Fast Data: The Next Wave Is Already Here & Accelerating

  Presented by Violin Systems

Your data is growing rapidly from all types of sources. Whether it is point of sale, IOT sensors, or public sentiment you need to be able to store it safely and securely. You also need to provide fast access for analytics, AI/ML applications and let’s not forget your customer’s demand for instantaneous response! Fast data needs to be faster, more reliable and more secure. In this session, you will learn how data storage technology is providing low latency and performance for these applications while dealing with the myriad of data sources that are springing up every day. You’ll hear from storage experts about how performance not only addresses your Fast Data needs, but helps you build a cost-effective environment to meet the most stringent needs around performance, compliance and regulatory issues.

Improving BCDR and Resilience with Cyber Attack Simulations

  Presented by Dr. Bryson Payne • Director, Center for Cyber Operations Education, University of North Georgia

Interactive Cyber Attack Simulation Exercises (ICASEs) prepare both government-level and business-focused leaders to better handle incident response, business continuity and disaster recovery by simulating a coordinated, multi-stage cyber-physical attack on critical infrastructure and traditional computing resources. By simulating multiple attacks at the same time, organizations can prepare to survive so-called “black swan” or “perfect storm” scenarios that would otherwise be devastating. After this session, participants will be able to apply cyber table-top planning and simulation exercises to their work environment to plan for and effectively respond to advanced cyber and cyber-physical attacks.

Dr. Bryson Payne is a TEDx speaker, best-selling author of Teach Your Kids to Code (2015, No Starch Press), and the founding Director of the Center for Cyber Operations Education at the University of North Georgia, an NSA-DHS Center for Academic Excellence in Cyber Defense. He is a tenured professor of computer science at UNG, where he has taught aspiring coders and cyber professionals since 1998. He is a Certified Information Systems Security Professional (CISSP®) and Certified Ethical Hacker (CEH), and he holds the SANS|GIAC GPEN certification, among other industry certifications. He was also the first Department Head of Computer Science at UNG and enjoys working with K-12 schools worldwide to promote computer science education.

Featured in CIO magazine and the Wall Street Journal, Dr. Payne’s first two books have been published in six languages, and his third book on hacking comes out in the second half of 2019. He’s also a popular online instructor with over 36,000 students from more than 160 countries, known for his top-rated Udemy course, Real-World Ethical Hacking (2017).

He holds a Ph.D. in computer science from Georgia State University and has published articles in scholarly and trade journals, in addition to speaking regularly at national and international conferences on computer science and cybersecurity education.

Introduction to FAIR Risk Analysis Methodology

  Presented by Donna Gallaher • President and CEO of New Oceans Enterprises

Present your risk assessments to your board of directors in the language they understand – financial loss. “FAIR” or “Factor Analysis of Information Risk” is the quantitative risk analysis methodology that works with common frameworks while adding context for truly effective risk management.

FAIR Quantitative Risk methodology improves upon the traditional “Red-Yellow-Green” executive dashboard reports by putting risks in financial terms. Applying FAIR methodology within your security program improves the quality of the discussions with your business stakeholders by diving into the assets, threat actors and impact of loss scenarios that are most meaningful to the organization. Once FAIR is methodology is added to your existing risk framework, your board of directors and executive team will be enabled to make better informed funding and risk mitigation decisions using objective data and financial models.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

The Current Malware Threat Landscape & Enterprise Grade

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Risk, Reliance and The Resilience Imperative

  Presented by Jeff Gaynor • President, American Resilience, LLC

America’s global cyber adversaries appreciate our Nation’s increasing reliance on an Internet that exceeds our ability to “secure.” These predators also appreciate reliance multiplies target values and both immediate and cascading consequences. With Americans’ willing acceptance of the risks inherent in “The Internet of Things” and it’s convenient, entertaining, highly invasive and exploitable devices; our global adversaries are also coming to realize America has created its own Achilles Heel.

In her March 18 State of Homeland Security Address, former Homeland Security Secretary Kirstjen Nielsen (among many courageous and direct statements) observed: “We face a choice: Shape the world around us or get shaped by it.” She added: “We are going from “highly reactive” to “highly resilient” and to that end called for “Relentless Resilience” and a “Whole of Society Approach” to correct America’s increasingly exploited cyber-reliant critical infrastructure and national preparedness trajectories.

In examining the above realities, Jeff will cite history, lexicon issues, and pose questions the answers to which drive “The Resilience Imperative.” He will then present the operationally proven, objectively measurable, nationally comprehensive and compatible resilience-based mindsets, metrics, methodologies and technologies required to achieve the Secretary’s objectives and in the process of doing so, ensure America’s cyber-reliant safety, security, quality of life and future for this and generations of Americans’ to follow.

Design Security into Your CI/CD Pipeline and Reduce Threats from Pre-Deployment to Runtime

  Presented by Trend Micro

Building better applications that meet the speed and demands of your business is what drives a successful DevOps practice. As business units migrate critical workloads to the cloud and grow their container adoption, trusted effective security controls that protect against a range of sophisticated threats and attacks need to be part of the automated integration and communication pipeline. You need the flexibility to work across hybrid and multi-cloud environments.

Whether it’s contending with multiple point security tools or trying to squeeze into your organization’s legacy IT security protocols, your DevOps shop requires the freedom to work effectively, minimize security disruptions, and adapt when InfoSec and compliance teams come calling.