CyberNext Summit 2019 & Borderless Cyber 2019 Agenda

Switch to Detailed View

Tuesday, October 08, 2019
08:30-09:00 Welcome Coffee & Networking
08:30-17:00 Check-in & Registration
09:00-09:20 Joint Welcome by KuppingerCole & OASIS
09:20-09:40 The Information Protection Lifecycle
John Tolbert, Lead Analyst, KuppingerCole
09:40-10:00 Keynote 3
10:00-10:20 A Random Walk Through Cyber Security
Dr. Ed Amoroso, CEO, TAG Cyber LLC
10:20-11:00 Coffee & Networking
Artificial Intelligence & Machine Learning for Cybersecurity
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Cybersecurity Decision-Making Strategies
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
11:00-12:00
Cognitive Security & Modern Cyber Threats

 

AI in Cybersecurity: Between Hype and Reality

 

Alexei Balaganski, KuppingerCole

 

Evaluating Our Defenses with a Data Science Approach

 

Brennan Lodge, Goldman Sachs

 

Bringing a Business Perspective to Cybersecurity Operations I

 

Opening Pandora's Box with FAIR + ATT&CK + SOAR = An Improved Cyber Security Response Strategy

 

Tyler Rorabaugh, Demisto at Palo Alto Networks

 

DODCAR Overview: Standardizing and Automating Cyber Threat Understanding for Threat-based, Cybersecurity Assessments

 

Karin Breitinger, Tensley Consulting INC.

 

12:00-13:00
AI-Driven Cyber Attacks

 

tbd

 

Cory Missimore, Baker Tilly

 

Panel - Artificial Intelligence in Cybersecurity: Recent Advances

 

Alexei Balaganski, KuppingerCole
Al Lewis, Doctoral Candidate & Independent Researcher
Brennan Lodge, Goldman Sachs

 

Bringing a Business Perspective to Cybersecurity Operations II

 

Improving IoT Safety Using Standards to Improve IoT Security

 

Duncan Sparrell, sFractal Consulting LLC

 

Making CTI Actionable: Closing the Feedback Gap

 

Michael Pepin, Celerium

 

13:00-14:00 Lunch Break
Risk Management & Cyber Intelligence
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Cybersecurity Automation Strategies
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
14:00-15:00
Effective Risk Management

 

Pragmatic CyberSecurity and Risk Reduction

 

Bruce Hafner, ClearArmor Corporation

 

Employing Automation, Standards, and Threat Intelligence I

 

Panel - Fight Smarter, not Just Faster

 

Geoff Hancock, Advanced Cybersecurity Group
Harley Parkes, Johns Hopkins University Applied Physics Laboratory

 

15:00-16:00
Cyber Threat Intelligence: Challenges & Opportunities

 

Protect the Homeland and Stay in Business: Why Privately-Owned Companies Need a Cyber Intelligence Program

 

Al Lewis, Doctoral Candidate & Independent Researcher

 

Real and Perceived Threats to the Energy Sector - 2019 and 2020

 

John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)

 

Employing Automation, Standards, and Threat Intelligence II

 

Rethinking the Future of Identity with Zero Trust

 

Corey Lewis, Idaptive

 

Security Automation and Adaptive Cyber Defense Strategies for Success - Experiences from the Financial Sector

 

Donnie Wendt, MasterCard

 

16:00-16:40 Coffee & Networking
16:40-17:00 Plenary Session I - Innovation Talks

Detect Personal Information in Hybrid Cloud Environments Using AI
Yaniv Avidan, CEO & Co-Founder, MinerEye
17:00-17:20 Plenary Session II
18:00-20:00 Happy Hour
Wednesday, October 09, 2019
08:30-09:00 Welcome Coffee & Networking
08:30-17:00 Check-in & Registration
09:00-09:20 Keynote 5
09:20-09:40 A Change of Tune - Manufacturing and Security Strike a Chord
Lisa Tuttle, CISO, SPX Corporation
09:40-10:00 The Questions a Judge Will Ask You After a Data Breach
Chris Cronin, Board Chair, The DoCRA Council
10:00-10:20 Keynote 8
10:20-11:00 Coffee & Networking
Endpoint Security, Detection & Response
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Automated Cybersecurity Operations
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
11:00-12:00
Endpoint Anti-malware Management

 

Endpoint Protection/Anti-Malware and Endpoint Detection & Response - Leadership Compass Preview

 

John Tolbert, KuppingerCole

 

Digital Pickpockets: Analyzing Mobile Malware

 

Marita Fowler, Capital One

 

Implementing Improved SOC Processes I

 

Presentation TBA

 

12:00-13:00
Endpoint-Hygiene and Best Practices

 

Cross Environment Endpoint Security

 

Ayelet Naor, Intel

 

Panel - Achieving Endpoint Security for Organisations

 

Chris Calvert, Respond Software
Ayelet Naor, Intel
Lisa Tuttle, SPX Corporation

 

Implementing Improved SOC Processes II

 

Lessons Learned from Almost a Decade of SCAP

 

Jessica Fitzgerald-McKay, NSA

 

13:00-14:00 Lunch Break
IoT & Industrial IoT Security
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Threat-Driven Network Defense
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
14:00-15:00
Trends & Challenges

 

IoT & Cybersecurity

 

Christopher Magnan, General Dynamics Information Technology

 

Secure Code Signing for IoT with Multi-Party Computation

 

Tom Stockmeyer, Unbound Tech

 

Automation, Orchestration, and Actionable Threat Intelligence I

 

Automating Open-Source Zeek (Bro) for Threat Mitigation and Response

 

Allan Thomson, LookingGlass Cyber Solutions

 

CACAO: Insights on Cybersecurity Orchestration Cooperative Collaboration

 

Bret Jordan, Symantec
Allan Thomson, LookingGlass Cyber Solutions

 

15:00-16:00
Critical Infrastructure Security

 

Cyber Mutual Assistance – A New Model for Electric and Gas Companies Preparing and Responding to Cyber Security Emergencies

 

David Batz, Edison Electric Institute

 

Innovating Access to the Critical IT Infrastructure

 

Markku Rossi, SSH.COM

 


Panel - Critical Infrastructure, IoT, and Security

 

Brian Contos, Verodin
Christopher Magnan, General Dynamics Information Technology
Tom Stockmeyer, Unbound Tech

 

Automation, Orchestration, and Actionable Threat Intelligence II

 

Decision Automation: Teaching Machines to Hunt

 

Kumar Saurabh, LogicHub

 

Making Threat Intelligence a Shared Resource for Network Defense

 

Jason Mok, IACD, John Hopkins Applied Physics Laboratory
Todd Weller, Bandura Cyber

 

16:00-16:40 Coffee & Networking
16:40-17:00 Plenary Session III
17:00-17:20 Plenary Session IV - Building our next Cybersecurity Workforce through Collaborations
Chase Norlin, CEO, Transmosis
17:40-19:00 Happy Hour
Thursday, October 10, 2019
08:30-17:00 Check-in & Registration
08:30-09:00 Welcome Coffee & Networking
09:00-09:20 Keynote 9
09:20-09:40 tbd
Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security
09:40-10:00 Keynote 11
10:00-10:20 Keynote 12
10:20-11:00 Coffee & Networking
Identity Management & Cloud Security
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Security and Trust
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
11:00-12:00
Privileged Access Management

 

The Journey Towards a Passwordless Enterprise

 

Alexei Balaganski, KuppingerCole

 

Privileged Access Management: Approach, Phases and Lessons Learned

 

Reena Parekh, KPMG

 


How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk

 

Morey J. Haber, BeyondTrust

 

Role of Trust in Intelligence Sharing and Automated Operations I

 

Panel - Quantum Science Meets Cyber Reality

 

Duncan Earl, Qubitekk
Tommy Gardner, HP Federal
Arthur Herman, Hudson Institute
Daniel Riedel, New Context

 

12:00-13:00
Zero Trust Security & Strong Authentication

 

Identity in Local Government - Case Study of How Fairfax County Bridges Enterprise and Resident Identity

 

Robert Barr, Fairfax County, VA

 


Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?

 

Robert Barr, Fairfax County, VA
Matthew Gardiner, Mimecast
Morey J. Haber, BeyondTrust

 

Role of Trust in Intelligence Sharing and Automated Operations II

 

Insights for Secure API Usage in Conjunction with Security Automation and Orchestration

 

Cody Bramlette, JHUAPL
Nam Le, Johns Hopkins University APL

 

Signed Control System Firmware, Parts, and Documents—Opportunity or Pain?

 

Ronald Brash, Verve Industrial

 

13:00-14:00 Lunch Break
Privacy, Governance & Security
Moderator:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Threat Intelligence Ecosystem
Moderator:
Charlie Frick, John Hopkins University Applied Physics Laboratory
14:00-15:00
Global State of Privacy

 

The Reverse Engineering of Trust - Why More Tech Is Not the Answer

 

Philipp Schneidenbach, Ventum Consulting

 

Value of Shared Threat Intelligence I

 

The (r)Evolution of Cyber Threat Information Sharing: Past, Present, and Future

 

Dan Harkness, Argonne National Laboratory

 

What Really Means Actionable Threat Intelligence Today?

 

David Bizeul, SEKOIA

 

15:00-16:00
Governance, Risk and Compliance

 

Emerging Cyber Risks

 

Georgea Mancuso, Black Marjieh & Sanford

 

Panel - Current State of Data Security & Privacy in US & EU

 

Lisa A. Hayes, Center for Democracy & Technology (CDT)
Georgea Mancuso, Black Marjieh & Sanford
Philipp Schneidenbach, Ventum Consulting
John Tolbert, KuppingerCole

 

Value of Shared Threat Intelligence II

 

Presentation TBA

 

16:00-16:40 Coffee & Networking
16:40-17:00 Closing Remarks
John Tolbert, Lead Analyst, KuppingerCole

Quick Links

Book together with Borderless Cyber

And get your early bird discount

Stay Connected

Information

Washington, D.C. - USA

Conference

CyberNext Summit 2019

Language:
English
Registration fee:
€1000.00
€700.00 till 15.09.2019
$1250.00
$875.00 till 15.09.2019
S$1600.00
S$1120.00 till 15.09.2019
11000.00 kr
7700.00 kr till 15.09.2019
Mastercard Visa American Express PayPal
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Oct 08 - 10, 2019 Washington, D.C. - USA
Register now!

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00