Boston 2018 AGENDA
Over the past year, technology and the IoT has exploded - and security challenges are only becoming more fluid. For organizations to stay at the apex, collaboration with the best minds in the space and a future-forward mindset is more important than ever. The 2018 Summit Topics are developed with CIOs, CISOs and executives and provide a tremendous amount of value to those who are looking to understand best practices in IT. The peer-to-peer Executive Roundtable Sessions have proven to be an exceptional resource for executives- providing real answers to issues facing their organizations and the industry.
9:10am – 10:00am
Mindset…this team knows it can deliver. What does it take to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way? Join Doug and his team as they discuss the traits that make up an "A" team.
At Nuance, people and our technology have pioneered the highest functioning speech software in the world, perfecting the ability for machines to recognize and emulate the human voice.
Featuring Nuance team members:
10:00am – 10:30am
Complete Lifecycle Approach to Advanced Threat Protection
Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to detect today's advanced threats. This defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. This session will provide insights into how this approach will empower your organization, enabling you to adopt the best new technologies that drive your business.
10:30am – 11:10am
11:10am – 11:30am
The Shift in Information Security
From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations. This discussion, with Fabio Martins of Partners Healthcare, focuses on some of the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.
11:30am – 12:00pm
Behavior analytics tools provide valuable insights, but lack ability to enforce protection policies. This session explores operationalizing CARTA by integrating analytics with other security technologies, for example: UEBA/DLP solutions for Adaptive Data Insights and UEBA/Endpoint Collection for Adaptive User Insights.
12:15pm – 12:35pm
Cloud Security: The Art of Securing the Perimeter When There's No Perimeter.
Securing the cloud is more challenging than securing an on-premise infrastructure. How do you secure what you don't own? How do you secure external services your business users may be subscribing to without your knowledge and authorization? How do you maintain compliance when multi cloud providers are part of your ecosystem? Who owns the security responsibility for different services offered? This session will focus on effective security approaches to these variables.
12:35pm – 12:55pm
National Policy and Legal Issues
This interactive session will focus some of the top issues facing companies and their security teams.
They Say Breaches are Inevitable… Now What?
Changes in threat landscape, data gravity, expanse of the attack surface, and human capital have forced us to take a hard look at “Tried and True” security tools and techniques.
Lunch and Networking
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
Senior Management’s Toughest Questions
Discussion on CISOs accountability and how they are responding.
The current state of security affairs is... odd. Home routers are attacking work routers. Credentials are being dumped daily onto public forums because dark nets are too slow. These things are being accomplished with bot swarms. These bots use very unsophisticated attacks automated by very sophisticated analytics and control networks. Dogs may soon lie down with cats (apologies to Ghostbusters)! There must be a way to fight this level of automation. Corporations require an edge that many today do not enjoy. This presentation discusses the emergence of ANNiMLS (Artificial Neural Networks integrated Machine Learning Systems), the use of easy automation, machine intelligence, and good robots against bad robots.
Executive Breakout Roundtable Discussions with Debriefs