BorderlessCyber 2019 Oct. 8, 2019 to Oct. 10, 2019, Washington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
OPENING PLENARY SESSION — WELCOME ADDRESS Harley Parkes , Gershon Tolbert N/A
OPENING PLENARY SESSION—KEYNOTE: THE FUTURE OF CYBER OPERATIONS Dave Luber N/A
OPENING PLENARY SESSION—KEYNOTE: A RANDOM WALK THROUGH CYBER SECURITY Ed Amoroso Dr. Amoroso takes attendees on a fast-paced journey through a variety of current topics in ...
PLENARY PANEL - FIGHT SMARTER, NOT JUST FASTER John Felker , Harley Hancock Our community is adopting SOAR to speed up SOC processes. This leads to demonstrable improvements ...
PLENARY SESSION — BREAKING NEWS: GLOBAL, MULTI-VENDOR CYBERSECURITY ECOSYSTEM LAUNCHES AT BORDERLESS CYBER & CYBERNEXT Darren Keirstead IBM Security, McAfee, and leading organizations from around the world will unveil a new alliance ...
OPENING PANDORA'S BOX WITH FAIR + ATT&CK + SOAR = AN IMPROVED CYBER SECURITY RESPONSE STRATEGY Tyler Rorabaugh When I meet with CISOs and Cyber Security Directors, they usually ask what use cases ...
CNS TRACK: AI IN CYBERSECURITY: BETWEEN HYPE AND REALITY Alexei Balaganski Artificial Intelligence is surely one of the hottest topics in nearly every industry nowadays, and ...
BC TRACK: DODCAR OVERVIEW: STANDARDIZING AND AUTOMATING CYBER THREAT UNDERSTANDING FOR THREAT-BASED, CYBERSECURITY ASSESSMENTS Owen Breitinger The DoDCAR performs threat-based, cybersecurity architecture assessments to ensure DoD leadership has the insight and ...
MACHINE LEARNING & THE SOC Cory Missimore Security Operation Centers (SOC) s are continuously monitoring an ever-increasing scope of assets, both those ...
IMPROVING IOT SAFETY USING STANDARDS TO IMPROVE IOT SECURITY Duncan Sparrell The Internet of Things (IoT) is growing faster than our ability to safeguard ourselves. As ...
EVALUATING OUR DEFENSES WITH A DATA SCIENCE APPROACH Brennan Lodge SOC analysts are under siege to keep pace with the ever-changing threat landscape. The analysts ...
MAKING CTI ACTIONABLE: CLOSING THE FEEDBACK GAP Michael Pepin So you're receiving cyber threat intelligence (CTI) from outside sources. Great. Now what? How do ...
PANEL - ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: RECENT ADVANCES Brennan Lodge , Al Balaganski Numerous malware variants are being created daily. To adjust to this evolution, machine learning tools ...
RETHINKING THE FUTURE OF IDENTITY WITH ZERO TRUST Corey Williams As companies continue to move to the cloud and house more and more data online, ...
PRAGMATIC CYBERSECURITY AND RISK REDUCTION Bruce Hafner Organizations are at a tipping point, overwhelmed by cyber events, day to day operations, budget, ...
SECURITY AUTOMATION AND ADAPTIVE CYBER DEFENSE STRATEGIES FOR SUCCESS - EXPERIENCES FROM THE FINANCIAL SECTOR Donnie Wendt This presentation will examine the findings of a doctoral study into the strategies cybersecurity professionals ...
REAL AND PERCEIVED THREATS TO THE ENERGY SECTOR - 2019 AND 2020 John Bryk What are the cyber threats posed to natural gas? What's the state of cyber defense ...
IS THE DAMAGE ALREADY DONE? AUTOMATING VULNERABILITY INVESTIGATION John Moran As evidenced by many of the recent breaches, vulnerability management is a critical process for ...
PROTECT THE HOMELAND AND STAY IN BUSINESS: WHY PRIVATELY-OWNED COMPANIES NEED A CYBER INTELLIGENCE PROGRAM Al Lewis The private sector continues to be victimized by an onslaught of sustained cyber assaults aimed ...
PLENARY SESSION—KEYNOTE: THE INFORMATION PROTECTION LIFECYCLE John Tolbert Too often those of us in the cybersecurity space get wrapped up in comparing, deploying, ...
PLENARY SESSION—KEYNOTE: THE QUESTIONS A JUDGE WILL ASK YOU AFTER A DATA BREACH Chris Cronin If you are breached and your case goes to litigation, you will likely be asked ...
PLENARY SESSION—INNOVATION TALKS Karl Weller , Yaniv Rossi Our sponsors take the main stage during this session to talk about...Cybersecurity Threats in the ...
PLENARY PANEL: CRITICAL INFRASTRUCTURE, IOT, AND SECURITY David Batz , Stom Magnan N/A
THE (R)EVOLUTION OF CYBER THREAT INFORMATION SHARING – PAST, PRESENT, AND FUTURE Daniel Harkness The sharing of cyber threat information can be traced back to the response to the ...
ENDPOINT PROTECTION/ANTI-MALWARE AND ENDPOINT DETECTION & RESPONSE - LEADERSHIP COMPASS PREVIEW John Tolbert Preview of the upcoming Leadership Compasses on Endpoint Protection/Anti-Malware and Endpoint Detection & Response. In ...
DIGITAL PICKPOCKETS: ANALYZING MOBILE MALWARE Marita Fowler Mobile malware authors invest a lot of time and energy into code development to ensure ...
WHAT REALLY MEANS ACTIONABLE THREAT INTELLIGENCE TODAY? David Bizeul N/A
SESSION TITLE TBA Shaun Cassells N/A
AUTOMATING OPEN-SOURCE ZEEK (BRO) FOR THREAT MITIGATION AND RESPONSE Allan Thomson This presentation describes how a common open-source tool Zeek (Bro) that has been used, until ...
IOT & CYBERSECURITY Christopher Magnan Cybersecurity is critical to protecting IoT and mesh networks. Network sensors and endpoints are the ...
CACAO: INSIGHTS ON CYBERSECURITY ORCHESTRATION COOPERATIVE COLLABORATION Alan Jordan To defend against threat actors and their tactics, techniques, and procedures, organizations need to manually ...
SECURE CODE SIGNING FOR IOT WITH MULTI-PARTY COMPUTATION Tom Stockmeyer In 2019, interconnectivity and growth of data have exploded. The digital world continues to expand ...
DECISION AUTOMATION: TEACHING MACHINES TO HUNT Kumar Saurabh Threat Detection in today's environment requires Security Operational Center (SOC) teams to go beyond SIEM ...
CYBER MUTUAL ASSISTANCE – A NEW MODEL FOR ELECTRIC AND GAS COMPANIES PREPARING AND RESPONDING TO CYBER SECURITY EMERGENCIES David Batz Owners and operators of the electric grid in the United States are facing an unprecedented ...
MAKING THREAT INTELLIGENCE A SHARED RESOURCE FOR NETWORK DEFENSE Todd Mok Can small to medium organizations use what the larger organizations learn about threats to take ...
THE IMPORTANCE OF SECURITY OPERATIONS Tom Utley In today's business environment, it's imperative for organizations of all sizes to have a dynamic ...
PANEL - QUANTUM SCIENCE MEETS CYBER REALITY Daniel Riedel , Tommy Gardner , Duncan Earl , Arthur Herman , Coret Mcclelland The panel will take you on a journey from the origins of quantum science through ...
PANEL - GLOBAL STATE OF PRIVACY AND WHY SECURE IDENTITY SOLUTIONS ARE NEEDED John Tolbert , Kimberley Sutherland , Denise Tayloe , Philipp Schneidenbach , Lisa Hayes The introduction of new regulations around data privacy and security globally has resulted in a ...
INSIGHTS FOR SECURE API USAGE IN CONJUNCTION WITH SECURITY AUTOMATION AND ORCHESTRATION Cody Leadership Organizations are expanding the use of automation and orchestration in their security operations. An indication ...
SIGNED CONTROL SYSTEM FIRMWARE, PARTS, AND DOCUMENTS – OPPORTUNITY OR PAIN? Ronal Brash Several years ago, aviation OEMs began creating crypto graphically signed parts (called Loadable Software Aircraft ...
HOW TO MOVE FROM ALWAYS-ON PRIVILEGED ACCESS TO JUST-IN-TIME ADMINISTRATION AND DRASTICALLY REDUCE YOUR IT SECURITY RISK Morey Haber A true least-privilege security model requires users, processes, applications, and systems, to have just enough ...
LESSONS LEARNED FROM ALMOST A DECADE OF SCAP Charles Schmidt The Security Content Automation Protocol (SCAP) provides a way to support automation of cybersecurity assessment ...
IDENTITY IN LOCAL GOVERNMENT - CASE STUDY OF HOW FAIRFAX COUNTY BRIDGES ENTERPRISE AND RESIDENT IDENTITY Robert Barr Fairfax County, VA needed the ability to register residents to pay their taxes online and ...
BABY STEPS: AN ORGANIC FORMULA FOR MATURING YOUR SOC WITH SOAR AND THREAT INTELLIGENCE Sam Royer In this talk we would like to take you through a practical sequence of SOC ...
PANEL - THE MOVEMENT OF SECURITY CONTROLS TO THE CLOUD - HOW FAR CAN WE GO? Matthew Gardiner , Morey Haber , Robert Barr , Peter Dougherty , Reena Parekh N/A
FROM BAND PRACTICE TO SOC SYMPHONY Michael Lyons When one thinks of mechanical and rigid, one often thinks of a cymbal-banging monkey. Unfortunately, ...
THE REVERSE ENGINEERING OF TRUST - WHY MORE TECH IS NOT THE ANSWER Philipp Schneidenbach We are at the gate to the all-digital age and see cultures, biases and routines ...