agendas - information security summit · 2019-08-26 · aligning app sec with digital...
TRANSCRIPT
Agendas:
* Monday: Professional Training / OCITA / CSO Xchange* Tuesday: Professional Training / Career Connection / NOCHE / EnergyTech* Wednesday: 17th Annual ISS Day-1 / EnergyTech * Thursday: 17th Annual ISS Day-2 / EnergyTech* Friday: 17th Annual ISS Day-3 / EnergyTech
7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1
2
3
Café'
5
8
LUNCH - Concourse
11
12
18
19
20
26
Grand Ball-room
Brian Kelley Jeremy Mio, Information Security Officer
Ohio Turnpike Cuyahoga County
Technology Break / Visit with our SPONSORS.
17
SPONSOR ROOM - RED SEAL
Danilo Casino - Technology Strategist
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
SPONSOR ROOM - IBM
✘ceptional Networking.
SPONSOR ROOM - LOGICALIS
Oracle Database Security Master Class
Daniel MorganDBSecWorx
OCITA - KEYNOTE ADDRESS
Ervan Rodgers, II
CIO - State of Ohio
LUNCH - Concourse
Break with our SPONSORS.
LUNCH - Concourse
LUNCH - ConcourseIntroduction to Malware Analysis
SPONSOR ROOM - TENABLE
21
Jerod BrennenBrennen Consulting
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
OCITA Program
24
OCITA Program
Tom Fisher, Enterprise GIS Applications Admin.
The SUMMIT 2019 Gold Sponsors:
RESERVED FOR ENERGYTECH
Professional ✘clerator Training Day
AM PMRoom #
Monday, October 21
16
The I-X Center - Cleveland
SPONSOR ROOM - OKTA
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
10
Steve Hunt
Microsoft Technology State & Local Govt
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
CSO ✘change Fall Meeting CSO ✘change Fall Meeting
HBI Principal, Director, ISSA Distinguiished Fellow
Correction From Collaboration
Tyler HudakTrustedSec
Introduction to Malware Analysis
Tyler HudakTrustedSec
Open Source Intelligence (OSINT) Gathering Essential Training
Jerod BrennenBrennen Consulting
Oracle Database Security Master Class
Daniel MorganDBSecWorx
Open Source Intelligence (OSINT) Gathering Essential Training
OCITA Program OCITA Program
Cuyahoga County
SPONSOR ROOM - HURRICANE LABS
SOCC - Gov't Services Beverlyn Johns,
Business Transformation
Pgm. Mgr. / DAS
Surprising Secrets of the Most Cyber Resilient Orgs
7:30 8:30 8:45 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1
2
3
Café'
4
5
8
11
12
Employers:
ODHE: New Incumbent Worker Training Initiatives
Cheri RiceODHE
Main Hallway
18
19
20
Employers:
Ohio Department of Higher Education
(ODHE)
Cheri Rice / ODHE
26
Grand B'room
CAPTURE THE FLAG!
10ENERGYTECH ENERGYTECH ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAME
The SUMMIT 2019 Gold Sponsors:
CAREER CONNECTIONTuesday, October 22 - SPONSORED BY CUYAHOGA COMMUNITY COLLEGE
The I-X Center - ClevelandCorrection From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
✘ceptional Networking.
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
CAPTURE THE FLAG
Brought to you by: Baldwin Wallace University
LUNCH - Concourse
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
21
Passport to IT Careers for High School Students
17
SPONSOR ROOM - RED SEAL
SPONSOR ROOM - HURRICAN LABS
SPONSOR ROOM - IBM
Innovations and Alignment in Cybersecurity Education
Presented by NOCHE and NEOCC
Regional IT Educators Consortium Inaugural Meeting
Presented by RITE
Meet the Professionals Speed Networking
Organized by RITE
Supported by NOCHE
Oracle Database Security Master Class
Daniel MorganDBSecWorx
Oracle Database Security Master Class
Daniel MorganDBSecWorx
High School Sudents: NEO Passport Employer Showcase - Organized by RITECollege/University Students: Linking IT Talent to Opportunity Internship and Job Fair. Presented by Business Growth and Development
Services at GCP and NOCHE
24
PRESENTER NAME PRESENTER NAME
Introducton to Malware Analysis
Tyler HudakTrustedSec
Introduction to Malware Analysis
Tyler HudakTrustedSec
PRESENTER COMPANY PRESENTER COMPANY
RESERVED FOR ENERGYTECH
LUNCH - Concourse
C/U Faculty & Staff ONLY: College / University Students: College / University Students: College / University Students:
22ENERGYTECH ENERGYTECH
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
RESERVED FOR ENERGYTECH
SPONSOR ROOM - LOGICALIS
PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
PRESENTER NAME PRESENTER NAME
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY
PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
Aligning Opportunities Report and Discussion
How to Get Future Ready
Presented by TeamNEO Presented by RITE HR IT Roundtable
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAME
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
ENERGYTECH ENERGYTECH
Rev Up Your Technology IQ!
Presented by RITE and CIO Forum
College / University Students:LUNCH -
Concourse
High School Students:
Presented by RITE
LUNCH - Concourse
College/University Faculty & Staff + Employers: C/U Faculty & Staff ONLY:
COLLEGE / University Students + Employers:
Linking Talent to Opportunity in IT Internship and Entry-Level Job Fair
Presented by Business Growth and Development Services at GCP and NOCHE
PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAME
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY
13-14
7
15-16
Rev Up Your Technology IQ!
Presented by CIO Forum and RITE
HS / College / University Faculty: HighSchool Faculty Only:
High School Students:
Passport to IT Careers for High School Students
Presented by RITE
College / University Students:
ENERGYTECH ENERGYTECH
PRESENTER NAME PRESENTER NAME
Incorporating CoolTech Challenge into Your Classroom
Presented by RITE
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
ENERGYTECH ENERGYTECH
Brought to you by: Baldwin Wallace University
9ENERGYTECH ENERGYTECH
7:00 8:00 8:30 9:00 9:30 9:45 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1
2
3
Café'
4
5
6
8
11
12
18
19
20
26
Grand B'room
EnergtTech Opening Remarks
M. Jenning-Bates / PAL-V
ISS / EnergyTech Announcements,
Partner Message and Keynote Introduction
SPONSOR ROOM - HURRICANE LABS
Bob Kalka
IBM
Capturing the Bayrob Group!Ulmer Panel Discussion
The California Consumer Privacy Act: Implementing Sustainable Compliance
Solutions
Ryan Macfarlane / Duncan Brown
BREAK Visit the Café
PRESENTER NAME Steven G. Stransky
Technology Concepts & Design, Inc. (TCDI)FBI - Supervisory Special Agent / US
Assistant Attorney Ulmer Berne, LLP Thompson Hine LLP
Tyler Hudak, Steve Stransky, Josh Kelley, Paul Sems, Ned Sherry
Pam Gerber, Todd Riley, Billy Heiser, Rockie Brockway, Stephen Marchewitz
Alex Hammerstone, Bob Salandre, Steve Stransky, Rockie Brockway
PRESENTER COMPANY PRESENTER COMPANYPRESENTER NAME
Correction From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
MANUFACTURING Tra✘ - TrustedSec
KEYNOTE ADDRESS: Dr HH Schmitt
SPONSOR ROOM - READ SEAL
SPEAKER READY ROOM
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
9
KEYNOTE ADDRESS: Joe Weiss
KEYNOTE: Top Cybersecurity Issues when Migrating to the Cloud
RESERVED FOR ENERGYTECH
Break with our SPONSORS.
KEYNOTE ADDRESS
Joe Weiss
Break with our SPONSORS.
Larry Cox Joshua Skeens Steve Bryant Tom Hardin
SonicWall GATE, LLC. Franciscan Alliance
Loren W. Wagner
Symantec CentraComm CentraComm
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Break with our SPONSORS.
Announcements, Partner Message and Keynote Introduction
10Super Charge Your Cybersecurity Career Cyber Defense….Try Offense Top 5 Quick Wins in Cybersecurity Essentials Next-Gen SOC - A Case Study at Palo Alto
Steven Hunt Tony Pietrocola Chad Voller / Bryan Smith Kevin FlanaganHuntBI Agile1 BMF Cyber Technology Group Palo Alto Networks
BREAK Visit the Café
Aligning App Sec With Digital TransformationO365 Hijacking and Best Practices to Protect
Yourself
LUNCH - Concourse
The Impossibility of Security IAM SystemsCyber Incident Response- Addressing the
Concerns of the Business
13-14
Security Built On 1 Simple Premise – Trust No One
Business Cyber Survival: Are You at Risk?
LUNCH - Concourse
Business Cyber Survival: Are You at Risk?
Drew Vanover Loren W. Wagner
David Kennedy
Challenges Facing Manufacturers - Attack Landscape, Recent Breaches, etc.
Building an IR Program
TrustedSec
Incident Response: Under the Microscope
16
Timothy M. Opsitnick
LEGAL and COMPLIANCE Tra✘ - Ulmer LEGAL and COMPLIANCE Tra✘ - Ulmer
22
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
17
An Introduction to FAIR – Cyber Risk Quantification
Anatomy of a Cyber AttackDemystifying Industrial Control System Cyber
RiskComputer Capers - Then and Now
Michael Radigan Matt Radolec Michael Radigan Steve Margolis / Luke MargolisLeidos Cyber, Inc. Varonis Leidos Cyber, Inc.
PRESENTER NAME PRESENTER NAME PRESENTER NAME
SPONSOR ROOM - IBM
PRESENTER COMPANY
PRESENTER COMPANY
24
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
15
21Anti Hacker Techniques and Technologies Digital Survival
SOC-as-a-Service & Tales from the Trenches: Cyber Security War Stories
New Targets on Cybercriminals' Radar
John Aron Kevin Baker Marty Sanders Shaked VaxAronetics Westfield Artic Wolf Networks IBM
BREAK Visit the Café LUNCH - Concourse
PRESENTER COMPANY PRESENTER COMPANY
The SUMMIT 2019 Gold Sponsors:
17 Annual Information Security Summit - DAY 01Wednesday, October 23
The I-X Center - Cleveland
PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
23
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME
PRESENTER NAME
PRESENTER NAME PRESENTER NAME PRESENTER NAME
PRESENTER COMPANY
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
PRESENTER COMPANY PRESENTER COMPANY
PRESENTER NAME PRESENTER NAME
RESERVED FOR ENERGYTECH
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
Securing the 4th Industrial RevolutionThe Changing Contractual and Compliance
Landscape
MANUFACTURING Tra✘ - TrustedSec
Xceptional Networking.
✘ceptional Networking
Reception (Area TBD)
SPONSOR ROOM - LOGICALIS
25
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
TrustedSecWednesday's Tra✘ Sponsors:
Ulmer Byrne
7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 - 7:00 PM
1
2
3
Café'
4
5
6
8
11
12
18
19
20
NOCHE Breakout Room
26
Grand B'room
Correction From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
My CEO Told Me We Have to Move Our Datacenter to the Cloud…So, What’s the Big
Deal?
Grant AsplundGlobal Cloud Evangelist Check Point Softwarre
21
Jack Jones
Visit the Café and break with our
SPONSORSLUNCH - Concourse
SPONSOR ROOM - CHECKPOINT SOFTWARE TECHNOLOGIES
Dave Russo / CrobProgressive Insurance Arista Networks RedSeal Red Hat, Inc
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Announcements, Partner Message and Keynote Introduction
Co-Founder, Chief Risk Scientist Risklens, Inc
PRESENTER COMPANY TrustedSec
Break with our SPONSORS.
Kate Kuehn PRESENTER NAME PRESENTER NAME Alex Hammerstone
Senseon PRESENTER COMPANY
PRESENTER COMPANY PRESENTER COMPANY
RESERVED
AI / MACHINE LEARNING Tra✘ - ASMGi AI / MACHINE LEARNING Tra✘ - ASMGi
9
Visit the Café and break with our
SPONSORS
Magic + Ultra + Humans = Disaster: The USS Indianapolis
Your next security strategy (Is the security model of today broken?)
LUNCH - Concourse
Considerations for an Effective Awareness Program: Thinking Like an Attacker
The People Priority- Developing a Security Awareness Program with your Employees in
Mind
Break with our SPONSORS.
John O'Leary Laurence Pitt Ken Smith Lauren ZinkO'Leary Management Education Juniper Networks University of Mount Union / SANS TI AmTrust Financial
10
Case Study - Growing Security Champions at Progressive
Wireless Intrusion Prevention – Wireless threat vectors that network managers need to
defend against.
Best Practices Building a Resilience Cyber Security Strategy
SDLC for DevSecOps – Why It’s Important to Embrace Agile
David Upson Jeff Burke Kurt Van Etten
John O'Leary Christopher BerensternOne Identity Cequence Security O'Leary Management Education BSI
13-14Welcome, Partner
Message and Keynote Introduction
Visit the Café and break with our
SPONSORS
Developing Super Women in Security PRESENTATION TITLE
LUNCH - Concourse
PRESENTATION TITLEWhy No One Listens to Us – Articulating
Information Security Risk as Business Risk
17
What Does a Mature Cybersecurity Program Look Like?
SPONSOR ROOM - RED SEAL
Break with our SPONSORS.
SPONSOR ROOM - HURRICANE LABS
SPONSOR ROOM - IBM
PRESENTER NAME PRESENTER NAME PRESENTER NAMENOCHE Breakout Room PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
22
The Internet of Things That Shouldn't Be On The Internet
Dealing With Digital Lifestyles Zero Trust - Doing it The Right WayEverything You Know About How to Cyber
Secure Your Organization Just Changed
Chris Bush Patrick McCrann Andy Hicks Caston ThomasMcAfee Aetna Guardicore InterWorks, LLC
RESERVED FOR ENERGYTECH
The SUMMIT 2019 Gold Sponsors::
17th Annual Information Security Summit - DAY 02Thursday, October 24 - Sponsored By CEQUENCE SECURITY
The I-X Center - Cleveland
25
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
24
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME
Xceptional Networking. CASINO NIGHT!!
RESERVED FOR ENERGYTECH
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
SPEAKER READY ROOM
✘ceptional Networking. CASINO
NIGHT!!
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & Logicalis
HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software HEALTHCARE TECHNOLOGY Tra✘ - Check Point Software
15
SPONSOR ROOM - LOGICALIS
PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
23
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME
16
CLOUD SECURITY Tra✘ CLOUD SECURITY Tra✘
Malicious Bot Attacks: The New #1 Cyber Threat
Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and
ComplianceCyber Cat & Cyber Mouse Rockin’ the CASB
Carl Gustas Glen Roebuck Laurence Pitt Cory KramerCequence Security Thales E-Security Juniper Networks Logicalis
Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and
anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.
Can AI/ML help us solve real cyber problems and protect our enterprises from cyber-attacks? In each of these 4 sessions we will learn how AI/ML is being used to identify risks and
anomalous behaviors and ultimately automate detection and response to cyber threats to better protect our enterprises.
Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi
Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi
RESERVED RESERVED RESERVED
PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY
The Path to IAM Maturity Don't Take a Knife to a Gun Fight Customer Service, Disservice or Self-ServiceRegulations & Privacy Requirements Across
the Globe
Jerod Brennan Ameya Talwalkar
Thursday's Tra✘ Sponsors:Check Point ASMGi
7:30 8:15 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 1:00 1:30 2:00 2:30 3:00
1
2
3
Café'
4
5
6
8
11
12
NOCHE Breakout Room
18
19
20
26
Grand B'room
9OEN
10
13-14Welcome , Partner
Message and Announcements
Visit the Café and break with our
SPONSORS
PRESENTATION TITLE
LUNCH - Concourse
PRESENTATION TITLE PRESENTATION TITLE
PRESENTER NAME PRESENTER NAME
Visit the Café and break with our
SPONSORS
Instruction through Practical Experience: CTFs as a Teaching Tool
Incident Response on Mac OS
LUNCH - Concourse
The Strategic Advantage of Adaptive Multi-Engine Advance Threat Protection
Cleveland Clinic PRESENTER COMPANY PRESENTER COMPANY
PRESENTER NAME
SPONSOR ROOM - OKTA
SPONSOR ROOM - TENABLE
Sonic Wall PRESENTER COMPANY
Recent Trends in Information Security and Privacy Laws
What is ITIL? A Security Practitioner’s Introduction
PRESENTATION TITLE PRESENTATION TITLE
Mehmet Munur Chris Stransky PRESENTER NAME PRESENTER NAMETsibouris & Associates, LLC
SPONSOR ROOM - CHECK POINT SOFTWARE TECHNOLOGIES
Correction From Collaboration
Room #AM PM
DOORS OPEN Registration /
Continental Breakfast - Sponsor Exhibit Area
RESERVED FOR ENERGYTECH
ISS PLANNING GROUP / VOLUNTEER ROOM
ENERGYTECH PLANNING GROUP ROOM
CAFÉ and Cell Phone Charging Station - Sponsored by ASMGi
ISS - TECHNOLOGY CZAR's ROOM - Set-up, Staging and Storing
Conference Ends. GRAND PRIZE DRAWING !!Drawing for prizes.
Winners must be Present
Break with our SPONSORS.
Ken Smith Thomas Reed "Cyber Risk PRESENTER NAMEUniversity of Mount Union / SANS TI Malwarebytes
16
EXECUTIVE Tra✘- CSO ✘change EXECUTIVE Tra✘- CSO ✘change
Duties, Responsibilities and Compartmentalization of the Person
Responsible for Security
Buidling an Effecive Security and Sustainable Information Security Team
45 Minute Security Metrics Workshop
Richard Ullom Kevin Baker Jack Nichelson Gary SheehanNOCHE Breakout Room Western Reserve Group Mutual Westfield Group MRK Elon University
15
CYBER RISKTra✘- ASMGi CYBER RISKTra✘- ASMGi
Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends
regarding quantification, prioritization and treatment of risk.
Throughout the day we will share some of the most widely adopted frameworks and methodologies for identifying and managing cyber risk, and introduce some emerging trends
regarding quantification, prioritization and treatment of risk.
Presenters / Panelists to be Announced Presenters / Panelists to be AnnouncedTra✘ is Sponsored and Moderated by ASMGi Tra✘ is Sponsored and Moderated by ASMGi
24
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME
RESERVED FOR ENERGYTECH
RESERVED FOR ENERGYTECH
The Privacy Gameshow Medley Luxury Item or Lifeline? Defense in Depth: DNSAI and Cybersecurity – Connecting the
Machines
Chris Stapenhurst Joseph Salazar Luke Teeters Keith RayleVeritas Attivo Networks Palo Alto Networks Fortinet, Inc.
Break with our SPONSORS.
SPONSOR ROOM - LOGICALIS
SPONSOR ROOM - READ SEAL
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME
25
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
ENERGYTECH PRESENTATION ROOM
PRESENTER NAME PRESENTER NAME PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
Visit the Café and break with our
SPONSORSLUNCH - Concourse
PRESENTER NAME PRESENTER NAMEPRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
21
22
Identity as The New Perimeter
Check Point Software Technologies, Tenable Network Security, Okta, Red Seal, IBM & LogicalisThe SUMMIT 2019 Gold Sponsors:
17th Annual Information Security Summit - Day 03Friday, October 25 - Sponsored By The CSO Xchange
The I-X Center - Cleveland
SPEAKER READY ROOM
17Incident Response - What Really Happens OPEN
Security Endgame: Why utilizing a Security Stack at your company is like wielding the
Infinity Gauntlet.
Defense in Depth Requires Securing Databases
Greg Kelley Patrcik Duffy Mitch Spaulding Daniel MorganVestige Digital Investigations Quadax Dark Rhino Security DBSecWorx
To Be Announced
PRESENTER COMPANY PRESENTER COMPANY PRESENTER COMPANY
23
Converged Perimeters – The Future of Network and Content Security in a Cloud
World
Delivering Trust and Confidence Through Resilience
Securing Unstructured Data in Office 365 OPEN
Mark Mahovlich Kurt Van Ettan Tim Beamer PRESENTERICM Cyber RedSeal Logicalis COMPANY NAME
Jack Nichelson / Jason Middaugh Timothy Roth Crob Chris ZannetosMRK / Cisco Systems Red Hat, Inc Covered Security
KEYNOTE: The Ethics of A.I & the DNA Malware
Eddie DoyleGlobal Security Strategist
Check Point Software
True Crime - The First 48 hours on Your Network
Choose Your Own Disaster – Big Trouble in Little Startup
Fitbit for online security? Lessons learned from the Use of Behavior Science
SPONSOR ROOM - HURRICANE LABS
SPONSOR ROOM - IBM
ASMGiFriday's Tra✘ Sponsors:
CSO ✘change