9:00am – 9:30am
Predicting the future in information security is difficult and risky, because of the complexity of our infrastructures, and because hackers prefer to be unpredictable. But these two factors – complexity and unpredictability – can actually guide us in how we approach the future of securing our data. Note: unpredictable and complex things may happen in real time during this presentation.
9:30am – 10:00am
Guiding Information Security into the Future
This interview session with Jeff Schilling, CISO at Epsilon, and Mary Dickerson, CISO at the University of Houston, will focus on key skills needed by leadership to move security organizations forward, what will set CISOs apart in the future, and provide insight into what they are doing to overcome some of the biggest challenges facing the industry.
10:00am – 10:30am
Identity at the Center
The expression, "Identity at the center of IT Security", is becoming quite common, but what does this really mean? In this presentation, we'll discuss the meaning of the expression, how to achieve it, and why it is an essential part of any IT Governance and Administration program.
10:30am – 11:10am
11:10am – 11:30am
The Breach Anxiety in Information Security
The unknown in information security is any CISO’s worst nightmare. Despite best efforts, security breaches continue to go undetected. This interview session, with Duaine Styles, CISO of Torchmark, will shed light on best practices as they move forward to address people, processes and technology to shore up defenses.
11:30am – 11:45am
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
12:00pm – 12:15pm
Man + Machine is the Winning Combo for Combatting Cyberthreats
Time is the most important factor in detecting network breaches. To protect key assets from being stolen or damaged, cyber attackers must be detected in real time. To build the fastest and most efficient processes, it makes sense to combine man and machine allowing each to focus on what they do best.
12:15pm – 1:30pm
Recap of the Day So Far
Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.
Privilege – The New Cyber Battleground
Traditionally, much of the focus of a corporation’s InfoSec efforts have been placed on ensuring that the perimeter is secure. Recent attacks have shown an alarming shift from perimeter-based attacks to ones that originate inside the corporate network using privileged accounts. Forrester estimates 80% of security breaches involved privileged credentials – and the privilege attack surface only continues to grow. Once hackers establish a privileged foothold, they gain unfettered access to elevate privileges and move about the network freely without detection. Understanding this widely used method of attack is essential to developing ways to mitigate the risk.
Cyber Intelligence – Forward Thinking
With experts predicting an increase in the impact and frequency of cyber threats, Special Agent, Miguel Clarke with the FBI, will provide insight into areas of focus, the challenges he sees, and recommendations on moving forward.
Breakout Executive Roundtable Discussions with Debriefs
Breakout sessions with your peers on topics determined by attendees during registration, followed by debriefs of table discussions.
Topic #1: Security Analytics & Threat Intelligence – Maturing the Environment
As security organizations have more access to technologies that allow them greater insight, analysis, intelligence and forecasting capabilities, the focus now sharpens on how to formally leverage these technologies to show results for the investments made.
Topic #2: Biometric Technologies
There are big implications for security and privacy as this technology emerges, with relevance in user verification, marketing, and personalized advertising, as examples.
Topic #3: Information Risk Management Programs…Forward Thinking
Cyber security readiness continues to evolve at a rapid pace as changes in the threat landscape forces organizations to be more vigilant than ever before. In turn, the evaluation and prioritization of risk has taken on more importance to the business in order to make the right decisions.
Topic #4: Blockchain
The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene! It is used in financial management services, logistics management, medical records, etc. Can a transaction be securely verified without the identity of the user being captured?
Topic #5: CISOs as the Strongest Link
Relationships and communication with a network of people is key in preparing for a breach. The CISO often has the best view of their organization’s weaknesses and impacts in case of a breach that allows them to take a leadership role.
Topic #6: GDPR
The regulation will become enforceable on May 25th, 2018
Topic #7: Measuring Security as a Business Value
Quantifying and proving the value of security to your CEO and business units is difficult.
Topic #8: Situational Awareness
Understanding your environment and accurately predicting and responding to potential problems that might occur is what many security leaders are now focused on.
Topic #9: Strategic Vendor Partnerships for the Future
More security organizations have made a commitment to building strategic relationships with vendors in order to leverage their experience and expertise in solving specific challenges.
Topic #10: Forward Thinking Security Organizations
With the introduction of new technologies that allow a business to diversify in ways never contemplated before, security organizations have immense challenges. In engaging with the business units, security organizations face the dilemma of not only having to understand where the business is headed into the future, but also putting together content that is relevant to help them in their decision making and providing insight into accountability and impacts.
Topic #11: Security Awareness Investment…is it Worth it?
Increased spending on security awareness training for employees is expected to continue at a fast rate in the future. The question being asked by senior management is often “are our employees getting better at understanding our security posture in protecting our company?”