Wednesday, November 8, 2017 | 7:30AM to 6:00PM | The Westin Copley Place, Boston | 10 Huntington Ave Boston, MA, 02116
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:00 — 08:30
Morning Security Briefing: The FBI & Cyber Threat
Agent Manes will be discussing the cyber threats the FBI investigates as well as details that shape how the agency operates and prosecutes investigations.Presented by J.R. Manes, Special Agent, FBI
08:30 — 09:00
Morning Keynote with Plixer: Advanced Security Analytics: NetFlow and Metadata for Incident Response
Your organization is valuable, and the cyber criminals know it. Malicious actors constantly attempt to exploit users for privileged access to your enterprise network. Recognizing the anomalous network behavior that occurs when threats breach traditional security architecture is very difficult. Flow and metadata collection from your existing network coupled with Network Traffic Analytics delivers powerful and actionable insight into network and security incidents.
In this session, learn how you can:
Reduce complexity of advanced threat protection solutions
Leverage your network as a sensor to visualize and manage the entire attack continuum
Utilize Cisco AVC, IWAN, ASA with FirePOWER, and ISE data exports to reduce risk
Achieve faster time-to-resolution with Splunk, QRadar, Elasticsearch, and ArcSight integration
Plixer Discussion: Pivoting During the Hunt for Malware Plixer
You have lots of security-related data, and it’s not all created equal. Effective threat hunting and incident response require you to pivot quickly and efficiently between the low- and high-fidelity data that exists across firewalls, intrusion prevention systems, security information event management platforms, flow collectors, etc. Understanding the common data elements across these disparate systems allows your team to efficiently pivot from low fidelity data used for rapid root-cause analysis to high-fidelity data that can be a means of conviction.
In this session, we will:
Explore examples of low, medium and high fidelity security data
Define data pivots and provide real-world examples
Discuss the steps for creating pivot tables
Demonstrate how data pivots greatly improve incident response
@RISK Technologies Discussion: Using Artificial Intelligence to Thwart Cyber Threats and Proactively Protect the Enterprise
All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard.The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.
Exhibitor Technology Showcase & Business Meetings / Networking
10:30 — 11:00
Darktrace Discussion: Unsupervised Machine Learning: A New Approach to Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
How new machine learning and mathematics are automating advanced cyber defense
Why full network visibility allows you to detect threats as or before they emerge
How smart prioritization and visualization of threats allows for better resource allocation and lower risk
Real-world examples of unknown threats detected by ‘immune system’ technology
PANEL 1: The Compliance Nightmare: No One Gets Extra Points for Spending More to Pass and Audit
All auditors want one thing: Compliance. And the list of requirements isn’t a short one–it can include operational/security policies, regulatory mandates, industry standards, software patches, software license agreements and more. Adding to the complexity is the push for greater compliance–especially for security and patching–at a lower run rate on a mounting population of Windows, Mac and *nix endpoints. This is particularly true given the recent and highly damaging WannaCry and Petya attacks, which preyed on unpatched or non-compliant endpoints. This panel will discuss the challenges of meeting security compliance issues and key imperatives of keeping enterprises and their endpoints continuously patched, secure and compliant in today’s volatile world. We’ll also share tips on how to identify threats that are most relevant to your organization, and how to remediate them faster.
Kroll Discussion: Be Cyber Resilient – Mitigate Risk with a Proactive Approach to Cyber Security
With the ever-increasing rate of cyber incidents, today’s cyber security leaders are facing an equally substantial shift: Prevention is not enough, nor is it realistic – at some point, a cyber incident will occur. The organizations that have accepted this reality are morphing into a state of resiliency. Cyber Resilience is the ability to operate and recover from a cyber incident with the most minimal impact to the business. Resilience is not inherent to organizations and is attained through strategic planning, ongoing communication, collaboration and nimble tactics in order to operate fluidly in today’s cyber risk landscape.
In this session we will:
Explore how to develop a cyber resilience strategy
Identify the necessary proactive steps to move from a reactive to resilient approach
Define the organizational characteristics needed to foster a continued state of Cyber Resilience
Proofpoint Discussion: How to Fight the Next Generation of Targeted BEC Attacks
Highly targeted, low volume spear phishing – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of these imposter attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload, but things are changing. New email authentication technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
Join Proofpoint as we dive into tactics to help you:
Eliminate the impact of email fraud
Gain granular visibility across your email ecosystem
Brinqa Discussion: Case Study – Building a Comprehensive Cyber Risk Program through Effective Vulnerability Management
In this session, we’re going to discuss how Brinqa customers are creating a new breed of cyber risk intelligence programs by making vulnerability management a central focus of their efforts.
These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration and correlation of data from multiple sources, prioritization of vulnerability and asset risks, creation and management of tickets based on optimal remediation strategies, or representation and distribution of real-time metrics and KPIs. By extending these core capabilities to additional sources of security data – asset inventory, network management, web application scanning, BC/DR, policy compliance, IDS/IPS, change and configuration management, directory services, SIEM, etc. – these programs are providing security analysts, business owners and executives with actionable insights that were previously unattainable.
Exhibitor Technology Showcase & Business Meetings / Networking
03:30 — 04:15
PANEL 2: What Emerging Risks Are Likely To Become Major Threats Facing IoT and Big Data? What New Countermeasures & Cutting Edge Technologies Are Available For Defense?
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
PANEL 3: Protecting Your Enterprise from Corporate Espionage: Keeping Insider Threats Outside
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.