Offensive AI vs. Defensive AI: Battle of the Algorithms – Cyber AI & Geopolitics

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Building A Security Culture in a Customer Service World

  Presented by Dan Hammerling • Chief Information Security Officer, Peppermill Casinos, Inc.

Whether we like it or not, all IT positions are involved with customer service. At the same time, the changing nature of cybersecurity and external regulations has necessitated that we consider business opportunities in light of the security and privacy risks. Through relationship building with key decisionmakers and providing continuous training to all members of an organizational team, we can work to make security a foundational element of our business operations.

H. Daniel Hammerling is an accomplished IT Security leader and US military veteran. He brings over 20 years of IT and IT Security experience to his current role with Peppermill Casinos Inc. Dan holds a Bachelor’s Degree in Business management as well as a CISSP and CISM. Among his volunteer work and family life, Dan is a member of ISACA, (ISC)2, ASIS International, InfraGard, and the USSS-ECTF. In his most recent endeavor, Dan has become a content creator and twitch streamer.

Vendor Management and Data Privacy

  Presented by AT&T

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI

Why Protecting Crypto Keys is More Important Than the Data They are Protecting

  Presented by nCipher

In Part 1 Mr. Beutlich talked about the history of cryptography. As Brad discussed, throughout history, the weakest link of every encryption solution (no matter how simple or complex) was exchanging and protecting the cryptographic key. In Part 2 of this series, Brad will discuss in detail why, in the 21st century, the creation and protection of a crypto key is even more important than it’s ever been. Join Brad for another lively presentation on how important it is to protect crypto keys.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Structured & Aruba

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

What You Don’t Understand About Crypto Can Hurt You

  Presented by nCipher

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Building a Foundation for Defense in Depth: 10 Security Proficiencies

  Presented by Atmosera

Expectations for information security and data protection are increasing, and so is the complexity. The stakes are higher than ever before due to compliance requirements and potential consequences on a company’s reputation. This presentation is designed to demystify the process of developing a strong security framework by getting started with a Defense in Depth approach based on 10 basic proficiencies.

Join this session and gain key strategies to:

  • Evaluate your current information security profile
  • Implement a comprehensive Defense in Depth security framework with technology and people
  • Develop a roadmap to strengthen your organization’s security and compliance

Presenters:
Sean Ventura • CISO, Atmosera
Byron Anderson • InfoSec Engineer, Atmosera

Identity Crisis: The Past, Present, and Future of Authentication

  Presented by Structured

This presentation reviews historical methods of verifying identity and integrity, as well as the current challenges we face around authentication and authorization. We will also examine lessons learned to see what the future might hold when it comes to Identity and Access Management (IAM).

How’s Your Cyber Hygiene?

  Presented by INTERFACE Advisory Council

Every company has become more dependent upon IT departments to run business operations. When it comes to a company’s Cyber profile, has enough thought been put into protecting the company? What is the process for managing social media accounts? Who has access and passwords? Do you have continuity of messaging and processes?

The hygiene of your Cyber profile has effects on many operations of business. Join us for an interactive conversation about the role IT needs to play in protecting intellectual property and more.