Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Illuminating Behavioral Patterns to Assist Technology for Insider Threats

  Presented by Vanguard Infrastructures & HPE

Today, intellectual property theft is responsible for the greatest transfer of wealth among the countries of the world and frequently involves utilizing the company Insider. The security of the company is every employees’ responsibility. Technological innovations in Machine Learning can identify both the human and machine insider threat. In addition, employees must be educated as to what to look for when looking for the Insider Threat. Sensitizing your employees to scenario indicators, elicitation techniques involving behavioral manipulation, and the other principles can create a security force multiplication that will provide greater protection for your company. Vanguard Infrastructures is presenting information and strategies to incorporate the eyes and ears of your employees in the hunt for the insider.

Achieving Your Best ROI on Today’s 3rd Generation Security Solutions

  Presented by Fortinet

The old adage of having just a firewall, let alone a limited featured stateful firewall of the 1st Generation of Security Solution, does not achieve a high enough Security posture to mitigate your Risk. Today, we are past our 2nd Generation of Point solution, where “Defense In-Depth” was the trend leading to 20+ individual solutions that gave you the illusion of protection because you had so many, or one solution was a “back-up” for another. Today, with our broad networks (expanded WIFI, SD-WAN, BYOD, IOT), we know that not to be the case. The more complex your Security environment and populated with multiple non-integrated vendor solutions, the more likely for there to be a chink in your protection for a hacker to exploit.

The goal is share with everyone how you can achieve the best ROI by implementing today’s 3rd Generation of Security Solution, where internal segments, points of inspection and simplification of point-solutions are key features to the Integrated Security Fabric which all leads to Automation. Thus improving your Security Posture, Simplifying and Reducing the number of Solutions needed, and all why doing this at internal LAN network speeds, because as many Network Admins know, Slow is Broken.

Defense in Diversification: Improving Cybersecurity via Smart Consolidation

  Presented by ExtraHop

Ask any analyst, reporter, or financial observer, and they’ll tell you that the security market is ripe for consolidation. For years, security vendors have proliferated, buoyed by high valuations and ever-expanding enterprise security budgets. While this rush to innovate has resulted in better and more sophisticated threat defenses, it has also created a complex web of tools which already overworked, overwhelmed, and understaffed security teams must manage.

This tool sprawl is one reason that so many in and around the security industry believe that an era of consolidation is coming. According to ESG Research, 66 percent of businesses are actively working to consolidate their security portfolio. For many in the security industry, a security platform that essentially puts your “SOC-in-a-box” is an ideal solution to the tool sprawl problem.

But this approach is not without peril. If the security industry consolidates to the point that there are just a few platform solutions, this will not only stifle innovation, it will result in a monoculture — and monocultures are notoriously susceptible to disease. If every organization uses an identical or nearly identical set of security tools, breaking into one means breaking into them all. And once threat actors figure out how to break in once, they’ll have the keys to every organization. Just like the world banana population —itself a monoculture — is currently being wiped out by a fungus to which is has no natural resistance, a single cyber threat could take down a vast number of organizations.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Rethinking Vulnerability Prioritization in the Modern Threat Landscape

  Presented by Tenable, Inc.

When it comes to reducing cyber exposure, an effective vulnerability management approach helps you eliminate blind spots that are often the root of security issues. But with 16,000 vulnerabilities identified in 2018 alone, security leaders know it’s not practical to find and fix every vulnerability. Using the Common Vulnerability Scoring System (CVSS) to prioritize is a good start, but it isn’t enough to address the complexity of today’s attack surface. Security professionals need to be able to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that are most likely to be exploited in the near-term. Attend this session to learn how adding real-life context to your vulnerabilities can help prioritize vulnerabilities so you can focus your remediation efforts on those that matter most.