Upcoming Summits
Registration Opens: Coffee & Networking Opening Remarks: Julian Waits, President & CEO, ThreatTrack Security Morning Keynote Presentation: Jim Penrose, EVP of Cyber Intelligence, Darktrace “The Enterprise Immune System: Using Probability to Detect New Threats in Real Time” As we transition from an old model of IT security based on defending the perimeter and trying to define the threat, some of the world’s leading companies are adopting next-generation, probabilistic technology to address both insider and external threats. Enterprise Immune System technology is a movement based on fundamentally new Bayesian math and machine learning developed at the University of Cambridge. By probabilistically modeling patterns of life in user, machine and network activity within an organization, this self-learning technology is uniquely capable of detecting genuine threats, without floods of false positives and without knowing in advance what to look for. It is providing organizations around the world with the real-time intelligence that they need to anticipate and curb serious threats, while maintaining the agility and interconnectedness on which they rely. Roundtable Session: JD Sherry Vice President, Technology and Solutions, Trend Micro “Operationalizing Threat Intelligence-Custom Defense Strategies Unique to Your Business” According to a recent Forrester survey, 75% of security decision-makers said that “establishing or improving threat intelligence capabilities is a top priority for their organization”. This is especially true in financial services and healthcare where the payouts are massive for cyber criminals and state actors. Whether you are currently implementing or simply considering a threat intelligence initiative, you must first understand exactly what effective operationalized threat intelligence would look like for your organization. In this informal roundtable discussion, JD Sherry, VP of Technology and Solutions for Trend Micro will moderate discussion regarding the steps organizations should take to determine the right DNA and attributes for enabling an effective threat intelligence model and custom defense strategy for their organization. Roundtable Session: Gautam Dev, Venture Lead & Val Mukherjee, Chief Architect, Cognizant “Convergence of Security Technologies under one Service Umbrella: How to get to Risk Prevention Sooner” For many decades, security technologies have operated in silos and each technology silo has potentially hundreds of product options. However with technology as the answer to security, organizations are playing a catch up game to address the latest threats and vulnerabilities. Many analysts have been speculating about a converged security service for a number of years, however other that infrastructure level information and event management (SIEM), there has not been much of an answer. In the world of ‘Digital Business’ as more and more organizations embrace Social, Mobile, Analytics (Big Data) and Cloud, there is sharp escalation of technology risk needing a steep ramp up in end to end security. In this roundtable, Cognizant Enterprise Risk and Security Solutions experts talk about the SMaaS: Security Management as a Service as the next generation of security services that is currently leveling the playing field in security and providing both big and small organizations the ability to proactively prevent and mitigate technology risk. The Weakest Link – Securing The Human: Many organization focus on implementing new and innovative technologies when it comes to cyber security and protecting the enterprise. However, these very same organizations are failing to address their greatest risk, the human. This panel will explore how organizations are effectively addressing this issue to include what human risks they are addressing, how they are effectively mitigating them and how they are measuring their impact. Roundtable Session: Daniel Berger, President & CEO, Redspin “The Security Risks of Moving Healthcare to the Cloud” Cloud computing has become one of the forefront strategic initiatives for the vast majority of healthcare organizations. As the process of research and the weighing the pros and cons of a move to the cloud begins, there is a realization that existing security risks could be migrated and replicated in a cloud environment if not properly identified and addressed. Redspin’s Cloud Readiness Security Analysis (CRSA) for healthcare is the first security assessment that helps organizations identify the security risks – and benefits – of moving the EHR and any critical applications to the cloud. The CRSA takes a multi-phase approach that is conducted alongside the organization’s evaluation, planning and migration processes for the cloud. Roundtable Session: Dr. Richard White, Managing Director, Oxford Solutions & Aidan Kehoe, Co Founder & Chief Executive Officer, Oxford Solutions “Changing your Cyber Perspective – Proactive versus Reactive” Cybersecurity disasters in 2013 illuminated the vulnerabilities of many large retailers, financial institutions, and critical infrastructures. The U.S. Government and many affiliated regulatory agencies are poised to impose serious measures in an effort to curb the increasing trend of the number of private, public, and financial industry data breaches that are occurring across all commercial business verticals. Topics at this cyber roundtable will focus on the latest cyber threats and their very specific agendas. Additionally, participants will be asked to discuss the implementation of pragmatic and easily executed steps that lead to an increase in the overall effectiveness of an organization’s cybersecurity program, as well as the resulting reduction in risk. Specific topics will include: Enterprise Mobile Security & BYOD: The use of mobile devices to conveniently access corporate data and systems has become essential for companies in today’s constantly evolving business environment. As the number of employee-owned smartphones and tablets being used in the workplace grows, often circumventing corporate security policies and safeguards, the need for greater security implementations has become crucial. This panel will explore the importance of effectively protecting local and remote devices and why mobile security plays a large role in securing critical enterprise infrastructure. Lunch Break Afternoon Keynote Presentation: George Kurtz, President, CEO & Co-Founder, CrowdStrike Social Computing: Enterprise Initiatives & Security Challenges: The exponential growth of social media platforms available for business purposes has changed the cyber landscape for enterprises. As the corporate use of social media continues to flourish, security implications and risks surrounding these emerging technologies increases correspondingly. This panel will explore the corporate value of social media – Our experts, cyber & threat professionals tasked to protect these networks, will provide real insight into how social media is changing the cyber landscape and how the risks you face can be mitigated or avoided. FBI Cyber Operations Presentation: Leo Taddeo, Special Agent in Charge, Cyber/Special Operations, FBI – New York Roundtable Session: Leo Taddeo, Special Agent in Charge, Cyber/Special Operations, FBI – New York “Cyber Threats and the Role of Law Enforcement in Incident Response” Mr. Taddeo will discuss the cyber threat landscape, ranging from sophisticated organized cyber criminals to nation-state actors. He will also discuss the US cybersecurity framework, including the respective roles played by DHS, DoD, and DoJ/FBI. Lastly, Mr. Taddeo will discuss the FBI’s incident response protocols, how to prepare to work with law enforcement, legal and technical considerations, and lessons learned from previous incidents. Roundtable Session: Ryan Stolte, CTO & Founder, Bay Dynamics, Inc. “The Age of Context-Aware Security” Organizations continue to invest in new and leading edge security solutions however they struggle in the management and operationalization of these same infrastructures within their own environment and often have little to show for in terms of direct improvement or actionable results. In this round table participants will share and discuss:
– The growing interconnectedness of all forms of security and risk management
– The alignment of risk management strategies with business goals
– The need for migrating from “incident response” to context-based adaptive security Cyber Supply Chain Security: Today’s global economy offers substantial benefits for organizations looking to gain a competitive edge with opportunities for innovation and quality goods at low costs. Reliance on the global supply chain has introduced crucial security challenges and emerging threats making protection of today’s international marketplace increasingly difficult. This panel will discuss the need for effective supply chain defenses and protective measures to mitigate the risk of compromised cyber products and increase cyber resilience. Roundtable Session: David Damato,Managing Director, Mandiant, a FireEye Company & Ned Moran, Cyber Intelligence Researcher, FireEye “Cyber Attacks: Finding the Signals in the Noise” Many seemingly unrelated cyber attacks may be part of a much more broad offensive fueled by a shared development and logistics infrastructure—a finding that suggests some targeted organizations are facing a more organized menace than they realize.
Although advanced persistent threats (APTs) may appear unrelated at first, detailed investigation and research may reveal key links between seemingly different attacks. Possible links between attacks may include shared malware tools, shared code, shared digital certificates, and shared common and control infrastructure. In certain cases, when these commonalities are found the evidence may point to centralized APT planning and development. How prevalent this model has become is unclear, but adopting it makes financial sense for attackers, so the findings may imply a bigger trend. You need to be prepared. Join us for this insightful discussion – you’ll be glad you did. Roundtable Session: Adam Levin, Chairman and Founder of IDT911 & Credit.com “With Breaches Being the Third Certainty in Life, Is it Time for a Breach Box?” The breach at Home Depot is only the most recent in a torrent of high profile data compromises. Data and identity-related crimes are at record levels. Consumers are in uncharted territory, which begs a question: Is it time for a national plan to help people get their bearings? The Schumer Box made it mandatory for credit card companies to provide certain information to the consumer when making a pitch for their business—information like longterm rates, the annual percentage rate for purchases and the cost of financing—formatted in a prominent way that isn’t likely to be missed. The Breach Box would be the data equivalent of nutritional facts labeling. We will be discussing the possibility of a Breach Box—what it would include, how it might be rolled out and sourced. In the new business landscape where breaches are inevitable, we will also discuss the need for companies to provide consumer outreach on best practices and how that can complement the creation of Breach Box information. Threats Facing Financial Institutions & Global Markets: The financial industry has been under a constant state of attack with daily attempts to steal money, crash computer systems and disrupt capital markets. The Threats Facing Banks & Financial Institutions panel will discuss ways to prevent and recover from serious attacks, protect private and confidential data and the emerging dangers organizations face as hackers are adapting and growing more dangerous. Closing Keynote: Deborah A. Snyder, Acting Chief Information Security Officer, New York State Office of Information Technology Services (ITS) “The Challenges of Securing Today’s New Normal” Attendee Cocktail Reception Reception Sponsor:
Please join Dr. Richard White, Oxford Solutions Managing Director, for an open and candid discussion where he will peel back the complexities of cybersecurity in order to help you make informed and sensible risk-based decisions.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |