This year's wholesale shift to online channels has not gone unnoticed by cybercriminals. Today fraudsters are continually evolving their online schemes, calling upon a sophisticated suite of tools that include human-powered click farms, social engineering, and malware - all designed to defeat traditional defenses ...
As businesses and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter this "pandemic rebuilding period", especially when it comes to reviewing third-party agreements and managing emerging technologies? Join this exclusive panel for unique insight ...
Everything has changed. Organizations have quickly pivoted towards the "new norm", adopting new practices and new technology solutions to support the business. Security multi-year strategies have not caught up. This new norm introduced new security threats to an already crowded threat landscape at a time when ...
Threats continue to evolve in complexity at unprecedented rates, making it a challenge to identify legitimate threats and respond timely. Having a threat management approach is key and infused with AI and Machine Learning, we can make decisions faster, identify threats earlier, perform investigations better, and begin ...
Outdated threat hunting procedures hold your security program back - both in the time it takes to seek out attacker behaviors, and the level of effort involved to ascertain whether the threat still persists. In this talk, Samer Faour of Exabeam will explain how to modernize and galvanize your threat hunting program ...
When attackers have a 95% success rate, it's not a matter of if but when they are coming in the door. Why? The traditional product-centric security paradigm is contributing to the near record number of infrastructure compromises and data breaches. Today's distributed work environment requires modern cybersecurity that ...
As businesses accelerate their migration of core processes and data to the cloud, security remains a top consideration. Security concerns remain the #1 roadblock to cloud adoption. Despite that, the migration continues as organizations seek to gain the benefits of scale and flexibility. But managing the security of ...
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as ...
You rapidly upgraded your infrastructure and systems to support the largest teleworking experiment in history. Now, people are accessing sensitive data remotely, your workforce is in transition, your cloud journey is accelerating, and your non-human workers are multiplying. How will you validate users and access for ...
Lessons learned from the past will help us secure the future. As the world is migrating their applications to new hemispheres and the weight of internet is becoming dominant in their business practices, bad actors are smelling the new opportunities and new attack vectors are forming as a dark storm cloud menacing the ...
The data speaks for itself. In our analysis of over 85,000 applications, more than 500,000 open source libraries were in use. This trend is clearly here to stay and only growing, but what does it mean for your organization? In this discussion, Brittany O'Shea, Global Product Strategist for Veracode, tells us what Open ...
It's been one of the byproducts of 2020's accelerated digital transformation: IT teams are migrating greater numbers of critical applications to the public cloud to gain the obvious business benefits of scalability, availability and agility.
But what's not always so obvious: The cloud security strategies and tools ...
It's a given that current economic conditions will result in - at best - "conservative" cybersecurity budgets in 2021. And yet it's also fact that cybersecurity is one of the most important business/government functions, and security leaders are in unique positions to influence policy and spending. How can they best ...
The Department of Homeland Security and FBI have their eyes and hands on election cybersecurity, but who's paying attention to securing the actual campaigns? This is the purview of the newly-chartered U.S. CyberDome. In this exclusive session, U.S. CyberDome Executive Director, Brigadier Gen. Francis X. Taylor (Ret.), ...
The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:
How NIST approached remote deployment
Rob Roj, Senior Solutions Architect at Shape Security, has over 20 years of early stage start up experience with over 7 years within the Cybersecurity and Identity space. He has been with Shape when there were only three customers and has consulted with F500 companies
Sunil Chand is a security management professional with more than 20 years of experience. Prior to joining Grant Thornton LLP, he held the role of Director, Information Security Consulting Services for TELUS Security and Chief Information Security Officer for a number of other organizations. Furthermore, he has developed and executed go-to market strategies for Governance, Risk and Compliance and Threat and Vulnerability Assessment services, corporate information security strategies aligned to organizations' business goals, among other recognized accomplishments.
Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada's operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Zatezalo is best known for creating value through collaborative leadership style, agile execution, and for her global cyber security expertise. Up until joining Huawei Canada, she was responsible for cyber security governance, management and operations within an international communication provider operating in Canada, US, UK and France, and was a member of Canadian Security Telecommunication Advisory Committee.
Yaz Alattia leads Accenture Security's Canadian practice, overseeing the full spectrum of Accenture's end-to-end cybersecurity offerings, including cyber strategy and risk, cyber defense, digital identity, cloud security and managed security services. Yaz has nearly two decades of experience in building, assessing, transforming and executing enterprise security programs and solutions that balance protection with agility.
Prior to joining Accenture, Yaz held various cyber security leadership positions including most recently as Chief Information Security Officer at Canada's largest payment provider. Prior to that, Yaz delivered cybersecurity and technology risk consulting services to security and technology teams in over 11 countries and across various industries.
Based in Toronto, Yaz holds a Bachelor's Degree in Electrical Engineering from McGill University holds a number of security, technology and management certifications including CISSP, CCSP, PMP, CISM, CISA, SABSA SCF and ISO27001 LA.
Associate Partner, Security Intelligence and Operations Consulting, IBM
George leads the IBM Security Intelligence and Operations Consulting practice in Canada. He has over 15 years of extensive experience in security operations working with partners and clients across North America and Europe. As a lead practitioner and subject matter expert, George works directly with organizations in a wide range of industry segments implementing technologies, including SIEM and SOAR, processes, organizational structure, and governance to manage cybersecurity threats and mitigate risk with quantifiable measures. Currently, George is collaborating with global teams to re-align threat management approach specifically for Cloud operations.
Faour is an Information Security and Risk Professional at Exabeam, with over 11 years of experience in information security, risk management, and consulting.
He has a breadth of experience in variety of vertical industries covering various stages of the security lifecycle from designing and architecting solutions as a vendor/consultant, to implementing and operationalizing them as a consultant/SI/MSSP, to using them on a daily basis as a customer/end-user.
Mr. Faour is a professional engineer with an M.Eng. Degree in Integrated Security Technologies and Policies from the University of Toronto, and has several certifications including CISSP, CEH, CIH, A+, and many vendor certifications.
Chief Security Strategist and Trust Officer, Forcepoint
Myrna Soto is a Partner at ForgePoint Capital, serving as a member the group's Capital Investment Team. Her responsibilities include organizing and continuing to develop the ForgePoint Advisory arm of advisors that includes, the CISO, CIO, CTO communities. Prior to joining ForgePoint Capital, Soto served as Corporate SVP & GCISO (Global Chief Information Security Officer) for Comcast Corp. In this capacity, she was responsible for all security & technology risk management for the Enterprise. Her focus was to develop and maintain the highest standards of Cyber Security, network/infrastructure security, product security, data security strategies, operational efficacy of security programs, policies, and technology risk management that protect the interests of Comcast's customers, employees, critical technology assets, company brands and other critical stakeholders. Prior to joining Comcast, Soto served as CISO & Vice President of Information Technology Governance for MGM Resorts International where she was responsible for Information Security, IT Audit & Compliance, Business Analysis, PMO and the development of a Six Sigma practice. She previously held senior leadership positions with American Express, Royal Caribbean Cruise Line, Norwegian Cruise Lines and Kemper Insurance.
Principal Technologist, Thales Cloud Protection & Licensing
Cates is the Principal Technologist in the CTO Office at Thales Cloud Protection & Licensing. Cates is focused on bringing new innovations to market focused on the "underlying problems" of the industry and providing security solutions to the security professional to help them be successful in today's challenging environment which they often have very little control over. As a former CISO and CIO, Cates has a unique perspective on how technology, people, process and governance impact how successful security teams can solve real-world problems. With more than 20 years of experience rooted in the intelligence community and enterprise organizations, he is sought after to speak publicly on a wide range of technology, regulatory and strategy topics.
Vice President of Security Solutions, Check Point Software Technologies
Avi Rembaum currently serves as Vice President of Security Solutions for Check Point. In this role, he is responsible for the company's solution center, incident response team, strategic alliance program and security architecture function. Previously, Rembaum was responsible for the company's business relationships with the Tier-1 Telcos in North America. Rembaum first began working in the information and network security industry in 1997, when he joined RADGUARD's marketing team. He also held product management positions at RedCreek and SonicWALL and practice manager roles at RedCreek and Getronics, now CompuCom.
Smith is field chief technology officer (Field CTO - US East) with RSA, a Dell Technologies business. With 25 years of experience in the information security, networking and telecommunications industries, he regularly consults on RSA's strategic vision around architecture and technical roadmaps for the company's security and risk management solutions. His prior employers include UUNET, CSC and the US Government, along with several technology-oriented startups. He holds the CISSP and CRISC certifications, and has presented on RSA's behalf, both domestically and internationally, at cybersecurity events sponsored by Gartner, FS-ISAC, IANS, CERT/SEI, ISSA, (ISC)2, ISACA, RMA, BSides, InfraGard, HTCIA, ICI and other organizations.
As Threat Intelligence Director for Radware, Pascal helps execute the company's thought leadership on today's security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.
Brittany is a Global Product Strategist at Veracode. She is passionate about helping developers and security professionals navigate emerging threats, regulations and security trends to help organizations and their applications thrive in today's complex digital world. Before joining Veracode, she worked in various roles at RSA and IBM Security globally with the mission to support customers raise their security posture.
Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
A former NSA crypto-engineer, Sabett brings to Cooley LLP his extensive experience in data security, privacy, licensing and IP. Sabett has managed numerous data breach responses involving major retailers, financial and healthcare organizations, and on-line service providers. He served on the Commission on Cybersecurity for the 44th Presidency and has been recognized as a leader in privacy and data security in the 2007-2014 editions of Chambers USA. Sabett is a member of the board for the Georgetown Cybersecurity Law Institute and the Northern Virginia chapter of ISSA. He also is a frequent lecturer and author, and has appeared on or been quoted by a variety of national media sources.
Cameron Smith is a Director of Product Management at Gigamon, responsible for the cloud and virtualization portfolio. He is also co-chair of the Security as a Service working group at the Cloud Security Alliance. Beginning with his first product management role in network security over 20 years ago, he has been working on Cloud, Security, or both ever since. Cameron is a graduate of Yale University.
Anderson is a seasoned executive with a proven track record of establishing collaborative teams and state-of-the-art programs for both private and public organizations. His inspirational leadership, technological depth and emotional intelligence help him to drive business objectives, while building alliances. Michael is admired for his analytical acumen, attention to detail and for being an excellent listener. As an entrepreneur, Mr. Anderson provides security advisory services and security practitioner mentoring for students and professionals across North Texas. Leaders and friends characterize him as confident, results-oriented, congenial and patient; able to make difficult concepts easy to understand.
Currently, as the CISO for Dallas County; the eighth largest County in the United States, he oversees the Information Technology (IT) security program for approximately 6800 County employees and the electronic records for over 2.6 million residents. Using NIST 800-53 and 800-30, Michael is currently in the process of building an IT security practice for Dallas County that will become an exemplar for other Counties. While serving as the Head of Enterprise Security at BenefitMall, he transformed people, processes and technology converting a young security program to one of praise as stated by EY and other AICPA auditors.
Michael earned an MS in Information Systems and Management from Capella University. He served in the Army for 10 years and brings 20+ years of strategic and tactical expertise within the security, infrastructure, application development and business intelligence disciplines. Michael has active memberships with ISC2, MS-ISAC, GMIS, Evanta, ElevateIT, FutureCon and InfraGard where he enjoys sharing his experiences through various speaking engagements.
Chuck Brooks a globally recognized thought leader and evangelist for Cybersecurity. LinkedIn named Chuck as one of "The Top 5 Tech People to Follow on LinkedIn." He was named by Thompson Reuters as a "Top 50 Global Influencer in Risk, Compliance," and by IFSEC as the "#2 Global Cybersecurity Influencer." He is also a Cybersecurity Expert for "The Network" at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to FORBES. He has also been featured author in technology and cybersecurity blogs by IBM, AT&T, Cylance, and many others.
In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill. In local government he also worked as an Auxiliary Police officer for Arlington, Virginia.
In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations.
In academia, Chuck is Adjunct Faculty at Georgetown University's Applied Intelligence Program and graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity. He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
In media, Chuck is the featured Homeland Security contributor for Federal Times, featured cybersecurity contributor for High Performance Counsel on cybersecurity, and an advisor and contributor to Cognitive World, a leading publication on artificial intelligence. He has also appeared in Forbes and Huffington Post and has published more than 180 articles and blogs on cybersecurity, homeland security and technology issues. He has 59,000 followers on LinkedIn and runs a dozen LI groups, including the two largest in homeland security.
Jim Richberg's role as a Fortinet CISO leverages his 30+ years' experience leading and driving innovation in cybersecurity, threat intelligence, and cyber strategy & policy for the US Government and international partners.
Prior to joining Fortinet, he served as the National Intelligence Manager for Cyber, the senior Federal Executive focused on cyber intelligence within the $80B+/100,000 employee US Intelligence Community (IC). He led creation and implementation of cyber strategy for the 17 departments and agencies of the IC, set integrated priorities on cyber threat, and served as Senior Advisor to the Director of National Intelligence (DNI) on cyber issues. He brings a broad enterprise-level approach to cybersecurity honed as a member of the Executive team which created and oversaw implementation of the multi-billion dollar whole-of-government Comprehensive National Cybersecurity Initiative (CNCI) that generated new Government cyber capability and enhanced cybersecurity in the private sector and critical infrastructure.
Mr. Richberg's broad operational experience -including his 20 years at CIA-- gives him practical insight into difficult cyber problems ranging from advanced threat capabilities to supply chain integrity and election security. He has extensive experience engaging with audiences ranging from Heads of State and CEO's to analysts and IT staff. He brings a strong focus on strategic problem solving (identify and solve the key problem vs. the most visible one) and on framing complex problems in comprehensible terms that facilitate analysis and formulation of solutions.
Brigadier General Francis X. Taylor (Ret.) currently serves as President and CEO of FXTaylor Associates, LLC in Washington DC. After he retired from active duty, General Taylor was nominated and confirmed as US Ambassador at Large and Coordinator for Counterterrorism (2001 to 2002) and Assistant Secretary of State for Diplomatic Security and Director of the Office of Foreign Missions (2002 to 2005). On leaving government, he became VP and Chief Security Officer for the General Electric Company managing security operations and crisis management globally until accepting the nomination as Under Secretary for Intelligence and Analysis for Department of Homeland Security in April 2014. In this role, he was charged with providing the Secretary, DHS senior leadership, the DHS components, state/local, tribal and private sector partners with the homeland security intelligence and information required to keep the country safe, secure and resilient. Mr. Taylor was also a member of the US Privacy and Civil Liberties Oversight Board from 2006 to 2010. .
Director, National Cybersecurity Center of Excellence, NIST
Greene is the Director of the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST). The NCCoE is a collaborative hub where industry, government agencies, and academic institutions work together to identify pressing cybersecurity issues and to develop practical cybersecurity solutions to address them. Prior to joining NIST, Jeff was the Vice President of Global Government Affairs and Policy at Symantec, and served as an appointed member of NIST's Information Security and Privacy Advisory Board from 2015 to 2020. He was also a special government employee at NIST supporting the President's 2016 Commission on Enhancing National Cybersecurity. Before Symantec Jeff worked on both the House and Senate Homeland Security Committee.