Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm...

9
Dark Reading Virtual Summit Attendee Guide During Dark Reading’s live Virtual Summit “Re-Thinking Your Enterprise IT Security Strategy” attendees can: Join us for a full day of live sessions in the AUDITORIUM Access CONTENT ZONES and collect resources like white papers: o Security Architecture, Planning, and Governance o Network and Infrastructure Security o Cloud, Mobile, and Application Security o Threat Intelligence and Security Analytics CHAT LIVE with peers Program Agenda 11:00am ET KEYNOTE: Re-Thinking The Philosophy Of Enterprise Security Not so many years ago, IT departments believed they could build a secure “perimeter” and defend it with technology, teach users to embrace and use sophisticated endpoint technology, and develop a layered defense that would stop even the most determined attacker. Today, many of these beliefs are changing. In this eye-opening keynote presentation, a top security visionary explains why these fundamentals no longer apply and offers some new thinking around enterprise defense.

Transcript of Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm...

Page 1: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Dark Reading Virtual Summit Attendee Guide

During Dark Reading’s live Virtual Summit “Re-Thinking Your Enterprise IT Security Strategy” attendees can:

Join us for a full day of live sessions in the AUDITORIUM

Access CONTENT ZONES and collect resources like white papers:

o Security Architecture, Planning, and Governance

o Network and Infrastructure Security o Cloud, Mobile, and Application

Security o Threat Intelligence and Security

Analytics

CHAT LIVE with peers

Program Agenda

11:00am ET KEYNOTE: Re-Thinking The Philosophy Of Enterprise Security

Not so many years ago, IT departments believed they could build a secure “perimeter” and defend it with technology, teach users to embrace and use sophisticated endpoint technology, and develop a layered defense that would stop even the most determined attacker. Today, many of these beliefs are changing. In this eye-opening keynote presentation, a top security visionary explains why these fundamentals no longer apply –and offers some new thinking around enterprise defense.

Page 2: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Moderator: Tim Wilson, Editor in Chief, Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.

Speaker: Bruce Schneier, CTO, Resilient Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 13 books--including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World--as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and his blog "Schneier on Security" are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at Resilient, an IBM Company.

11:45am ET COMMENTARY DESK: Re-Thinking The Philosophy Of Enterprise Security

During this 15-minute Q&A style Commentary Desk, our moderator and a guest speaker from ThreatConnect will weigh in on the content from the previous keynote, “Re-Thinking The Philosophy Of Enterprise Security”.

Moderator: Tim Wilson, Editor in Chief, Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.

Speaker: Adam Vincent, CEO, ThreatConnect Adam is an information security expert and is currently the CEO and a founder at ThreatConnect, Inc. He possesses over a decade of experience in programming, network security, penetration testing, cryptography design & cryptanalysis, identity and access control, and a detailed expertise in information security. The culmination of this knowledge has led to the company’s creation of ThreatConnect, the first-of-its-kind threat intelligence platform. He currently serves as an advisor to multiple security-focused organizations and has provided consultation to numerous businesses ranging from start-ups to governments, Fortune 500 organizations, and top financial institutions.

Page 3: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

12:15pm ET KEYNOTE: Why Security Departments Fail (And What You Can Do About It)

Why do enterprise security technologies and practices fail? Is it the technology that’s failing, or is it people and processes? Most importantly, what can IT organizations do to change this trend? What tools and practices should they keep –and which ones should they get rid of? One of the industry’s leading security thinkers offers some practical advice.

Moderator: Sara Peters, Senior Editor, Dark Reading Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law.

Speaker: James Robinson, Director, Risk & Threat Management, Office of the CISO, Optiv As director, risk and threat management in the Office of the CISO at Optiv, James Robinson uses real-world experiences to help enterprise-level organizations solve their security and related business issues. During his 15 years in security strategy, architecture and engineering, Robinson has served as security architecture and strategy officer for Websense, built the first product security organization for Emerson Network Power, helped to build the vulnerability and penetration assessment team for State Farm Insurance, and earned a patent for his innovative approach to securing critical datacenter infrastructure.

1:00pm ET COMMENTARY DESK: Why Security Departments Fail (And What You Can Do About It)

During this 15-minute Q&A style Commentary Desk, our moderator and a guest speaker from Code42 will weigh in on the content from the previous keynote, “Why Security Departments Fail (And What You Can Do About It)”.

Moderator: Sara Peters, Senior Editor, Dark Reading Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law.

Page 4: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Speaker: Abhik Mitra, Product Marketing Manager, Code42 Abhik is a product marketing manager at Code42 and brings more than 10 years of experience in enterprise technology. He is the strategic conduit between the customer and Product Management, Sales and Marketing teams. He is passionate about creating compelling content and communications to demonstrate the strengths of tech solutions. Prior to Code42, he served as a global product manager for companies such as Xiotech, Kroll Ontrack and Imation.

1:15pm ET SPOTLIGHT VIDEO: Sophos Intercept - A Completely New Approach to Endpoint Security Check out this 5-minute Spotlight Video in the Auditorium, brought to you by Sophos.

1:30pm ET KEYNOTE: Preparing A Next-Generation IT Security Strategy One of the main reasons why information security is so hard to achieve today is that IT itself is changing so rapidly. How can IT organizations build a security strategy that works when so much of the computing environment is outside their span of control? How can security departments implement technologies and practices that will work not only in today’s IT environment, but in tomorrow’s dynamic, multi-dimensional computing world as well? A forward-looking security expert offers some insight on how to develop a “futureproof” enterprise IT security plan.

Moderator: Tim Wilson, Editor in Chief, Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.

Speaker: Christie Terrill, Managing Director, Bishop Fox Christie Terrill (CISSP) is a Partner at Bishop Fox, a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. She has accumulated more than a decade of information security experience. Christie currently leads Bishop Fox’s Enterprise Security practice, where she oversees all projects related to security governance, risk management, compliance, and technical controls. For clients, Christie provides executive advisory services including: security strategy consulting, interim CISO services, Board of Directors presentations, and security program management.

2:15pm ET COMMENTARY DESK: Preparing A Next-Generation IT Security Strategy

During this 15-minute Q&A style Commentary Desk, our moderator and a guest speaker from LogRhythm will weigh in on the content from the previous keynote, “Preparing A Next-Generation IT Security Strategy”.

Page 5: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Moderator: Tim Wilson, Editor in Chief, Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.

Speaker: Michael Dalgleish, Director, Sales Engineering, LogRhythm Michael Dalgleish is a Director of Sales Engineering at LogRhythm, where he has built a team of security professionals who are growing strategic relationships with the partner community. Michael is an industry veteran, spending the last 15 years deeply entrenched in the network and security world. When not on the road evangelizing security intelligence and SIEM, Mr. Dalgleish spends a majority of his time researching the latest attack vectors, kill chains and advanced evasion techniques. Prior to LogRhythm, he has held multiple solutions architect and sales engineer roles, most recently at Kaspersky Labs. There he was the recognized subject matter expert in the North American division, providing industry knowledge and strategic guidance to the InfoSec community. Mr. Dalgleish currently holds a CISSP certification and multiple solution specific certifications. Mr. Dalgleish is a frequent speaker at industry events and on security focused partner webinars for venues including Secure World and Data Connectors.

2:30pm ET SPOTLIGHT VIDEO: Rapid7 – Relentlessly Hunt Threats Check out this 5-minute Spotlight Video in the Auditorium, brought to you by Rapid7.

2:45pm ET PANEL: How To Build And Maintain A Comprehensive Enterprise Security Architecture

When it comes to security, today’s IT organization spends most of its time finding breaches and vulnerabilities and remediating them before the bad guys can find them. But wouldn’t it be more efficient to develop a comprehensive set of tools, practices, and processes –a security architecture –that could provide the basic building blocks of enterprise defense? Top security experts discuss ways that IT organizations can reduce the daily panic by implementing a more well-considered, comprehensive line of defense.

Moderator: Kelly Jackson Higgins, Executive Editor, Dark Reading Kelly Jackson Higgins is Executive Editor at Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, CommunicationsWeek, Virginia Business magazine, and other major media properties.

Page 6: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Speaker: Johannes B. Ullrich, Ph.D., Dean of Research, SANS Technology Institute As Dean of Research for the SANS Technology Institute, Johannes is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry. Prior to working for SANS, Johannes worked as a lead support engineer for a web development company and as a research physicist. Johannes holds a PhD in Physics from SUNY Albany and is located in Jacksonville, Florida. His daily podcast summarizes current security news in a concise format.

Speaker: Chenxi Wang, Chief Strategy Officer, Twistlock Dr. Chenxi Wang is responsible for corporate strategy and marketing. Prior to Twistlock, Chenxi built an illustrious career at Forrester Research, Intel Security, and CipherCloud. At Forrester, Chenxi covered mobile, cloud, and enterprise security, and wrote many hard hitting research papers. At Intel Security, she led the ubiquity strategy that spans both hardware and software platforms. Chenxi started her career as a faculty member of Computer Engineering at Carnegie Mellon University. Chenxi is the co-founder of the Equal Respect initiative, and she serves as the 2016 Grace Hopper conference co-chair for the security and privacy track. She has been quoted/featured by New York Times, Wall Street Journal, Forbes.com, Fox Business News, Bloomberg, Dark Reading, and many other media outlets. Chenxi holds a Ph.D. in Computer Science from the University of Virginia.

Speaker: Jeff Schilling Chief of Operations and Security, Armor Jeff Schilling (Col., rtd.) is responsible for the cyber and physical security programs for the corporate environment and customer hosted capabilities. Jeff retired from the US Army after 24 years of service in July 2012. In his last assignment, he was Director of the Army's global Security Operations Center under US Army Cyber Command, where he was responsible for synchronizing the global security operations/monitoring and incident response for over 1 million computer systems, on 350 wide-area networks, supporting all Army organizations in more than 2,500 locations.

Speaker: Joel Cardella, Senior Program Development, Strategic Services, Rapid7 Joel Cardella has over 24 years of experience in information technology, having run a gamut from network operations, sales support, data center management, field operations and information security. He has worked in industries including telecommunications, healthcare and manufacturing. Prior to Rapid7 he held the role of Regional Security Officer for North America for a multinational manufacturing company. As a former CISO, he helps C-suite executives better interact on information security topics. He also helps organizations build and run

Page 7: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

security programs, manage risk, and increase their security maturity posture. As a public speaker he has presented at security conferences such as BSides Las Vegas, Infragard, US Army TACOM, and Dept Of Defense. He is an instructor at Eastern Michigan University teaching business-focused IT and network security, and holds a Masters Degree in Organizational Leadership. Joel is an ISACA Certified Information Security Manager.

3:30pm ET SPOTLIGHT VIDEO: SOC-as-a-Service is Redefining the Economics of Security Check out this 5-minute Spotlight Video in the Auditorium, brought to you by Arctic Wolf.

3:45pm ET PANEL: The Future Of The Online Threat

In order to develop a more comprehensive, futureproof IT security strategy, it’s important to know threats are evolving. Where will cybercrime be in three years? In five? What new exploits will attackers be using –and what vulnerabilities will they be seeking? In this provocative panel, forward-thinking security experts will offer a glimpse of the future of online attacks –and how your organization can prepare today for tomorrow’s new exploits.

Moderator: Marilyn Cohodas, Community Editor, Dark Reading Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting enterprise Windows platforms and technologies.

Speaker: Keith Brogan, Managing Director, Deloitte Cyber Risk Services Keith Brogan has more than 15 years of comprehensive experience in developing and leading high-performing teams globally for organizations in multiple sectors providing a broad range of cyber security advisory and consulting services. Keith currently spends the majority of his time in the field helping Deloitte’s clients solve their most complex cyber security issues.

Speaker: Cheryl Biswas, Cyber Security Analyst, Threat Intel, KPMG Cheryl Biswas is part of KPMG Canada's cybersecurity team in threat Intel. She is fascinated by APTs, and passionate about securing mainframes, and ICS Scada. She builds bridges as well as building security awareness. She holds a specialized honors degree in political science, and is ITIL designated. In addition to speaking at BSidesLV, Circle City, BSidesTO and the upcoming SecTor, Cheryl has been a guest on podcasts and television, and is an active writer and blogger. You'll find her on Twitter as @3ncr1pt3d.

Page 8: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Speaker: Brian NeSmith, Co-founder and CEO, Arctic Wolf Brian brings more than 30 years of experience to Arctic Wolf Networks. In his previous position as CEO of Blue Coat Systems, he led the company’s growth from $5M to over $500M per year as the industry’s leading web proxy platform.

Speaker: Thom Bailey, Head of Product Marketing for Sophos Central, Endpoint, MSP, and Security Analytics, Sophos Thom Bailey brings 20+ years of technology experience mapping requirements to unique customer needs in his role as Head of Product Management, Sophos Cloud. A thought leader in change and configuration management, security and the hybrid cloud, Thom routinely speaks at conferences around the world.

4:30pm ET SPOTLIGHT WEBINARS Choose a 30-minute Spotlight Webinar to view in the Auditorium, brought to you by our Diamond sponsors:

Building an Intelligent SOC

Endpoints: The Starting Point in Modern Security

Surfacing High-Impact Cyber Threats via Security Intelligence

Spotlight Webinar Details:

Building an Intelligent SOC, Brought to you by ThreatConnect

The traditional Security Operations Center (SOC) is failing. Organizations are relying primarily

on prevention technologies which are insufficient to protect against new and current threats.

Incident response is treated as an exception-based process whereas threat data is treated as a

one-way product to be consumed; and threat intelligence isn’t considered to be a long-term

knowledge building process. Companies need an architecture for a SOC that is adaptive,

context-aware, and built on intelligence. In this webinar, you'll learn:

Why the status quo is not good enough

The characteristics of an intelligent SOC

How to understand your needs and plan for the future

Endpoints: The Starting Point in Modern Security, Brought to you by Code42

It's no secret data threats are pervasive and constant--from ransomware and breach to data loss and theft. Even with the most stringent security policies and procedures in place, businesses remain vulnerable to threats because of a human element: the workforce. Join this session to learn:

How security strategies are evolving to better protect user devices

Why endpoint backup is being used to unite teams, gain visibility and reduce data security blind spots

Page 9: Dark Reading Virtual Summit Attendee Guide · currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now

Surfacing High-Impact Cyber Threats via Security Intelligence, Brought to you by

LogRhythm

The rapidly expanding supply chain supporting the cybercrime economy is empowering cyber criminals, cyber terrorists and even nation states in ways that put companies, critical infrastructure and governments at increased risk. The fate of an organization will be determined by the speed of which it can detect and respond to cyber attacks. A mature security intelligence posture boosts an organization’s resiliency amidst these advanced threats. If intruders are detected early in their lifecycle, organizations can respond quickly and limit the potential for damage altogether. In this Dark Reading webinar, Chris Martin principle sales engineer at LogRhythm, will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s Security Intelligence Maturity Model (SIMM). He will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats. Key themes to be covered include:

Emerging cyber threat vectors in 2016

Security Intelligence and the critical role it plays in addressing high-impact threats

Using the SIMM to assess your current Security Intelligence Maturity

How to move from “greatly exposed” to “highly resilient” via End-to-End Threat Lifecycle

All live content from 11/15/16 will become available for On Demand viewing beginning 11/16/16.

Once you’re logged in you will find a community complete with:

Live and on-demand video presentations

Panel sessions via the virtual theater

Resource links, white papers, case studies, demos

Chat and social options to interact with peers and experts.