives of keeping enterprises and their endpoints continuously patched, secure and compliant in today’s volatile world. We’ll also share tips on how to identify threats that are most relevant to your organization, and how to remediate them faster.
Moderated by David Mahon, VP & CSO, CenturyLink
All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard. The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk. Presented byAs 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
Moderated by David Cass, CISO, IBM
With myriad cyber incidents happening daily and the growing financial, reputational, legal, and regulatory risks to companies and insurers, it is more important than ever to adopt an defensible information security (InfoSec) strategy. Starting with the assumption of breach theory, which posits that any attacker with enough time, commitment, and resources will get into a network, the measure of a good InfoSec strategy is to detect when an incident happens and to respond effectively.
In this session we will:
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.
Moderated by Brett Chadwick, Senior Security Engineer, DriveLock
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |