Vulnerability Management: Work Smarter Not Harder “The Data Problem”

Presented by Kenna Security

With an exponential increase in the volume and velocity of new vulnerabilities, it is no wonder that today’s InfoSec and operations teams find it difficult, if not impossible, to meet the increasing demands of remediation. This doesn’t even include internal corporate policies or politics which present significant barriers as well. It is not uncommon to discuss a prospective customer’s VM program with them, only to find out that they are using spreadsheets to manage the load. They then hand off their “prioritized” workload to a group of admins who are not bound to the same policies or procedures. The average enterprise today has 100’s of thousands to millions of vulnerabilities spread across tens of thousands of assets. A great many of these organizations continue to rely on CVSS scoring as the only benchmark. The latest research shows us that if you base your remediation strategy on fixing CVSS 7 or greater, your efforts will yield the same effectiveness as randomly choosing any set of active vulns in your environment to address. It is about 22% effective in either scenario. The purpose of this presentation is to discuss and explore more effective ways to address such challenges and roadblocks. In particular, how does a practitioner better prioritize and communicate with their various internal colleagues to improve their workflow and posture?

Transforming IT Ops and Network Experiences with A.I.

Presented by Juniper & Structured

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Stay Ahead: Embracing New Technology

Presented by Tony North • President, Seattle HDI Chapter

Technology can be a hinderance if not well planned or deployed. With new tools like AI, IoT and Apps, it can be difficult for employees and employers to embrace it. Join the Seattle chapter of HDI, Help Desk Institute, for an interactive session. You will learn about the issues facing us all today while finding recommendations on how to improve adoption of technology in a very simple way.

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

Presented by BlackBerry/Cylance & Structured

Take a journey with us, as we expose the mind of the enemy, revealing some of the latest methods that cybercriminals use to infiltrate modern security defenses, and how you can thwart them. You will learn about the ever-changing threat landscape and how you can prevent and respond to today’s most pervasive threats – including ones never seen before. With the best tools, expertise, and powerful AI-based technology, we will uncover the secrets behind today’s modern hacking arsenal and provide you with the means to protect your organization.

The Current Malware Threat Landscape & Enterprise Grade Remediation

Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Cyber AI: Fighting Back with Autonomous Response

Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

Application Portfolio Management: When to Pull the Plug on Your Sacred Cows

  Presented by Ed Toner • Chief Information Officer; State of Nebraska

An Enterprise Vision for Business Applications in the public sector is much like other large legacy companies in the private sector. The State of Nebraska has essentially evolved through mergers and acquisitions (we simply refer to the business organizations as Agencies). This silo approach over time has resulted in a disproportionate number of duplicate applications and services. Following Gartner’s TIME framework (Tolerate, Invest, Migrate, Eliminate), APM (Application Portfolio Management) utilizes a fact-based process of application categorization, assessment and rationalization. APM is an iterative process utilized to manage, architect and maintain an organization’s portfolio of applications. Each iteration provides new segments of information which are subsequently added into the application portfolio.

Raising Your Personal Bar: How to Stand Out While Still Being Yourself

  Moderated by INTERFACE Advisory Council

The purpose of this collaborative discussion is to focus on the common traits that top level talent (i.e. the most sought after employees) have and provide a forum in which to discuss those attributes, identify where we may be falling short and ways to take steps to increase productivity, positive influence and personal development.