CyberNext Summit 2019 & Borderless Cyber 2019 Agenda

Switch to Overview

Please note that presentations and other event materials are only available to registered participants.
You need to log in to be able to download them.


October 08, 2019

08:30-09:00

Welcome Coffee & Networking

Location: Ballroom Foyer
 

08:30-17:00

09:00-09:15

Joint Welcome by KuppingerCole & OASIS

Location: Ballroom
 

Speaker(s):

Gershon Janssen, Chairman, OASIS Board of Directors
Harley Parkes, IACD Lead, Johns Hopkins University Applied Physics Laboratory
John Tolbert, Lead Analyst, KuppingerCole

09:15-09:45

The Future of Cyber Operations

Location: Ballroom
 

Speaker(s):

David P. Luber, Executive Director, United States Cyber Command

09:45-10:15

A Random Walk Through Cyber Security

Location: Ballroom
 

Speaker(s):

Dr. Ed Amoroso, CEO, TAG Cyber LLC

10:15-10:45

Coffee & Networking

Location: Ballroom Foyer
 

10:45-11:45

Panel - Fight Smarter, not Just Faster

Location: Ballroom
 

Speaker(s):

John Felker, Assistant Director, the Integrated Operations Division (IOD), Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)
Geoff Hancock, Principal & CISO, Advanced Cybersecurity Group
Harley Parkes, IACD Lead, Johns Hopkins University Applied Physics Laboratory

11:45-12:15

Breaking News: Global, Multi-Vendor Cybersecurity Ecosystem Launches at Borderless Cyber & CyberNext Summit

Location: Ballroom
 

Speaker(s):

Jason Keirstead, Chief Architect, Threat Management, IBM Security CTO Office
Darren Thomas, Senior Product Manager, Open Data Exchange Layer, McAfee

Media Content:


12:15-13:15

Lunch Break

Location: Ballroom Foyer
 

13:15-14:15

Track 1: Artificial Intelligence & Machine Learning for Cybersecurity

Cognitive Security & Modern Cyber Threats

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

AI in Cybersecurity: Between Hype and Reality

Speaker(s):

Alexei Balaganski, Lead Analyst, KuppingerCole

Machine Learning & the SOC

Speaker(s):

Cory Missimore, Manager, Baker Tilly

Track 2: Cybersecurity Decision-Making Strategies

Bringing a Business Perspective to Cybersecurity Operations I

Location: Holeman Lounge

Moderator(s):

Matthew Elder, Johns Hopkins University Applied Physics Laboratory (JHU/APL)
Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

Opening Pandora's Box with FAIR + ATT&CK + SOAR = An Improved Cyber Security Response Strategy

Speaker(s):

Tyler Rorabaugh, Director Technical Business Development, Demisto at Palo Alto Networks

DODCAR Overview: Standardizing and Automating Cyber Threat Understanding for Threat-based, Cybersecurity Assessments

Speaker(s):

Karin Breitinger, DODCAR Planner, Tensley Consulting INC.
Owen Sutter, Principle Technical Architect for Threat-Based Cybersecurity, DOD Cybersecurity Analysis & Review (DODCAR)

14:15-15:15

Track 1: Artificial Intelligence & Machine Learning for Cybersecurity

AI-Driven Cyber Attacks

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Evaluating Our Defenses with a Data Science Approach

Speaker(s):

Brennan Lodge, Data Scientist, Goldman Sachs

Panel - Artificial Intelligence in Cybersecurity: Recent Advances

Speaker(s):

Peter Guerra, North America Chief Data Scientist, Accenture AI
Al Lewis, Senior Manager, Cyber Intelligence & Analysis, Doctoral Candidate & Independent Researcher
Brennan Lodge, Data Scientist, Goldman Sachs

Track 2: Cybersecurity Decision-Making Strategies

Bringing a Business Perspective to Cybersecurity Operations II

Location: Holeman Lounge

Moderator(s):

Matthew Elder, Johns Hopkins University Applied Physics Laboratory (JHU/APL)
Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

Improving IoT Safety Using Standards to Improve IoT Security

Speaker(s):

Duncan Sparrell, Chief Cyber Curmudgeon, sFractal Consulting LLC

Making CTI Actionable: Closing the Feedback Gap

Speaker(s):

Michael Pepin, Security Engineer, Celerium

15:15-15:45

Coffee & Networking

Location: Ballroom Foyer
 

15:45-16:45

Track 1: Risk Management & Cyber Intelligence

Effective Risk Management

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Pragmatic CyberSecurity and Risk Reduction

Speaker(s):

Bruce Hafner, President, ClearArmor Corporation

Real and Perceived Threats to the Energy Sector - 2019 and 2020

Speaker(s):

John Bryk, Cyber and Physical Threat Intelligence Analyst, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)

Track 2: Cybersecurity Automation Strategies

Employing Automation, Standards, and Threat Intelligence I

Location: Holeman Lounge

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

16:45-17:15

Track 1: Risk Management & Cyber Intelligence

Cyber Threat Intelligence: Challenges & Opportunities

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Protect the Homeland and Stay in Business: Why Privately-Owned Companies Need a Cyber Intelligence Program

Speaker(s):

Al Lewis, Senior Manager, Cyber Intelligence & Analysis, Doctoral Candidate & Independent Researcher

Track 2: Cybersecurity Automation Strategies

Employing Automation, Standards, and Threat Intelligence II

Location: Holeman Lounge

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory

17:15-19:00

 

October 09, 2019

08:30-09:00

Welcome Coffee & Networking

Location: Ballroom Foyer
 

08:30-17:00

09:00-09:30

The Information Protection Lifecycle

Location: Ballroom
 

Speaker(s):

John Tolbert, Lead Analyst, KuppingerCole

Media Content:


09:30-10:00

The Questions a Judge Will Ask You After a Data Breach

Location: Ballroom
 

Speaker(s):

Chris Cronin, Board Chair, The DoCRA Council

Media Content:


10:00-10:30

Innovation Talks

Location: Ballroom
 

Cybersecurity Threats in the Private Sector

Location: Ballroom
 

Speaker(s):

Karl Wagner, Founder and CEO, Eastern Sky Technologies

Breaking Down Threat Intel Barriers (and Taking Action!)

Location: Ballroom
 

Speaker(s):

Todd Weller, Chief Strategy Officer, Bandura Cyber

Media Content:


10:30-11:00

Coffee & Networking

Location: Ballroom Foyer
 

11:00-11:30

Innovation Talks

Location: Ballroom
 

Detect Personal Information in Hybrid Cloud Environments Using AI

Location: Ballroom
 

Speaker(s):

Yaniv Avidan, CEO & Co-Founder, MinerEye

Media Content:

Innovating Access to the Critical IT Infrastructure

Location: Ballroom
 

Speaker(s):

Markku Rossi, Chief Technology Officer, SSH.COM

Media Content:


11:30-12:00

Panel - Critical Infrastructure, IoT, and Security

Location: Ballroom
 

Speaker(s):

David Batz, Senior Director, Cyber & Infrastructure Security, Edison Electric Institute
Christopher Magnan, Senior Manager, General Dynamics Information Technology
Tom Stockmeyer, Account Executive, Unbound Tech

12:00-13:00

Lunch Break

Location: Ballroom Foyer
 

13:00-14:30

Track 1: Endpoint Security, Detection & Response

Endpoint Anti-malware Management

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Digital Pickpockets: Analyzing Mobile Malware

Speaker(s):

Marita Fowler, Senior Analyst, Capital One

Real Time Endpoint Operations at the Enterprise.

Speaker(s):

Shaun Cassells, Principal Solutions Engineer, 1E

Track 2: Automated Cybersecurity Operations

Implementing Improved SOC Processes I

Location: Holeman Lounge

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

The (r)Evolution of Cyber Threat Information Sharing: Past, Present, and Future

Speaker(s):

Dan Harkness, Cyber Security Analyst, Argonne National Laboratory

14:30-15:00

Coffee & Networking

Location: Ballroom Foyer
 

15:00-16:00

Track 1: IoT & Industrial IoT Security

Trends & Challenges

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

IoT & Cybersecurity

Speaker(s):

Christopher Magnan, Senior Manager, General Dynamics Information Technology

Secure Code Signing for IoT with Multi-Party Computation

Speaker(s):

Allan Konar, Solutions Architect, Unbound Tech
Tom Stockmeyer, Account Executive, Unbound Tech

Track 2: Threat-Driven Network Defense

Automation, Orchestration, and Actionable Threat Intelligence I

Location: Holeman Lounge

Moderator(s):

Mark Davidson, NC4
Charlie Frick, Johns Hopkins University Applied Physics Laboratory

CACAO: Insights on Cybersecurity Orchestration Cooperative Collaboration

Speaker(s):

Bret Jordan, Director of Cybersecurity, Symantec
Allan Thomson, CTO, LookingGlass Cyber Solutions

16:00-17:00

Track 1: IoT & Industrial IoT Security

Critical Infrastructure Security

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Cyber Mutual Assistance – A New Model for Electric and Gas Companies Preparing and Responding to Cyber Security Emergencies

Speaker(s):

David Batz, Senior Director, Cyber & Infrastructure Security, Edison Electric Institute

The Importance of Security Operations

Speaker(s):

Tom Utley, Senior Sales Engineer, Arctic Wolf Networks

Track 2: Threat-Driven Network Defense

Automation, Orchestration, and Actionable Threat Intelligence II

Location: Holeman Lounge

Moderator(s):

Mark Davidson, NC4
Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

Making Threat Intelligence a Shared Resource for Network Defense

Speaker(s):

Jason Mok, Initiative Lead, IACD, Johns Hopkins Applied Physics Laboratory
Todd Weller, Chief Strategy Officer, Bandura Cyber

 

October 10, 2019

08:30-17:00

08:30-09:00

Welcome Coffee & Networking

Location: Ballroom Foyer
 

09:00-09:30

Managing the Space-Time Continuum of Cyberdefense

Location: Ballroom
 

Speaker(s):

Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security

09:30-10:30

Panel - Quantum Science Meets Cyber Reality

Location: Ballroom
 

Speaker(s):

Duncan Earl, President and CTO, Qubitekk
Dr. Tommy Gardner, CTO, HP Federal
Dr. Arthur Herman, Senior Fellow, Hudson Institute
Corey McClelland, VP of Business Development, Qubitekk
Daniel Riedel, CEO, New Context

Media Content:


10:30-11:00

11:00-12:00

Panel - Global State of Privacy and Why Secure Identity Solutions are Needed

Location: Ballroom
 

Speaker(s):

Lisa A. Hayes, Vice President, Strategy & General Counsel, Center for Democracy & Technology (CDT)
Philipp Schneidenbach, Principal, Ventum Consulting
Kimberly Sutherland, VP of Fraud & Identity Market Planning, LexisNexis
Denise G. Tayloe, Co-founder and CEO, PRIVO

12:00-13:00

Lunch Break

Location: Ballroom Foyer
 

13:00-14:00

Track 1: Identity Management & Cloud Security

Privileged Access Management

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

The Journey Towards a Passwordless Enterprise

Speaker(s):

Alexei Balaganski, Lead Analyst, KuppingerCole

How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk

Speaker(s):

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer, BeyondTrust

Track 2: Security and Trust

Role of Trust in Intelligence Sharing and Automated Operations I

Location: Murrow-White-Lisagor

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory

Media Content:

Insights for Secure API Usage in Conjunction with Security Automation and Orchestration

Speaker(s):

Cody Bramlette, Cybersecurity Engineer, JHUAPL
Nam Le, IACD Integration Team Lead, Johns Hopkins University APL

Signed Control System Firmware, Parts, and Documents—Opportunity or Pain?

Speaker(s):

Ronald Brash, Director of Cyber Security Insights, Verve Industrial

14:00-14:30

Happy Hour & Networking

Location: Ballroom Foyer
 

14:30-15:30

Track 1: Privacy, Governance & Security

Zero Trust Security & Strong Authentication

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Media Content:

Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?

Speaker(s):

Peter Dougherty, CEO, Mantis Networks
Matthew Gardiner, Director of Marketing for Security Services, Mimecast
Morey J. Haber, Chief Technology Officer and Chief Information Security Officer, BeyondTrust

Track 2: Threat Intelligence Ecosystem

Role of Trust in Intelligence Sharing and Automated Operations II

Location: Murrow-White-Lisagor

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory
Duncan Sparrell, sFractal Consulting LLC

Media Content:

Lessons Learned from Almost a Decade of SCAP

Speaker(s):

Charles Schmidt, Group Lead, The MITRE Corporation

Baby Steps: An Organic Formula for Maturing Your SOC with SOAR and Threat Intelligence

Speaker(s):

Sam Hays, Senior Technical Community Manager, Splunk
Philip Royer, Research Engineer, Splunk

15:30-16:00

Track 1: Privacy, Governance & Security

Global State of Privacy

Location: Ballroom

Moderator(s):

Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole

Track 2: Threat Intelligence Ecosystem

Value of Shared Threat Intelligence

Location: Murrow-White-Lisagor

Moderator(s):

Charlie Frick, Johns Hopkins University Applied Physics Laboratory
Duncan Sparrell, sFractal Consulting LLC

Media Content:

From Band Practice to SOC Symphony

Speaker(s):

Michael Lyons, Offering Manager, IBM