BorderlessCyber 2019 Oct. 8, 2019 to Oct. 10, 2019, Washington, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
OPENING PLENARY SESSION — WELCOME ADDRESS | Harley Parkes , Gershon Tolbert | N/A | |
OPENING PLENARY SESSION—KEYNOTE: THE FUTURE OF CYBER OPERATIONS | Dave Luber | N/A | |
OPENING PLENARY SESSION—KEYNOTE: A RANDOM WALK THROUGH CYBER SECURITY | Ed Amoroso | Dr. Amoroso takes attendees on a fast-paced journey through a variety of current topics in ... | |
PLENARY PANEL - FIGHT SMARTER, NOT JUST FASTER | John Felker , Harley Hancock | Our community is adopting SOAR to speed up SOC processes. This leads to demonstrable improvements ... | |
PLENARY SESSION — BREAKING NEWS: GLOBAL, MULTI-VENDOR CYBERSECURITY ECOSYSTEM LAUNCHES AT BORDERLESS CYBER & CYBERNEXT | Darren Keirstead | IBM Security, McAfee, and leading organizations from around the world will unveil a new alliance ... | |
OPENING PANDORA'S BOX WITH FAIR + ATT&CK + SOAR = AN IMPROVED CYBER SECURITY RESPONSE STRATEGY | Tyler Rorabaugh | When I meet with CISOs and Cyber Security Directors, they usually ask what use cases ... | |
CNS TRACK: AI IN CYBERSECURITY: BETWEEN HYPE AND REALITY | Alexei Balaganski | Artificial Intelligence is surely one of the hottest topics in nearly every industry nowadays, and ... | |
BC TRACK: DODCAR OVERVIEW: STANDARDIZING AND AUTOMATING CYBER THREAT UNDERSTANDING FOR THREAT-BASED, CYBERSECURITY ASSESSMENTS | Owen Breitinger | The DoDCAR performs threat-based, cybersecurity architecture assessments to ensure DoD leadership has the insight and ... | |
MACHINE LEARNING & THE SOC | Cory Missimore | Security Operation Centers (SOC) s are continuously monitoring an ever-increasing scope of assets, both those ... | |
IMPROVING IOT SAFETY USING STANDARDS TO IMPROVE IOT SECURITY | Duncan Sparrell | The Internet of Things (IoT) is growing faster than our ability to safeguard ourselves. As ... | |
EVALUATING OUR DEFENSES WITH A DATA SCIENCE APPROACH | Brennan Lodge | SOC analysts are under siege to keep pace with the ever-changing threat landscape. The analysts ... | |
MAKING CTI ACTIONABLE: CLOSING THE FEEDBACK GAP | Michael Pepin | So you're receiving cyber threat intelligence (CTI) from outside sources. Great. Now what? How do ... | |
PANEL - ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: RECENT ADVANCES | Brennan Lodge , Al Balaganski | Numerous malware variants are being created daily. To adjust to this evolution, machine learning tools ... | |
RETHINKING THE FUTURE OF IDENTITY WITH ZERO TRUST | Corey Williams | As companies continue to move to the cloud and house more and more data online, ... | |
PRAGMATIC CYBERSECURITY AND RISK REDUCTION | Bruce Hafner | Organizations are at a tipping point, overwhelmed by cyber events, day to day operations, budget, ... | |
SECURITY AUTOMATION AND ADAPTIVE CYBER DEFENSE STRATEGIES FOR SUCCESS - EXPERIENCES FROM THE FINANCIAL SECTOR | Donnie Wendt | This presentation will examine the findings of a doctoral study into the strategies cybersecurity professionals ... | |
REAL AND PERCEIVED THREATS TO THE ENERGY SECTOR - 2019 AND 2020 | John Bryk | What are the cyber threats posed to natural gas? What's the state of cyber defense ... | |
IS THE DAMAGE ALREADY DONE? AUTOMATING VULNERABILITY INVESTIGATION | John Moran | As evidenced by many of the recent breaches, vulnerability management is a critical process for ... | |
PROTECT THE HOMELAND AND STAY IN BUSINESS: WHY PRIVATELY-OWNED COMPANIES NEED A CYBER INTELLIGENCE PROGRAM | Al Lewis | The private sector continues to be victimized by an onslaught of sustained cyber assaults aimed ... | |
PLENARY SESSION—KEYNOTE: THE INFORMATION PROTECTION LIFECYCLE | John Tolbert | Too often those of us in the cybersecurity space get wrapped up in comparing, deploying, ... | |
PLENARY SESSION—KEYNOTE: THE QUESTIONS A JUDGE WILL ASK YOU AFTER A DATA BREACH | Chris Cronin | If you are breached and your case goes to litigation, you will likely be asked ... | |
PLENARY SESSION—INNOVATION TALKS | Karl Weller , Yaniv Rossi | Our sponsors take the main stage during this session to talk about...Cybersecurity Threats in the ... | |
PLENARY PANEL: CRITICAL INFRASTRUCTURE, IOT, AND SECURITY | David Batz , Stom Magnan | N/A | |
THE (R)EVOLUTION OF CYBER THREAT INFORMATION SHARING – PAST, PRESENT, AND FUTURE | Daniel Harkness | The sharing of cyber threat information can be traced back to the response to the ... | |
ENDPOINT PROTECTION/ANTI-MALWARE AND ENDPOINT DETECTION & RESPONSE - LEADERSHIP COMPASS PREVIEW | John Tolbert | Preview of the upcoming Leadership Compasses on Endpoint Protection/Anti-Malware and Endpoint Detection & Response. In ... | |
DIGITAL PICKPOCKETS: ANALYZING MOBILE MALWARE | Marita Fowler | Mobile malware authors invest a lot of time and energy into code development to ensure ... | |
WHAT REALLY MEANS ACTIONABLE THREAT INTELLIGENCE TODAY? | David Bizeul | N/A | |
SESSION TITLE TBA | Shaun Cassells | N/A | |
AUTOMATING OPEN-SOURCE ZEEK (BRO) FOR THREAT MITIGATION AND RESPONSE | Allan Thomson | This presentation describes how a common open-source tool Zeek (Bro) that has been used, until ... | |
IOT & CYBERSECURITY | Christopher Magnan | Cybersecurity is critical to protecting IoT and mesh networks. Network sensors and endpoints are the ... | |
CACAO: INSIGHTS ON CYBERSECURITY ORCHESTRATION COOPERATIVE COLLABORATION | Alan Jordan | To defend against threat actors and their tactics, techniques, and procedures, organizations need to manually ... | |
SECURE CODE SIGNING FOR IOT WITH MULTI-PARTY COMPUTATION | Tom Stockmeyer | In 2019, interconnectivity and growth of data have exploded. The digital world continues to expand ... | |
DECISION AUTOMATION: TEACHING MACHINES TO HUNT | Kumar Saurabh | Threat Detection in today's environment requires Security Operational Center (SOC) teams to go beyond SIEM ... | |
CYBER MUTUAL ASSISTANCE – A NEW MODEL FOR ELECTRIC AND GAS COMPANIES PREPARING AND RESPONDING TO CYBER SECURITY EMERGENCIES | David Batz | Owners and operators of the electric grid in the United States are facing an unprecedented ... | |
MAKING THREAT INTELLIGENCE A SHARED RESOURCE FOR NETWORK DEFENSE | Todd Mok | Can small to medium organizations use what the larger organizations learn about threats to take ... | |
THE IMPORTANCE OF SECURITY OPERATIONS | Tom Utley | In today's business environment, it's imperative for organizations of all sizes to have a dynamic ... | |
PANEL - QUANTUM SCIENCE MEETS CYBER REALITY | Daniel Riedel , Tommy Gardner , Duncan Earl , Arthur Herman , Coret Mcclelland | The panel will take you on a journey from the origins of quantum science through ... | |
PANEL - GLOBAL STATE OF PRIVACY AND WHY SECURE IDENTITY SOLUTIONS ARE NEEDED | John Tolbert , Kimberley Sutherland , Denise Tayloe , Philipp Schneidenbach , Lisa Hayes | The introduction of new regulations around data privacy and security globally has resulted in a ... | |
INSIGHTS FOR SECURE API USAGE IN CONJUNCTION WITH SECURITY AUTOMATION AND ORCHESTRATION | Cody Leadership | Organizations are expanding the use of automation and orchestration in their security operations. An indication ... | |
SIGNED CONTROL SYSTEM FIRMWARE, PARTS, AND DOCUMENTS – OPPORTUNITY OR PAIN? | Ronal Brash | Several years ago, aviation OEMs began creating crypto graphically signed parts (called Loadable Software Aircraft ... | |
HOW TO MOVE FROM ALWAYS-ON PRIVILEGED ACCESS TO JUST-IN-TIME ADMINISTRATION AND DRASTICALLY REDUCE YOUR IT SECURITY RISK | Morey Haber | A true least-privilege security model requires users, processes, applications, and systems, to have just enough ... | |
LESSONS LEARNED FROM ALMOST A DECADE OF SCAP | Charles Schmidt | The Security Content Automation Protocol (SCAP) provides a way to support automation of cybersecurity assessment ... | |
IDENTITY IN LOCAL GOVERNMENT - CASE STUDY OF HOW FAIRFAX COUNTY BRIDGES ENTERPRISE AND RESIDENT IDENTITY | Robert Barr | Fairfax County, VA needed the ability to register residents to pay their taxes online and ... | |
BABY STEPS: AN ORGANIC FORMULA FOR MATURING YOUR SOC WITH SOAR AND THREAT INTELLIGENCE | Sam Royer | In this talk we would like to take you through a practical sequence of SOC ... | |
PANEL - THE MOVEMENT OF SECURITY CONTROLS TO THE CLOUD - HOW FAR CAN WE GO? | Matthew Gardiner , Morey Haber , Robert Barr , Peter Dougherty , Reena Parekh | N/A | |
FROM BAND PRACTICE TO SOC SYMPHONY | Michael Lyons | When one thinks of mechanical and rigid, one often thinks of a cymbal-banging monkey. Unfortunately, ... | |
THE REVERSE ENGINEERING OF TRUST - WHY MORE TECH IS NOT THE ANSWER | Philipp Schneidenbach | We are at the gate to the all-digital age and see cultures, biases and routines ... |