Are Your IT Trains Running on Time?

  Presented by Eric Ried • CTO, Presbyterian Healthcare Services

The details of this presentation will be available soon. Please check back for updates!

Real-World Impact of Security Risks in Industries Using IIoT 

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Artificial Intelligence in Action: A Conversation About Practical AI

  Moderated by INTERFACE Advisory Council

Moderator:

  • Dr. Tobe Phelps • Chief Technology Innovation Officer; CNM

Panelists:

  • Lissa Moore • Research Scientist; Los Alamos National Laboratory
  • Luis Brown • Chief Information Security Officer, CNM
  • Dee Skinner • Director of IT Services, Haverland Carter LifeStyle Group

Using Packet Flow Based Measurements to Support IT Services

  Presented by Dennis B. Bateman • Network Engineer, Sandia National Laboratories

Can you see the IT Service that you are delivering to your customers? How well do you know the health and performance of your service? Do you know if networked issues are impacting your users? Let packet flow analysis help make operational decisions, set priorities, generate metrics, enable proactiveness, and much more.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime in your Enterprise

  Presented by Fortinet

The attack surface that enterprises much protect is expanding dramatically. How do you maintain visibility and security of your traffic from IoT to the cloud. We’ll explore the threat vectors that cyber criminals use to penetrate your defenses and the security tools you can use to defend against those attacks.

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Building a Security Program with the CIS Control

  Presented by CompuNet

Developing an effective security program is a complex undertaking. Let’s jumpstart the process! We’ll discuss leveraging the Center for Information Security’s Critical Security Control framework to identify and prioritize security controls based on efficacy and business impact. After a brief overview of the CIS CSC, we’ll discuss the ongoing measurement and reporting necessary to organize a diverse set of tools into a well-managed information security program. We’ll also demonstrate and share freely available tools to help organizations perform internal assessments and leverage benchmark configuration guides.

Controlling Application & Systems Access with Microsegmentation

  Presented by IVOXY Consulting

Being able to control access to systems & applications based on identity has been an ideal for many, many years. It’s only been recently that we’ve gotten the ability to control access to/from any system and/or any application. Microsegmentation technology can be deployed without downtime & without service interruption (well, if you do it right!). Anyone who has been through a pen test knows that our on-prem & cloud datacenters are largely wide-open: There’s nothing to stop malware from a PC or infected server from spreading.

Join IVOXY Consulting to learn how microsegmentation works & how your datacenter can benefit from one of the hottest trends in information security today.

Check Point Software

  Presented by Check Point Software

The growth of and use of public clouds has been unprecedented, with no signs of abating. Today, the use of public clouds for enterprise datacenters is mainstream. And for good reason; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered by the public cloud providers today can be daunting. The breadth and depth of services and choice is increasing daily.

With these choices come consequences; it is a ‘one strike and you’re out’ environment. Just one misconfiguration can potentially put your entire organization at risk…or worse. It is this combination of seemingly endless choice along with the ease of access and use that creates the potential for catastrophe. Moreover, just imagine trying to find out if any of your S3 buckets are exposed or misconfigured when you have thousands of them. It’s like finding a needle in a stack of needles.

While most everyone will agree the public cloud environments being offered today are extremely comprehensive and very powerful, in unskilled hands, one fat-finger can have dire consequences. And, as you expand your use and implement ephemeral cloud-native services such as Amazon Lambda functions and other cloud-native platform components (RSDA, Redshift, ELF, ALB, ECS) new challenges will arise when conducting threat-detection and attribution.

In this session you will learn why Gartner says, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.”