Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to...
Tarun is Deputy CISO at Fortinet. She is focused on enterprise security, compliance and governance, and product security. She is also a contributor to the book, The Digital Big Bang. Renee joined Fortinet as the Vice President, Information Security in early 2017. Immediately prior to joining Fortinet, she served as Special Assistant to the Director, National Security Agency (NSA), for Cyber and Director of NSA's Cyber Task Force, in which she advanced NSA's execution of its cybersecurity and cyber-related missions by acquiring, investing, and overseeing resources; defining and integrating mission capabilities; and shaping agency strategy and national level policy.
As the Assistant to the Chief Operating Officer (COO) of the Information Assurance Directorate at NSA, her focus areas included strategy, planning, integration, and relationship management, in cybersecurity and related disciplines across NSA and the Department of Defense (DoD).
Renee also served as Senior Cyber Strategist in a joint DoD-DHS organization which orchestrated joint efforts in operational planning, policy, and strategy, for cyber issues across the US Government.
She was the Portfolio Lead for the Protect Data and Networks and Operational Resiliency Portfolios for the Deputy Assistant Secretary of Defense for Information and Identity Assurance. Previous assignments include computer scientist, information technologist, and a variety of policy, programs, and resource jobs.
Renee is also a board member for the George Mason University Volgenau School of Engineering, creating synergy between the school and the professional community by addressing workforce development demands, industry expectations, and employment trends.
A poor customer experience and insufficient security in the account opening process has been shown to directly negatively impact long-term customer loyalty, retention and profitability. New technologies, such as digital identity verification, facial comparison, e-signature, liveness detection, biometrics, and more -...
2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt. Join this exclusive panel for unique insight into:
How to respond when your business faces historic transformation;
Challenges posed by new threats, endpoint security...
Mike Huckaby is the Vice President of Worldwide Sales Engineering at Gigamon, and has worked as a Senior Security Strategist in the Cybersecurity industry for the past 20 years. He has developed best practices around risk, threats, readiness and response, and has consulted on designing robust security programs. For 16 years, Mike worked at RSA Security on Identity and Access Management, threats detection and response, anti-fraud, and next generation security operations technologies. Now he brings his expertise to lead the Gigamon international team of Presales Engineers who work cross-functionally to understand current cyber-security and visibility concerns and create the right solutions to empower and protect businesses. Mike is a focused customer advocate, taking the time to listen to customer needs, identify key issues, and create strategic alliances with security leaders globally.
Tim Rohrbaugh is a senior security and data governance professional. The range of his prior work is extremely technical through product and program strategy. He is the current CISO of Jetblue Airways. Prior to this role, he was the CISO for a public financial services firm for 12 years. Cyber Security experience includes Military, DoD and Federal and commercial consulting. He is a CISSP and hold two joint patents on Identity Verification.
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their...
Ron Raether leads the Cybersecurity, Information Governance and Privacy practice and is a partner in the Consumer Financial Services practice group at Troutman Pepper. Ron is known as the interpreter between businesses and information technology, and has assisted companies in navigating federal and state privacy laws for over twenty years. Ron's understanding of technology led him to be involved in legal issues that cross normal law firm boundaries, including experience with data security, data privacy, patent, antitrust, and licensing and contracts. This experience allows Ron to bring a fresh and creative perspective to data compliance issues with the knowledge and historical perspective of an industry veteran.
Ron's involvement in seminal data compliance and data use cases has helped define current standards in several areas of the law. He assisted one of the first companies required to provide notice of a data breach and has since successfully defended companies in hundreds of class actions and regulatory investigations. Ron represents clients in a broad range of technology and data privacy matters including data aggregation and analytics, mobile applications, de-identification/anonymization, including correlating data from multiple connected devices, "connected-things (IoT)," electronic crash- and consumer-reporting systems, and payment technologies. Ron also advises on pre- and post-incident compliance concerns ranging from the development of incident response plans and workflows, guiding clients through immediate forensic investigations, coordinating initial crisis management, which includes navigating clients through the maze of state and federal notification requirements, addressing post-incident aftermath, and responding to regulatory inquiries. Balancing privacy, cyber security and business functionality, Ron's approach to data governance is uniquely designed with the industry in mind as it adapts to the ever-evolving technological and legal landscape.
Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
A former NSA crypto-engineer, Sabett brings to Cooley LLP his extensive experience in data security, privacy, licensing and IP. Sabett has managed numerous data breach responses involving major retailers, financial and healthcare organizations, and on-line service providers. He served on the Commission on Cybersecurity for the 44th Presidency and has been recognized as a leader in privacy and data security in the 2007-2014 editions of Chambers USA. Sabett is a member of the board for the Georgetown Cybersecurity Law Institute and the Northern Virginia chapter of ISSA. He also is a frequent lecturer and author, and has appeared on or been quoted by a variety of national media sources.
Vice President of North America Engineering, Checkpoint
Jeff Schwartz, CISSP, is vice president of North America engineering at Check Point. Schwartz manages all aspects of technical operations and resources for the company in the region, including a team of over 200 engineers across multidisciplinary fields. Throughout his 20-year career in cybersecurity, he has consulted, designed or overseen the implementation of large network security deployments within every major vertical throughout both the Fortune 500 and major government agencies.
With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots...
Co-Founder and Chief Product Officer, Cequence Security
Ameya heads the product and engineering teams at Cequence and works closely with customers to identify new use cases and new attack vectors that can be addressed with AI and machine learning technologies. He has built strong engineering teams specializing in enterprise and consumer security in Silicon Valley, Los Angeles, Madrid, Pune, and Chengdu. Before co-founding Cequence Security, he was Director of Engineering at Symantec, where he was responsible for its anti-malware software stack that leverages network Intrusion prevention and behavior and reputation technologies, and anti-virus engines. Under Ameya's leadership, Symantec developed an advanced version of network intrusion prevention technology that blocks more than two billion threats a year. Ameya holds a Bachelor of Engineering in Electrical Engineering from the University of Mumbai's Sardar Patel College of Engineering (SPCE).
The State of New Jersey was at one point part of the epicenter of the U.S. COVID-19 pandemic. How did the state's CISO approach business resiliency, digital transformation and the expanded threat landscape? In an exclusive one-on-one discussion, NJ State CISO Michael Geraghty discusses:
Michael Geraghty is New Jersey's Chief Information Security Officer and the first Director of the New Jersey Cybersecurity & Communications Integration Cell (NJCCIC). Director Geraghty is responsible for providing strategic vision, leadership, and oversight for cybersecurity across the Executive Branch of NJ State Government to ensure information security initiatives are aligned with the State's business goals and objectives. The Division of Cybersecurity focuses on identifying threats to State systems and assisting Departments and Agencies in managing risk to acceptable levels.
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear...
Alex is a Lead Security Solutions Engineer in the cloud security practice at Rapid7, where he partners with customers to help them ensure continuous security and compliance of cloud services during their digital transformation journeys. He has close to a decade of experience in the security space. Before joining DivvyCloud, Alex worked for several firms in the security and IT operations space, including Dome9 Security, SumoLogic, and Juniper Networks. Alex holds seven certifications including (ISC)² CCSP, AWS Solutions Architect, AWS DevOps Professional and AWS Security Specialty. He received his bachelor's degree from San Jose State University.
Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7
Jeremy Snyder is the Senior Director of Business Development and Solutions Engineering for the cloud security practice at Rapid7. He leads the company's solutions architect, partner and international teams. With prior experience at AWS (first field representative in Southeast Asia's ASEAN region) and REAN Cloud (later Hitachi Vantara), Jeremy's been working in the cloud since 2010. He has a BA (Ling) from UNC and an MBA GMU. Jeremy has lived in 5 countries and speaks several languages. He once went 3 days without seeing another human (lots of reindeer, though) and was kicked off a train in Sweden.
Verizon's 2020 Data Breach Investigations Report (DBIR) reveals that, across all industries, "inside actors" are responsible for nearly 1/3 of data breaches -- and the number is even higher in some industries. Join cybersecurity experts from Verizon for a look at how insiders can accidentally (or intentionally) cause...
Head | Research, Development, Innovation, Verizon Threat Research Advisory Center
John has over 17 years of experience investigating, and leading teams investigating, data breaches and cybersecurity incidents within the government and civilian security sectors. John is the creator and primary author of the Verizon Incident Preparedness and Response (VIPR) Report, the Insider Threat Report, and the Data Breach Digest.
Currently, John leads the Verizon Threat Research Advisory Center (VTRAC) Research, Development, and Innovation effort. In this role, he focuses on all aspects of cybersecurity incidents, performing digital forensic examinations, advising on data breach containment and eradication efforts, and creating data breach response preparedness training and breach simulation exercises for customers worldwide.
Prior to joining Verizon, John served 12 years with the U.S. Army investigating security-related incidents with eight years specifically focused on network intrusion investigations and forensic examinations. Using his knowledge and practical hands-on experience, John has provided cybersecurity advice, assistance, and formalized instruction to both technical and non-technical audiences. John has also authored or contributed to various policies, processes, procedures, and guides for incident response, evidence handling, and digital forensic examinations.
How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?
Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.
Director of Product Management at Cisco Cloud Security
Ryan is the Director of Product Management at Cisco Cloud Security. Based in Toronto Canada, Ryan is a highly focused Product Management professional with a comprehensive background in the Information Security industry, but in the end truly likes to tinker, break things apart and truly understand how things work and what makes things go.
When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised....
Paul is Vice President of Product Management for Digital.ai's security solutions. As a security researcher who has performed offensive security testing of facilities ranging from nuclear energy plants to hospitals, Paul has spent his career helping organizations better understand and address the inherent challenges around making software secure.
In terms of election cybersecurity, is the U.S. better off in 2020 than it was in 2016? Christopher Krebs, Director of the Cybersecurity and Infrastructure Security Agency, answers this question and more in an exclusive keynote that tackles:
The state of election security
Myths and realities about foreign...
Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security
Christopher Krebs serves as the first director of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA). Mr. Krebs was originally sworn in on June 15, 2018 as the Under Secretary for the predecessor of CISA, the National Protection and Programs Directorate (NPPD). Mr. Krebs was nominated for that position by President Trump in February 2018.
Before serving as CISA Director, Mr. Krebs was appointed in August 2017 as the Assistant Secretary for Infrastructure Protection. In the absence of a permanent NPPD Under Secretary at the time, Mr. Krebs took on the role of serving as the Senior Official Performing the Duties of the Under Secretary for NPPD until he was subsequently nominated as the Under Secretary and confirmed by the Senate the following year.
Mr. Krebs joined DHS in March 2017, first serving as Senior Counselor to the Secretary, where he advised DHS leadership on a range of cybersecurity, critical infrastructure, and national resilience issues. Prior to coming to DHS, he was a member of Microsoft's U.S. Government Affairs team as the Director for Cybersecurity Policy, where he led Microsoft's U.S. policy work on cybersecurity and technology issues.
Before Microsoft, Mr. Krebs advised industry and Federal, State, and local government customers on a range of cybersecurity and risk management issues. This is his second tour working at DHS, previously serving as the Senior Advisor to the Assistant Secretary for Infrastructure Protection and playing a formative role in a number of national and international risk management programs.
As Director, Mr. Krebs oversees CISA's efforts to defend civilian networks, manage systemic risk to National critical functions, and work with stakeholders to raise the security baseline of the Nation's cyber and physical infrastructure.
It's been a seismic year for the global economy, and now sector has been immune to the aftershocks. Where does this leave the cybersecurity marketplace, and what is the outlook for market growth and hot technologies as we approach 2021? In this exclusive session, Alberto Yépez of ForgePoint Capital shares insight...
Co-Founder and Managing Director, ForgePoint Capital
Alberto Yepez is one of the pioneers of the cybersecurity industry and has played significant roles as entrepreneurial and public company CEO, board member, angel and venture capital investor. He currently focuses on cybersecurity investments.
He serves on the boards of 4iQ (Chairman), AlienVault (Chairman), Attivo Networks, Bayshore Networks, BehavioSec, CyberCube Analytics, HyTrust, Mocana (Chairman), Mojo Networks, ReversingLabs (observer) and Uptycs. Past boards include BlueCat (acq Madison Dearborn), enCommerce (acq Entrust), Entrust (ENTU taken private), Neohapsis (acq Cisco), Qualys (QLYS), Solera Networks (acq BlueCoat), Third Brigade (acq TrendMicro), Thor Technologies (acq Oracle) & Vitria (VITR). He was angel investor in Apigee (acq Google), Palerra (acq Oracle) & Securant (acq Cisco).
Yepez has previously held senior leadership roles at Apple & Oracle, was consultant to the US Department of Defense (DeVenCI), member of the Board of Trustees of the University of San Francisco and of the Technology Pioneers Global Community of the World Economic Forum. He is a member of the Board of the National Venture Capital Association (NVCA) & Chairman of the Board of the Hispanic IT Executive Council (HITEC).
Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always...
Ran Shahor is a Brigadier General (Ret.) who founded the leading edge Cyber Security program of the Israeli Defense Forces Intelligence branch and is considered one of the worlds top Cyber Security experts . After 27 years of military service, Shahor took upon himself multiple senior leadership roles in the private sector. Prior to co-founding HolistiCyber, he was the founder and the Co-CEO of Focal energy as well as Managing Partner of Star Ventures, a $1 billion global venture capital group. He started his career in the elite IDF special forces unit "Sayeret Matkal" which he also commanded.
Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow's security executives when today's well-known security talent deficit makes it difficult to fill even the most basic roles?
Sam Curry currently servers Chief Security Officer for Cybereason. Previously, he served as Chief Technology and Security Officer at Arbor Networks, where he was responsible for the development and implementation of Arbor's technology, security and innovation roadmap. Prior to that role, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management positions, including Chief Strategy Officer and Chief Technologist and Senior Vice President of Product Management and Product Marketing. Curry has also held senior roles at Microstrategy, Computer Associates, and McAfee.