Skip to Main Content

Cybersecurity Symposium 2018 - Defining the Cyber Battlefield

Please select the optional registration items below for the Education Breakout Sessions depending on your area of interest &/or job function.

  • >> Choose one session for each block of time <<
  • 10:00am - 1 hour Sessions
  • 11:00am - 1 hour Sessions
  • 12:30pm - Lunch Selection
  • 2:00pm - 1 Hour Sessions
  • 3:00pm - 1 Hour Sessions
 

The Opening Session, General Sessions, Awards Ceremony, Closing Session and the evening reception do not need to be selected during the registration process.  They will be included in your agenda. 


 

 

Agenda

  Go
  • Closed  Closed
  • Optional  Optional
  • Tuesday, March 13, 2018
  •  
    8:00 AM  -  5:00 PM
    Registration and Check In (open all day)
    Grand Ballroom Foyer
    Speakers:
    8:15 AM  -  8:30 AM
    Symposium Welcome & Opening Remarks  ("Grand A")
    Grand Ballroom "A"
    Welcome:
    Russ Hicks, President, Public Sector Partners, Inc.
    Sherilyn Hammond, Director of Events and Logistics, Public Sector Partners, Inc

    Opening Remarks:

    Executive Sponsors for the 2018 Cybersecurity Symposium:
    Jacob Margolis, Chief Information Security Officer, County of Orange
    George Khalil, Chief Information Security Officer, City of Riverside
    Joe Oregon, Chief Information Security Officer, San Diego Fusion Center
    Linda Le, Privacy Officer, County of Orange

     

    8:45 AM  -  10:00 AM
    Opening Keynotes: Responding to Cyber Threats  ("Grand A")
    Grand Ballroom "A"

    The morning Keynote Session will be delivered by two leaders in Cybersecurity, addressing the Response to Cyber Threats.

     

    Building and Maturing a Successful Incident Response Program (Presented by IBM)

    Speaker:  Christopher Scott, Global Lead, Remediation, IBM X-Force IRIS

    Description:  In this discussion, we will focus on lessons learned from a variety of clients throughout the world who have built and matured their incident response programs. We will focus on key lessons, metrics, and how to limit the impact of a major security breach within your environment. We will also discuss how to effectively integrate this capability into your existing or desired security operations

     

    Second Keynote Session - Understanding the terrain for security operations  (Presented by Splunk, Inc.)

    Speaker: Monzy Merza, VP, Head of Security Research, Splunk, Inc.

    Description: Your agency’s systems are connected to many other systems – some within your control, and some not in your control – on-prem and in the cloud. What threats do you care about? How do you rationalize, prioritize where to start? We will discuss an approach to understanding your enterprise terrain. And then share examples of how enterprises have used terrain understanding as the anchor to risk reduction and security operations maturity.

    10:15 AM  -  11:00 AM
    Session 1: What Just Happened? How convergence of IT, IoT, & OT has changed the security landscape  ("Grand F" by ForeScout)
    Grand F

    Speaker:  Tony Gillespie, Public Sector Strategist, ForeScout Technologies

     

    Description:   The attack surface has changed dramatically. IT, IoT, OT, ICS, SCADA, oh my! Technology leaders and their staff are trying to keep up with the growing diversity of devices, including the internet connections for operating technology like ICS, SCADA, and other non-IT traditional devices. How can an organization effectively manage this changing landscape? How can IT provide visibility and security to an environment that is ever changing and increasingly diverse?

     

    Intended Audience: CIO, CISO, Security Architects, Network Engineers
     Optional 
    10:15 AM  -  11:00 AM
    Session 2: Find Map, Locate Treasure, Avoid Pirates:Holistic Approach to Info Risk/Protection  ("Grand E" by IBM)
    Grand E

    Speakers:

    Cindy E. Compert, CIPT/M CTO US Public Sector; CTO Data Security & Privacy, IBM Security

    Rahul Gupta Sr. Deputy District Attorney, Orange County District Attorney's Office: Major Fraud-Cybercrime

     

    Description:

    The best practices of data security and privacy are similar to playing the children's game 'Treasure Hunt'. Imagine yourself in an exotic tropical paradise. Your goal is to find and guard a cache of valuable buried treasure. Pirates from lands far and wide are swarming the area, and they want that treasure as badly as you. In this talk, Orange County Sr. Deputy District Attorney Rahul Gupta will first describe the potential criminal aspects of data breaches and stolen PII, followed by IBM CTO Cindy Compert sharing top data security and privacy best practices gleaned from working with hundreds of clients, to help you protect your own crown jewels.

     

    Intended Audience:  Executives, Managers, Supervisors, Architects, Technical staff, IT, Security.

     Optional 
    10:15 AM  -  11:00 AM
    Session 3: How should behavioral analytics fit into a modern security program?  ("Garden 2" by Splunk)
    Garden 2

    Speaker:  Sharon Williams Sales Engineer, State & Local Government and Higher Education, Splunk Inc.

     

    Description:  The trend toward user behavior analytics for advanced threat detection is gaining momentum with security teams across both the public and private sectors. While the application of machine learning and related data-driven techniques to user behavior holds a great deal of promise, many organizations are left wondering how this new approach should fit into their existing security program. We will discuss the structure of current high-performing security programs, how user behavior analytics can play a part in your security program, and what questions to ask when evaluating various behavior analytics product and service offerings.

    After this session, participants will be able to:
    * Understand the structure of high performing security operations programs
    * Understand why most security programs need higher fidelity detection mechanisms based on user behavior analytics
    * Understand what you need to know about machine learning in order to make the right decisions for your security program

     

    Intended Audience:  CIOs/CISOs, Information Security managers and staff, program executives and managers

     Optional 
    10:15 AM  -  11:00 AM
    Session 4: A Review of Today's Threat Landscape  ("Garden 3" by Symantec)
    Garden 3

    Speaker:  Kevin Haley, Director of Product Management for Symantec Security Technology and Response, Symantec Corporation

     

    Description:  2017 saw major shifts in techniques used by attackers and cybercriminals; with new threats, and old threats in new forms. Based on data from Symantec’s Global Intelligence Network (GIN) and Symantec’s Internet Security Threat Reports (ISTR) this presentation provides a detailed analysis of recent global threat activity as well as key trends and best practices.

     

    Get the facts from Symantec’s research and analysis of the threat landscape and learn:
    • Why 2017 was the biggest year for malware yet.
    • How ransomware attacks continue to grow and what they’ll do next
    • How IoT security is a looming challenge for consumers and businesses
    • That latest social engineering being used to fool end-users
    • How attackers are taking advantage of the supply chain
    • What’s going on in underground market places

     

    Intended Audience:  CyberSecurity practitioners (technical) as well as policy makers (non-technical) in fields related to security and privacy will find this presentation interesting and thought-provoking.

     Optional 
    10:15 AM  -  11:00 AM
    Session 5: Buried in Data – A Return to Actionable Information  ("Grand A" by Tanium)
    Grand Ballroom "A"

    Speaker:  John Otterson, Director of Technical Account Management, Tanium

     

    Description:   As organizations have become larger, more complex, and more online, the flood of data has overwhelmed IT staffs across industries, in both public and private sectors. While detail is important to operations and investigations, the volume quickly becomes overwhelming and in many cases slows response. We will discuss current complementary strategies for real-time on-demand access to actionable information across large and complex IT infrastructures. Attendees will leave the session with an industry-agnostic framework on how to approach the challenges of these environments.

     

    Intended Audience: 
    Security professionals including Executive and hands-on operators for security operations.

     Optional 
    10:15 AM  -  11:00 AM
    Session 6: CA Public Records Laws: Mitigating Social and Mobile Compliance Risks  ("Grand G" by Smarsh)
    Grand G
    Speakers: 
    Mike Pagani, Sr. Director of Product Marketing & Chief Evangelist, Smarsh
    Bonnie Page, General Counsel, Smarsh
    Colleen J. Nicol, MMC, City Clerk City of Riverside, CA
    Frank Ury. Former Mayor Mission Viejo. Advisory Committee Member-Southern CA Association of Governments-Big Data/Open Data Committee

     

    Description:   The increased use of mobile technologies like texting and social media apps is giving Public Entities unprecedented gains in efficiency, agility and productivity. Maintaining compliance and enforcing effective policies for safe and secure usage and retention in the face of new and evolving CA Public Records laws is a growing challenge. Between the expectations of a new generation of employees, an organization's constituency, and the drive for transparency, adding mobile devices and related communications methods as a key part of your service strategy is now mandatory. This moderated panel session will explore best practices to address issues created using social media, text , and other mobile-driven communication platforms. As adoption accelerates, Legal, IT Security and Compliance personnel must determine how to set policy, guidelines, and deploy the right tool sets to achieve the benefits while minimizing the inherent risks.

     

    Intended Audience:  All state and local government personnel responsible for designing and implementing security, compliance, legal and/or privacy strategy for mobile and electronic communications.

     Optional 
    10:15 AM  -  11:00 AM
    Session 7: SCADA/ICS - Protecting Critical Infrastructure from Cyber Attacks  ("Garden 4" by CGI)
    Garden 4
    Speakers: 
    Jim Menendez, Cybersecurity Practice Lead, CGI Federal
    Kenneth San Nicolas, Vice President, Cybersecurity, CGI
    Bryan Willet, SSA, FBI Los Angeles Field Office Orange County Resident Agency
    Thomas Nuth, Director of Product Marketing, Nozomi Networks
    Deron McElroy, Chief of Operations - West Cybersecurity Advisor Program Office of Cybersecurity and Communications, U.S. Department of Homeland Security

     

    Description:   Threats to the nation's critical infrastructure are increasing. The silos in which Industrial Control Systems (ICS) once existed are being broken down to improve data sharing but expose them to attacks that can lead to service disruptions and potential loss of life. Many ICS systems were developed decades ago and now operate using different protocols. Because a cyber threat to IT is now becoming a cyber threat to OT, organizations must look at cybersecurity holistically across both domains. Huge operating differences in cultures, chains of command, drivers, focus areas and job descriptions must be recognized in order to develop sound cybersecurity strategies. This session will provide insight into the security challenges of complex and inter-organizational IT/ OT infrastructures. Attendees will walk away with a handout to identify/address areas of potential weakness to prevent a cyber-attack, prioritize security investment, maintain operations, and prevent financial/reputational loss.

     

    Intended Audience:  Including, but not limited to, Public Sector employees of all organizations responsible for protecting critical infrastructure. CGI has experience working with various public and private sector organizations; events discussed in the lecture can be applied to most divisions.

     Optional 
    10:15 AM  -  11:00 AM
    Session 8: Incident Response: 7 Phases of IR - Have a Plan.  ("Garden 1" by SANS)
    Garden 1
    Speakers: 
    Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS

     

    Description:   One of the most important phases of an Incident Response is having a plan. Let’s work through the scenario when something strange is happening on our network. What do we do? If we have established a plan of time, we will move to resolution much faster. Brian Ventura, Information Security Architect and SANS instructor will discuss the phases of Incident Response in detail. Brian brings a wealth of experience in information security and will provide examples of how plans and solutions.

     

    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioners

     Optional  Closed 
    11:15 AM  -  12:00 PM
    Session 9: There’s Better Security in the Cloud, but Are You Using Clouds Securely?  ("Garden 4" by Oracle)
    Garden 4
    Speakers: 
    Troy Kitch, Sr. Director, Oracle Security Products, Oracle
    Additional Panelists - TBD

     

    Description:   In this session, learn how to take on the top concerns for cloud adoption regarding security and data protection for all applications and workloads. Hear how successful organizations large and small have implemented and manage consistent security policies to identify threats with automation, user behavior analytics, intelligent technologies, such as machine learning across the hybrid data center.

    See how Identity-Driven Security Operations Center (Oracle Identity SOC) capabilities help organizations prevent, detect, respond to, and predict today’s innovative security threats.

    Note: Put a minimum of cloud security criteria needed to develop a secure cloud; Hand Out / White Papers / Customer Testomonials / Case Studies, etc.

     

    Intended Audience: 
    InfoSec and cyber security practioners, CISO and CSO leaders, identity administrators, SOC (security operations center) analysts, directors, managers and administrators. Risk, Compliance & Privacy.

     Optional 
    11:15 AM  -  12:00 PM
    Session 10: Are your Cyber mitigation strategies "battle-tested"?  ("Garden 1" by Ernst & Young)
    Garden 1
    Speakers: 
    Renana Freidlich, Sr. Manager, Ernst & Young LLP
    Geoff Noonan, Special Agent, U.S. Secret Service

     

    Description:   With 57% of organizations having had a recent significant cybersecurity incident, becoming a victim is inevitable. While the why/when cannot be controlled, companies can reduce the overall detection and response time as well as the cost associated with the incident by implementing the lessons learned from other companies. This session will focus on recent trends in incident response, attack techniques both new and old, and intriguing war stories that cannot easily be found. Attendees of this session will walk away with recommended mitigation strategies that have been battle-tested and are ready to be implemented in your organization now.

     

    Intended Audience:  Senior executives in the IT, Cyber, Risk management, and operations business functions.

     Optional 
    11:15 AM  -  12:00 PM
    Session 11: Using Threat Intel as another Security Analyst  ("Grand F" by Palo Alto Network)
    Grand F

    Speaker:  Bryan Lee, Threat Intelligence Analyst - Unit 42 Palo, Alto Networks

     

    Description:   Hear from Bryan Lee, a Palo Alto Network's Unit 42 (a specialized Threat Intelligence Group) lead Threat Researcher, on how to automate actionable intelligence from threat feeds. Shorten the time spent analyzing and actually apply protection to your environment. Learn best practices around who's information to trust, how to prioritize the threat, how to apply an action to your networks, and ultimately how to ease the load put upon your security analysts. Bryan and his team are on the frontline of threat research. He'll be diving deeper into recent attacks and sharing how we pull actionable intelligence from the attacks and how this affects the public sector industry.

     

    Intended Audience:  C-Level, Managers, Directors, High-Level Engineers, anyone with interest in leveraging Threat Intelligence to better secure their environment

     Optional 
    11:15 AM  -  12:00 PM
    Session 12: CyberSecurity, the anatomy of an attack.  ("Grand A" by BMC)
    Grand Ballroom "A"

    Speaker:  Eric Anderson CTO - SecOps Automation BMC

     

    Description:   In this session, we will be reviewing the anatomy of an attack. Specifically, we will discuss the different actors and their motivations, several of the most common threat vectors (how they get in), their process once they breach your network and finally what you can do about it. This is a session that is meant to provide a level of information that will educate you in the methods and motivations of hackers. Once you understand their process, you can take specific actions to that make attacking your network more difficult and detecting breaches if they occur.

     

    Intended Audience:  CISOs, CIOs, CTOs CEOs, Security Analyst, Security Managers and Information Executives, Compliance, Asset Management, IT Directors, IT managers, ISOs, Network and Server Operations, Administrators, IT Architects, Manager LoB, Security Operations Center

     Optional  Closed 
    11:15 AM  -  12:00 PM
    Session 13: Application Security – A primer for DevSecOps  ("Garden 2" by Entisys360/PTP)
    Garden 2
    Speakers: 
    Ron Hamilton, CISO, Performance Technology Partners
    Rex Murphy, Security Consultant, Performance Technology Partners

     

    Description:   A number of years ago, thousands of organizations started interacting with their customers via the web. The reasons for this effort varied but the SDLC that created these web-based applications focused primarily on functionality and performance while largely (or perhaps entirely) ignoring security. There are many reasons why security took a back seat. Application security skills are hard to find and expensive to employ. Nearly all of the major security vendors focus on everything but, the application layer. Most developers have not been trained for and do not understand security. Finally, companies are largely unaware that their applications are vulnerable until it is too late. In response to these and other issues, Entisys360 and PTP will define why a DevOps plan needs to include security, i.e. DevSecOps. We will also discuss how to build a DevSecOps team and how to find, hire and retain, DevSecOps people.

     

    Intended Audience:  CISO's, CIO, Devlopers, Scrum Masters, Operations Managers, QA Testers.

     Optional 
    11:15 AM  -  12:00 PM
    Session 14: The Death of the CSO: Cybersecurity Risk Management  ("Grand G" by Cylance)
    Grand G

    Speaker:  Scott Scheferman, Director of Consulting, Cylance

     

    Description:   The world of cybersecurity has changed. Cybercriminals target organizations and unleash a torrent of malicious files and attacks that flood an enterprise until a breach occurs. Many businesses, both large and small, have been infiltrated and employing traditional security solutions often exposes businesses to high risks and long-term costs. Cybersecurity has now moved from a backroom issue to one in the boardroom. This presentation will discuss: • Developing a high-level understanding of cyber-risks as well as the legal implications • Facilitating a culture that views cybersecurity as a business issue • Assessing the effectiveness of your cybersecurity strategy • Reducing business risk by shifting thinking from detect and respond to one of PREVENTION

     

    Intended Audience:  The primary audience is CIOs and other IT leaders, CISOs, and other Information Security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, Board members, privacy professionals and less senior-level information security and risk professionals.

     Optional 
    11:15 AM  -  12:00 PM
    Session 15: Innovating for the Future of Cybersecurity in the Public Sector  ("Grand E" by CrowdStrike)
    Grand E

    Speaker:  Chris Kachigian, Senior Director of Global Cyber Security Engineering , CrowdStrike

     

    Description:   Globally, organizations are faced with the daunting task of staying secure in a world where threats continue to grow in number, frequency and sophistication. This session offers an overview of the latest trends shaping the cybersecurity field as well as an update on the top threat actors targeting state and local governments. You’ll learn how new technology and innovation — by both defenders and attackers — impact your organization and the public sector. You will also learn how to turn these trends to your advantage to improve your organization’s security posture

     

    Intended Audience:  Executives/Managers

     Optional 
    11:15 AM  -  12:00 PM
    Session 16: NIST CyberSecurity Framework usage, overview and 5-year plan  ("Garden 3" by SANS)
    Garden 3

    Speaker:  Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS

     

    Description:   Brian Ventura, Information Security Architect and SANS instructor will discuss NIST published the Cybersecurity Framework (CSF). What is this, why do I care and how can I use it to manage my security? In this talk I will present a Creative Commons framework management tool created and used at the City of Portland. The tool is provided at no cost for your organization. Additionally, we will cover the basics of the CSF, how we adapt the framework to the City's service catalog, track maturity, and manage a 5-year budget and plan

     

    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioner

     Optional 
    12:30 PM  -  1:45 PM
    Lunch Keynote: Changing Culture & Raising Awareness  ("Grand A")
    Grand Ballroom "A"

    Moderator:

    George Khalil, CISO, City of Riverside

    Keynote Panelists:

    Joseph A. Oregon
    Chief Information Security Officer (CISO)
    San Diego Law Enforcement Coordination Center (SD-LECC)
    Cyber Intelligence Unit

     

    Noel Kyle
    Program Manager, Cybersecurity Education & Awareness Branch
    US Department of Homeland Security

     

    Renault Ross CISSP,MCSE,CHSS,CCSK,CISM
    Chief Cybersecurity Business Strategist
    Symantec Americas Strategic Programs

     

    Tony Gillespie
    US Public Sector Strategist
    ForeScout Technologies
     
     
    Description - The information security community is approaching cybersecurity challenges as a technology problem, recent breaches and attacks are typically user-driven. Technology, standards, and defense in depth cannot provide a holistic security framework without engaging employees. Cybersecurity is an integral part of each employee’s job responsibility. User engagement, awareness and your employee's security culture can directly impact the success or failure of your cybersecurity program.
    2:15 PM  -  3:00 PM
    Session 17: Role of ML/AI in enforcing Cyber Hygiene  ("Grand A" VMware)
    Grand Ballroom "A"

    Speaker:  Vijay Ganti, Director Product & Head of ML/AI Research, VMware AppDefense, VMware

     

    Description:   The only thing outpacing growth in security spend, is security losses. A big reason for this is that we aren’t spending our precious dollars the right way. There are really two sets of activities to secure your environment.

    • Cyber Hygiene: The things you do to shrink the attack surface; compartmentalize, least privilege, encryption, strong authentication, patching.
    • Cyber Threats: The things you do to address the residual risk

    While most of security industry focusses on cyber threats, in a risk management approach, your focus should be on the things that will have the most material impact on your risk. And unquestionably, cyber hygiene has a much more significant impact on your risk. In this talk we’ll cover both the importance of Cyber Hygiene and how AI/ML can be used to achieve Cyber Hygiene.

     

    Intended Audience:  Beneficial for all, but intended for strategy minded planners of the organization.

     Optional 
    2:15 PM  -  3:00 PM
    Session 18: Practical methods for creating a successful IR program from scratch  ("Garden 3" by Tevora)
    Garden 3

    Speaker:  Clayton Riness, Managing Director, Threat and Solutions, Tevora

     

    Description:   Join us as we dive into creating an incident response program. We'll cover process and procedure development, how to test your IR plan, and what your local law enforcement agency needs from you if you experience an incident. We'll leave you with a pracical toolkit to guide you in creating an effective incident response program for your organization or refining your existing plan over time.

     

    Intended Audience:  This session will be useful to any person in an organization who would be involved in incident response, from the CIO/CISO, to the Privacy Officer/Legal Team, to technical staff that would investigate an incident.

     Optional 
    2:15 PM  -  3:00 PM
    Session 19: Leveraging behavior analytics for Data Centric Audit & Protection(DCAP)  ("Garden 2" by Imperva)
    Garden 2

    Speaker:  Brian Anderson, Principal Security Engineer, Imperva

     

    Description:  We will focus on users & data - understanding the context of this intersection is typically the comfort zone for InfoSec professionals. Data Centric Audit & Protection(DCAP) framework provides an outline of the main data repositories to focus on. Data repositories are expanding and going to the cloud. Insider threats make it hard to catch people. We will look at insider threat profiles, as they are the fundamental problem. We will also discuss Machine learning and behavior profiling and have a laser focus discussion on machine learning and a deep understanding of the intersection of users & data

     

    Intended Audience: Our intended audience is ideally the CISO or Cybersecurity Director

     Optional 
    2:15 PM  -  3:00 PM
    Session 20: Jeopardy Cloud Security: Keeping the Lights On, All day, Every day!  ("Grand F" by Zscaler)
    Grand F
    Speakers: 
    Vaishali Patel, Regional Sales Manager, Zscaler
     
    Panelists:
    Jake Margolis, CISO, Orange County
    Stormy Maddux, CISO, San Mateo County

     

    Description:   Instead of the normal presentation, come learn about moving to the cloud and the security impacts via a fun, creative and interactive Jeopardy Game where the 3 Contestants will be your fellow CISOs from local and county government. Categories will focus on market trends and best practices around SAAS, Compliance/Privacy, BYOD, CASB, Keeping Users Educated, etc. You will also get to learn first hand from the CISOs on how they are increasing their security maturity model and lessons learned within their own environements and there will be a fun interactive audience portion to keep you on your toes!!

     

    Intended Audience:  CIOS, CISOs, Director of Network/Infrastructure, Security, Line of Business, Network, Cloud Focused Areas, Privacy/Compliance

     Optional 
    2:15 PM  -  3:00 PM
    Session 21: How to Build a SOC with Limited Resources  ("Garden 4" by LogRhythm)
    Garden 4

    Speaker:  James Carder, CISO, LogRhythm, Inc

     

    Description:   This presentation will show you how you can successfully build a Security Operations Center (SOC), even with limited resources. The lecture will first explain the basics of the Cyber Attack Lifecycle and the need to address it end-to-end through an AI and Machine Learning enabled Threat Lifecycle Management framework deployed in the heart of your SOC. The presentation will explain the basics and types of Security Operations Centers, providing details of what successful SOCs require in terms of people, processes, and technology. Finally, the presentation will walk you through a 7-step methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After attending this presentation and reviewing the guide that you will be provided for attending, you should be ready to start planning your own Security Operations Center.

     

    Intended Audience:  Executives, Managers, Supervisors, Architects

     Optional 
    2:15 PM  -  3:00 PM
    Session 22: Beyond just detection, prevention!  ("Grand E"by CA Technologies)
    Grand E
    Speakers: 
    Peter Chestna, Director, Developer Engagement, CA Veracode
    Lisa Buschmann, Solution Director, Cybersecurity, CA Technologies

     

    Description:   The current emphasis on punishment, detection and notification ignore the best place to make the problem better – prevention. Understanding the risk in your software supply chain and sharing responsibility for secure outcomes with the vendors and developers could have prevented the San Francisco Muni Rail breach in addition to other high profile breaches. This session will talk about stopping vulnerabilities at their source where they’re cheapest and easiest to fix.

     

    Intended Audience:  CISO, Security Leads, Development Leads

     Optional 
    2:15 PM  -  3:00 PM
    Session 23: Balancing Negative & Positive Security to Strengthen Endpoint Protection  ("Grand G" by Nyotron)
    Grand G

    Speaker:  Rene Kolga, Senior Director of Product Management, Nyotron

     

    Description:   Most organizations have deployed endpoint security. Still, they can’t seem to stop all existing and new threats, particularly fileless malware. They’re being infected, getting ransomware and/or having unwanted downtime. The reason is that they are only using solutions that try to track down everything “bad”. Relying solely on this negative security approach will eventually let some elusive new threat access your endpoint and its data. This presentation will describe a new OS-Centric Positive Security model that only allows legitimate operating system behavior to prevent damage such as data exfiltration, corruption, encryption and deletion. Since this model doesn’t care about the malware or attack vector, it’s highly effective for blocking damage.

     

    Intended Audience:  Executives, Managers, Supervisors, Architects

     Optional 
    2:15 PM  -  3:00 PM
    Session 24:Are you gambling with your future? Setting the stage for security & how people attack you  ("Garden 1" by Verizon)
    Garden 1

    Speaker:  Craig Bowman, Vice President & Managing Director, Public Sector - Advanced Solutions, Verizon

     

    Description:   Cybercrime can come in any shape or size, and not always the form you’d expect.

    During this interactive discussion we will be reviewing data from the 2017 Verizon Data Breach Investigations Report (DBIR)...

    • The biggest cyber security threats in your sector and what you can do to mitigate them.
    • Who’s behind the attacks and how they’re getting in.
    • What motivates the cybercriminals.
    • How nine incident patterns can help you predict what the cybercriminals will do next.

    Mr. Bowman will walk you through patterns in the security landscape and our adversary’s operational methods.

    No system is 100% secure. But understanding the threats you face will help you improve your security. Cybercriminals are using all the information they can get hold of to up their game — you should too.

     

    Intended Audience:  CyberSecurity personnel and decision makers, as well as policy makers in the security arena, will find this session interesting and thought-provoking.

     Optional 
    3:15 PM  -  4:00 PM
    Session 25: Look Before You Leap: Key Considersations for Cloud Security  ("Grand G" by iBoss)
    Grand G
    Speakers: 
    Richard Quinones, SVP of SLED Business Development, iboss
    Ronald S. Chandler, CIO, UCLA Anderson School of Business, iboss Executive Advisor for Public Education
     

    Description:   It’s the variety of designs, applications, and use cases that make the cloud such an attractive concept, as cloud technology has the potential to grant organizations the agility they need to succeed in increasingly digital – and distributed – business environments. However, the ambiguity of cloud and ultimately cloud security comes with its own set of questions and challenges that should be closely considered before implementation. In this session, we'll discuss closing the gap between vision and implementation, common integration pitfalls, regulatory compliance, and other key considerations for implementing a cloud security strategy.

     

    Intended Audience:  CIO, CISO, Security Professionals, and IT Architects

     Optional 
    3:15 PM  -  4:00 PM
    Session 26: Diagnosing an Incident: Is it a Breach?  ("Garden 3" by Radar)
    Garden 3

    Speaker:  Mahmood Sher-Jan, CEO, RADAR, Inc.

     

    Description:   An employee clicks on malware every 81 seconds. This, plus cyber attacks, employee mistakes, and policy violations puts sensitive information at constant risk. Properly diagnosing and risk assessing incidents is critical in ensuring your organization complies with regulatory and contractual data breach obligations. But how do you identify which incidents are data breaches, particularly when up to 90% of incidents can be sufficiently risk mitigated to avoid notification after a compliant multi-factor risk assessment? In this session, discover how to diagnose if an incident is a reportable data breach, minimize risks to your organization, and learn how security and privacy can work together to ensure compliance with regulations and your contractual data security obligations with business partners. Also, gain insights into incident response misconceptions, best practice benchmarks, and recommendations based on an analysis of metadata from thousands of incidents.

     

    Intended Audience:  Privacy, security, and compliance officers and stakeholders

     Optional 
    3:15 PM  -  4:00 PM
    Session 27: Transforming Your Organization with Identity & Access Management  ("Grand E"by ENS/Centrify)
    Grand E
    Speakers: 
    David McNeely, Vice President Strategy, Centrify Corporation
    Chad Hodges, Vice President, ENS Inc

     

    Description:   For years we’ve heard that ‘identity is the new perimeter’, yet organizations still struggle with managing network access, authenticating users, and preventing breaches which originate from compromised credentials. In order to address this well-understood problem, organizations must look at how they are managing their users and modernize both the culture and technology within their ecosystem vis-a-vis Identity and Access management. This session will explore innovative technologies and strategies by discussing case studies and sharing use-cases which have yielded positive results and providing information to enable a strategic foundation for transformation and implementation of your Identity and Access management with tips and recommendations to achieve best practice at a lower cost.

     

    Intended Audience:  CIO, CISO, CTO

     Optional 
    3:15 PM  -  4:00 PM
    Session 28: Latest innovations in securing against Phishing and Malware  ("Garden 4" by Akamai)
    Garden 4

    Speakers:  Jeff Stout, Akamai Technologies

     

    Description:   Layering security in increase protection is as old as man. In the Middle Ages, castle walls were supported with new technologies like moats, gatehouses and drawbridges. Cyber security is no exception - to protect against phishing and malware, multiple layers of protection are needed. This session will explore the innovations in securing DNS as an additional layer of protection and depth of security. Attendees will learn how various technologies complement one another for a stronger security posture.

     

    Intended Audience:  Cyber Security management and staff that are interested in enhancing their Phishing and Malware security.

     Optional  Closed 
    3:15 PM  -  4:00 PM
    Session 29: Compliance and security in the cloud: what do I need and how do I get there?  ("Grand F" by HyTrust)
    Grand F

    Speaker:  Eric Chiu, Founder and President, HyTrust

     

    Description:   Government agencies are subject to meeting regulatory compliance (NIST, HIPAA, PCI, just to name a few) for their cloud infrastructure. What does this mean and how can you ensure compliance in the cloud? Also, what is the difference between being compliant versus being secure? Isolating and protecting ALL the data is not required by many standards and not practical in most environments. It's important understand what needs to be protected, how to identify it, and what levels need to be employed based on the sensitivity of the data. We will discuss how you can not only have the assurance of automated compliance of government requirements, but also some methods for identifying what critical data needs to be protected, and to what criteria.

     

    Intended Audience:  CISO, Security officers, Compliance officers, Cloud supervisors (private and public), IT managers, Security Professionals, IT Architects, IT Professionals.

     Optional 
    3:15 PM  -  4:00 PM
    Session 30: Strategies for Achieving Enterprise Security & Compliance in the Cloud  ("Garden 1" by CheckPoint)
    Garden 1

    Speaker:  Gary English, SE, Channel Sales, Check Point Software Technologies

     

    Description:   There is a level of maturity that IT professionals have achieved within a fully developed on-premise Enterprise Cyber Security environment. The past twenty five years of research and development has led to quality security products, mature security processes and specialized security training. With the Cloud we start all over again. With the rapid adoption of Cloud computing, we need to achieve the same level of Enterprise Security in the Cloud as we have in the Datacenter. This session will address the follow issues: o Achieving Enterprise Cyber Security in the cloud o Demonstrating compliance to Auditors o How do you Secure systems you can’t see, touch, or have physical feedback? o How do you achieve control and visibility? o Getting the logging information you need o Tips on getting the budget you need to accomplish this This educational session will arm you with real tools and information that you can take back to work and create a more secure environment.

     

    Intended Audience:  Technical and Security Staff responsible for implementing and maintaining security within a Cloud Architecture

     Optional 
    3:15 PM  -  4:00 PM
    Session 31: Detect, Prevent, Sustain – The Journey of Protecting your DATA from Insider Threats  ("Garden 2" byVaronis & Nth Gen)
    Garden 2
    Speakers:
    Jeremy Sawyer, Sales Engineer, Varonis
    Travis Bennett, Sales Representative, Varonis
    Jeromie Jackson, Nth Generation

     

    Description:   Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

     

    Intended Audience:  Anyone in the IT Security space or tasked with compliance

     Optional 
    4:15 PM  -  4:30 PM
    CSS2018 Closing Remarks  ("Grand A")
    Grand Ballroom "A"

    Join us for the Closing Remarks, followed by the 2017 Cybersecurity Symposium Event Reception throughout the 2nd Floor Foyer, Solution Center.

    4:30 PM  -  5:30 PM
    2018 Cybersecurity Symposium Reception  (Solution Center)
    Grand Ballroom B/C/D
    Join us for a reception following the Closing Remarks.
Top