2018 Red Sky Security Conference - Denver

November 7, 2018
Magness Arena at the University of Denver
  • Keynote speakers Dr. Charlie Miller and Chris Valasek give insight into how devices get hacked and discuss some of their favorite techniques and bugs they have used over time.
  • Engage with 40+ leading technology companies offering leading solutions to improve your organization’s security posture.
  • Participate in 16 breakout sessions throughout the day that focus on topics like cyber risk management, securing cloud workloads, breach management, and the role of machine learning and AI in security.
  • Stop by our Hacker Lounge where you can test your skills in our Wifi Cracking and Exploiting Vulnerabilities exercises and interact with our engineering team.
  • Meet your local security peers and hear from them in one of several breakout sessions (organizations include City of Aurora, Centura Health, Aetna, and Holland & Hart).
  • Women in Security members meeting
More Details

Keynote Speakers

Speakers

Expo Sponsors

Experience the Hacker Lounge

At our Exploiting Vulnerabilities exercise, participants will be deploying an exploit to a vulnerable Windows server and using a privilege escalation to change a password and exfiltrate data. Our Wifi Cracking exercise attendees will capture WiFi authentication packets, crack the WPA2 key and connect to a network using that key.

Schedule

  • 07 November

Dr. Charlie Miller

Principal Autonomous Vehicle Security Architect
Cruise Automation
Currently the Principal Autonomous Vehicle Security Architect at Cruise Automation, Dr. Charlie Miller is "one of the most technically proficient hackers on Earth", according to Foreign Policy.

A former National Security Agency hacker and 4-time winner of Pwn2Own, the “Super Bowl” of computer hacking, Dr. Miller gained national attention after he and research partner Chris Valasek hacked a 2014 Jeep Cherokee and took control of the vehicle from more than 10 miles away.

A Principal Autonomous Vehicle Security Architect at Cruise Automation and the former head of the autonomous vehicle security division at Didi Chuxing, Dr. Miller focuses on society’s increasing connectivity and the opportunities it creates for harmful intrusions. Dr. Miller has been featured on the Today Show, ABC World News Tonight, CNN, NPR, CNBC, New York Times, USA Today, Forbes, etc.

07 November

Chris Valasek

Principal Autonomous Vehicle Security Architect
Cruise Automation
Chris Valasek is a Security Architect at Cruise Automation. Valasek is regarded for his work in the automotive security arena. Valasek was lauded for the remote compromise of a 2014 Jeep Cherokee, whereby he and his research partner obtained physical control of the vehicle. Valasek specializes in reverse engineering and exploitation research. Chris has a B.S. in Computer Science from the University of Pittsburgh and is the chairman of SummerCon, America's longest running hacker conference.

07 November

Aaron Miller

SE Director, America’s Channel
Palo Alto Networks
Aaron Miller is the Systems Engineering Director for America’s Channel at Palo Alto Networks, currently based out of Denver, CO.Miller is a passionate leader and evangelist, with deep expertise in business technology and digital strategy, and is regularly called upon to consult with both customers and partners on the disruption that is pervasive in the market today.He joined Palo Alto Networks in March 2016, having previously held the position of director and chief architect at Avaya, a role in which he supported customers in understanding how they could adapt to the changing needs of their own users, and helping organizations of all types to deal with the impact of technology transformation.

During a 15-year career with Avaya, Miller held a number of senior technical roles in both R&D and sales engineering, working with both global accounts and service provider customers. He leveraged his insight and expertise to lead a team of consulting engineers, building trust and ensuring customer satisfaction. Through his continuous engagement with many of the largest companies in Europe, he provided guidance and consultation on the adoption of new technology and shared thoughts on best practices.

From providing feedback on strategies around digital transformation to helping empower businesses in constructing a sound cybersecurity posture, Miller operates at the intersection of business strategy and technology innovation.

Miller graduated from Cornell University’s College of Engineering with a Bachelor of Science degree in operations research and industrial engineering.

07 November

Aleta Jeffress

CIO
City of Aurora
Aleta Jeffress a business technologist who is passionate about connecting the dots across the organization, understanding objectives, and building the teams, partnerships, and strategies to meet business needs.

07 November

Ben Eichorst

Security Solutions Architect
AWS
Ben Eichorst is a Security Solutions Architect with AWS who currently resides in the Denver, CO area. He brings nearly two decades of experience in systems architecture, security design, and technological strategy to bear on improving customer outcomes.

07 November

Cameron Williams

Founder and CTO
OverWatchID
For more than 25 years, Cameron Williams has helped enterpise clients like IBM, Wells Fargo, Sony, BP, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security.

Cam has leveraged his deep expertise in high-profile data breach mitigation efforts on behalf of the entertainment industry, oil and gas, finance, high tech, and other Fortune 500 firms. Prior to co-founding OverWatchID, Cam held senior positions with InteliSecure, Juniper Networks, Pulse Secure, Virtela Technology Services, IBM, and MCI. Cam studied computer science at North Carolina State University and pre-med at Penn State University. Cam lives in Denver with his daughter Alaura and dog Zoe. He is a competitive Ironman and is an internationally ranked parathlete.

07 November

Darrin Thomason

Solutions Architect Director
Arista Networks
Darrin Thomason is a Solutions Architect Director with Arista Networks, where he is responsible for designing and delivering integrated network solutions for customers. Darrin works directly with customers and partners to develop open and scalable data center architectures that meet the business needs combined with the appropriate security posture for the enterprise and cloud scale data centers. Darrin has over 20 years of experience in networking and security and immediately prior to joining Arista, was the Lead IT Architect with State Farm Insurance where he was responsible for the Data Center and Business Transaction Application Framework architectures. When not spending time on airplanes or visiting customers, Darrin enjoys mentoring and coaching the next generation leaders within the technology industry. More from Darrin talking about Arista Networks UCN Design for Campus

07 November

DJ Schleen

Security Architect
Aetna Global Security
DJ is a DevSecOps pioneer and currently works as a DevSecOps Evangelist and Security Architect at a Fortune 50 healthcare organization. He provides DevSecOps thought leadership throughout their journey of cultural revolution and digital transformation. DJ specializes in automating security controls in DevSecOps environments and is an ethical hacker as well – doing significant R&D work in Moving Target Defense, Mobile Security, System Exploitation, and Penetration Testing.

As an expert in Application Lifecycle Management (ALM) and the IT Infrastructure Library (ITIL), DJ has worked to streamline development pipelines for many Fortune 100 organizations by focusing on people, process, and the right technology. He is an active speaker, blogger, instructor and author in the growing DevSecOps community where he encourages organizations to deeply integrate a culture of security into their core values and product development journey.

07 November

Greg Foss

Senior Manager of Threat Research
LogRhythm

07 November

Joe Martin

Security Solution Architect
F5

07 November

Leah Schoeb

Technical Marketing Engineer
Rubrik
Leah Schoeb is a Master Technologist at Rubrik who brings extensive expertise ranging from cloud infrastructure and virtualization to system and data infrastructure performance. She has a wide breadth of experience in the computer industry including helping companies optimize their virtualization and data solution strategies. Prior to joining Rubrik, Leah served in several leadership roles at Turbonomic, VMware, Sun Microsystems, Dell, Intel, and Amdahl.

07 November

Mahesh Popudesi

Senior Product Manager
Aruba
MS. MBA.(UC Berkeley)
Engineer, product guy. Designed and built Networking and Security products across several domains such as VOIP, Network Intrusion detection, Network Access Control, over the last 17 years. 

07 November

Manoj Kulkarni

Director of Product Management for SD-WAN
Silver Peak
Manoj Kulkarni has over thirteen years of diversified product management experience leading enterprise, service provider and device OEMs products in the security, cloud, IoT, networking, and mobile solutions.Currently, he is a Director of Product Management for SD-WAN at Silver Peak Systems. Before Silver Peak,at Juniper and Pulse Secure, Manoj worked with Enterprises and service providers globally for on premise VPN and cloud VPN services and led the launch of VPN, NAC appliance management and mobility enablement as a SaaS offering. Prior to Juniper, he launched a successful company that was acquired by Mocana (leaders in IOT security products) and helped drive company's IOT security product strategy. 

07 November

Mark Thames

Americas Security Partner Leader
Juniper Networks
As Juniper Networks Americas Security Partner Leader, Mark is responsible for the strategy and programs to enable, support, and reward partners in the US, Canada, and CALA for selling Juniper’s Security Solutions. Mark is a 20+ year veteran in the Information Security and Networking industry with multiple Silicon Valley based companies. Mark’s background includes being a large Juniper customer and decision maker, and selling Juniper solutions at an Elite Juniper Partner. Previous to Juniper, Mark was Sr. Director of Networks and Security for Polycom. Mark is a proud Veteran of the United States Air Force, where he focused on Networking and Security, and has a Bachelor of Arts in Business from Concordia University Texas.

07 November

Nancy Phillips

CISO
Centura Health
Nancy Phillips is the Chief Information Security Officer (CISO) responsible for providing leadership and strategic direction for proactively combating data security risks for the evolving digital and health care needs of Centura Health.
Nancy has more than 30 years of experience in all aspects of the data security arena from architecting secure solutions, establishing security programs or running large organizations responsible for security operations delivery. She began her career in the military intelligence community and then transitioned to consulting, where she designed and implemented security technologies and programs including multiple 24x7 security service capabilities for managed services or for organizations. Her most recent role before joining Centura Health was as the CISO for Datavail where Nancy was responsible for the execution of security controls as well as maintaining a strong governance, risk and compliance program.
Nancy holds a bachelor’s in computer information systems management from Colorado Christian University as well as her Certified Information Systems Security Professional (CISSP) certificate. Nancy is a founding member of a special interest group throughInformation Systems Security Association (ISSA) Denver Chapter called Women in Security, and serves as a Community Outreach Chair.

07 November

07 November

Rich Spilde

Partner
Holland and Hart

07 November

Romaine Marshall

Partner
Holland and Hart

07 November

Ryan Cramer

Staff Channel Sales Engineer
Splunk

07 November

Sean Frazier

Advisory CISO - Federal
Duo Security
Sean Frazier is Advisory CISO, Federal at Duo Security. Prior to joining Duo, Sean spent more than 25 years working in technology and public sector security for companies such as Netscape, LoudCloud/Opsware, Proofpoint, Cisco & MobileIron.

Sean has helped lead numerous projects used by the Department of Defense and Intelligence Community, including the Fortezza Crypto Card, Defense Messaging System (DMS) and many others. He also has extensive experience in identity and public key infrastructure (PKI), network, applications, mobile and IoT.

07 November

Tim McCain

CISO
City of Aurora
Tim McCain is a seasoned information security and privacy professional, with governance and management experience at every level of the enterprise. His ability to bridge the knowledge gap between law and IT is a result of almost two decades collaborating with diverse disciplines to achieve compliance and maintain it through a mature governance capability.

07 November

Vince Berk

Deputy CTO
Riverbed

07 November

Red Sky

Host
Red Sky solutions is a next-generation cybersecurity company, providing security services and solutions across the entire IT stack. With a strong culture of research and development, Red Sky delivers rich cybersecurity services, managed services and integrated solutions. This is achieved by complete alignment of our three core groups; Applied Research, Red Sky Labs, and Engineering. Red Sky’s cybersecurity risk management practice binds these groups into a unified, holistic, cybersecurity company. As part of our R&D culture, Red Sky has developed and hosts the Mountain Regions largest cybersecurity conference. It features renowned security speakers, expert education, emerging technology reviews, and peer interactions across all industries.

Palo Alto Networks

Diamond Sponsor
Palo Alto Networks offers the world’s most innovative and effective, complete Next-Generation Security Platform that protects our way of life in the digital age by preventing successful cyberattacks.

Amazon Web Services

Platinum Sponsor
Amazon Web Services (AWS) is a secure cloud services platform, offering compute power, database storage, content delivery and other functionality to help businesses scale and grow. Explore how millions of customers are currently leveraging AWS cloud products and solutions to build sophisticated applications with increased flexibility, scalability and reliability.

Aruba Networks

Gold Sponsor
Aruba securely delivers the enterprise network to users, wherever they work or roam, with unified mobility networks that significantly expand the reach of traditional port-centric networks. Unified mobility networks integrate adaptive WLANs, identity-based security, and application continuity services into a cohesive, high-performance system that can be easily deployed as an overlay on top of existing network infrastructure. Adaptive WLANs deliver high-performance, follow-me connectivity so users are always within reach of mission-critical information. Identity-based security associates access policies with users, not ports, to enable follow-me security that is enforced regardless of access method or location. Application continuity services enable follow-me applications that can be seamlessly accessed across WLAN and cellular networks. The cost, convenience, and security benefits of unified mobility networks are fundamentally changing how and where we work. Listed on the NASDAQ and Russell 2000 Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions.

Juniper Networks

Gold Sponsor
Juniper Networks is a news network that designs, develops, and sells products and services, which together provide its customers with network infrastructure. Its aim is to create innovative products and solutions that meet the growing demands of the connected world. The company has 9,000 employees in 70 countries and nearly 5 billion U.S. dollars in revenue. Its customers include the top 100 global service providers and 30,000 enterprises, including the Global Fortune 100 as well as hundreds of federal, state, and local government agencies and higher educational organizations.

LogRhythm

Silver Sponsor

OverWatchID

Silver Sponsor

Arista

Bronze Sponsor

Duo

Bronze Sponsor

F5

Bronze Sponsor
F5 Networks delivers solutions that make applications fast, secure, and available.
F5 Networks delivers unified application delivery through its application delivery network. Its core product, BIG-IP, is a modularized application delivery controller offering load balancing, high-availability, application acceleration, application and network security, WAN optimization, and remote access solutions for enterprises and service providers.
Unique to F5 is its extensible application delivery platform, iRules, which allows application and security architects the ability to offload and implement commodity features and proactively deploy security and application related functionality that improves application deployments without requiring changes to those applications.

Forescout

Bronze Sponsor
ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

Riverbed

Bronze Sponsor

Rubrik

Bronze Sponsor

Silver Peak

Bronze Sponsor
Silver Peak software unifies the cloud, the Internet and the enterprise WAN on a single fabric. This provides IT with complete visibility and control over the new cloud-driven network while ensuring consistent performance for every enterprise and Software as a Service (SaaS) application.
Silver Peak solves network bandwidth, distance and quality challenges, which helps customers backup and recover more data in less time, gain faster access to cloud and enterprise applications, and safely migrate enterprise apps from costly, complex private links to the Internet.

Splunk

Bronze Sponsor

A10

Expo Sponsor
A10 Networks provides appliances for accelerating web application delivery, bandwidth management and network identity issues

Apcon

Expo Sponsor

BeyondTrust

Expo Sponsor
BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged account management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

Carbon Black

Expo Sponsor

Carbonite

Expo Sponsor

Checkpoint

Expo Sponsor

Cisco

Expo Sponsor

Citrix

Expo Sponsor

Crowdstrike

Expo Sponsor

Cylance

Expo Sponsor
Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems.

ExtraHop

Expo Sponsor
ExtraHop provides real-time operational intelligence for complex, dynamic production environments. The world’s best-run IT organizations use ExtraHop to manage more than a quarter-million devices and monitor billions of transactions daily. Unlike legacy monitoring tools that provide narrow views into technology silos, the ExtraHop system equips all IT groups with real-time visibility across the entire application delivery chain comprising the network, web, VDI, API and middleware, database, and storage tiers—down to individual sessions, flows, and transactions. An open, extensible platform, ExtraHop deploys in 15 minutes without agents, provides immediate value, and scales to cover all applications with zero overhead.

Fidelis Security

Expo Sponsor

Firemon

Expo Sponsor

Fortinet

Expo Sponsor

Gigamon

Expo Sponsor

Gemalto

Expo Sponsor

Guardicore

Expo Sponsor

Ixia

Expo Sponsor

Mimecast

Expo Sponsor

Netscout

Expo Sponsor

Nutanix

Expo Sponsor

Portnox

Expo Sponsor

Proofpoint

Expo Sponsor

Recorded Future

Expo Sponsor

Ruckus

Expo Sponsor

Securonix

Expo Sponsor

SentinelOne

Expo Sponsor
SentinelOne is shaping the future of endpoint security with a uniquely integrated platform that combines behavioral-based detection, advanced mitigation, and forensics to stop threats in real-time. Specializing in attacks that utilize sophisticated evasion techniques, SentinelOne is the only vendor who offers complete protection against malware, exploit and insider-based attacks. This led Gartner to recognize SentinelOne as a Visionary in their recent Endpoint Protection Magic Quadrant.

Skybox

Expo Sponsor

Skyhigh

Expo Sponsor

Swimlane

Expo Sponsor

Thycotic

Expo Sponsor

Tufin

Expo Sponsor
Tufin is a network security company specializing in the management of network layer firewalls, routers, switches, load balancers, and other network security devices.
Its product portfolio includes Tufin SecureTrack, a platform offering firewall operation management, and auditing and compliance; Tufin SecureChange, a security change automation service; and Tufin SecureApp, a connectivity management application.
Tufin’s products also help companies to manage and automate the daily configuration changes to network security devices. It was founded by Reuven Harrison in 2004.

Unitrends

Expo Sponsor

Vertiv

Expo Sponsor

Check-in and On-Site Registration

08:30 AM 03:00 PM

Holland and Hart: GDPR Understood

09:00 AM 10:00 AM Gold Club

Speakers

Keynote: Dr. Charlie Miller & Chris Valasek

10:00 AM 11:00 AM Main Stage

In this talk, they will begin by discussing at a high level of how computers and devices get hacked, in particular how many techniques rely on vulnerabilities in the underlying software. I’ll briefly discuss some popular forms of finding vulnerabilities and why it is so difficult to find these flaws. I’ll then walk through examples of some of my favorite bugs I’ve discovered over the years, and discuss in these cases why they were particularly difficult to find, why common techniques may have failed on them, or why they were especially impactful.

Speakers

AWS: AWS Security—From Strategy to Real World Application

11:30 AM 12:30 PM Main Stage

A presentation of AWS cloud-native security services and features presented by an AWS security architect. Content will cover the breadth of security services available, highlight specific use cases and customer examples, and connect the AWS security service portfolio with the AWS Cloud Adoption Framework (CAF) and overall cloud security strategy.

Speakers

Aruba: Evolution of Threat Landscape in 2018 and how to detect threats in your Enterprise using UEBA

11:30 AM 12:30 PM North Concourse

The threat landscape has evolved since last year. Ransomware no longer needs the human element to propagate in your network. IoT Malware is on the rise. Threat actors masquerade behind legitimate cloud services like AWS, Google Cloud Platform etc. Insider threat has grown across multiple industry segments. In this presentation, we will introduce User, Entity Behavioral Analytics and talk about how it uses Machine Learning to bubble up anomalies in your network and to give you a 360 degree visibility around Entities and their activities in your network.

Speakers

Arista Networks: Your network is fast - security shouldn’t kill the speed!

11:30 AM 12:30 PM South Concourse

You just built a brand new data center with 100s of Terabits of forwarding capacity…and you have to secure segments from one another thus making your shiny new race car run as fast as a 15 year old golf cart. Learn how to implement security at the speed of the cloud without compromising your network or your security policies.

Speakers

City of Aurora: The journey of Public Sector Security

11:30 AM 12:30 PM Gold Club

Speakers

Lunch Keynote - Palo Alto: Transforming Security to Combat Public Cloud Threats

12:30 PM 01:30 PM Main Stage

As organizations adopt the public cloud to keep pace with business needs, addressing the wide range of cloud threats is a challenge. Cloud application are evolving from lift-and-shift architectures to leveraging PaaS components and distributed architectures, and security practitioners have a dilemma to choose between native services from cloud providers or extend their legacy tools. Join us for a discussion around various threats within public cloud platforms, and how to transform your security strategy for IT, DevOps and Compliance teams.

Speakers

Splunk: An Introduction to Using Data Analytics for Detecting Fraud

02:00 PM 02:00 PM Main Stage

Fraud takes many forms, depending on the organization or people being targeted. Most digital fraud, however, shares many of the same concepts, regardless of the vertical or nuances of the individual business. This introduction to using big data analytics for fraud detection will provide some high-level concepts that can be immediately applied to any business with concerns surrounding digital fraud.

Speakers

Juniper: Using Automation to Enforce Security Policy in a Multi-Cloud World

02:00 PM 03:00 PM North Concourse

As Cybercrime continues to strive, Security Professionals are struggling with how to automate repetitive tasks and enforce policy. The threats are growing faster than the people qualified to address the problem. As threats continue to thrive and morph using automation, one of the main challenges CISOs have is how to use automation to enforce the policies they create, and address the zero day threat without breaking everything. On top of that, their borders are now gone, and the traditional fortress of their corporate network is now in multiple environments, with users and “things” all over the place. We will discuss ways to address some of these most pressing issues.

Speakers

F5: The Hunt for IoT: Building Thingbots Hiding In the Shadows

02:00 PM 03:00 PM South Concourse

Our modern world depends on healthy, functioning, IoT devices. Unfortunately, many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and Red Sky where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted.

Speakers

Aetna Global Security: DevSecOPs in Today’s World

02:00 PM 03:00 PM Gold Club

Speakers

Duo: Trust In the Age of Zero Trust

03:00 PM 04:00 PM Main Stage

Everything you know about security has changed. The accelerated move to mobile and cloud technologies are forcing us to move faster than ever before and faster than is comfortable for most established organizations. Automation, Zero Trust networks and trust analytics are the only way we get out alive.

This session covers how Duo and Cisco are working together to help organizations migrate to a modern, zero-trust architecture in a structured, practical way. Sean Frazier, Duo's Advisory CISO, will discuss how real customers are using Duo to gain better network visibility and implement granular access management policies tailored for the risk profiles of each user, device, and application being accessed.

Speakers

Silver Peak: Revolutionizing the WAN

03:00 PM 04:00 PM North Concourse

Security is a major concern for enterprises, and the new cloud-first model requires a different, application-driven approach to securing the branch. The Silver Peak Unity EdgeConnect SD-WAN solution enables simplified orchestration of application-driven security policies and integrates with best-of-breed ecosystem partners while protecting current investments. The outcome is the automation of granular security policies which dramatically reduces amount of time and the complexity in managing and controlling applications across the distributed enterprise.

Speakers

Rubrik: Attacked? Prevent, Detect, and Mitigate or Pay Up!

03:00 PM 04:00 PM South Concourse

Security attack stories are released weekly read more like a sequel. For some, this may be a bad dream. For others, they sleep like babies knowing their data is secure. New variants and new attack tactics arise almost daily in this sophisticated landscape of malware. Did you know ransomware penetrates a corporate firewall every 40 seconds? Have you ever heard of Ransomware-as-a-Service? If you answered "no" to one of these questions, then you need to arm yourself by peering through the ransomware looking glass.

Join this session, led by Rubrik’s Leah Schoeb (Master Technologist), to learn more:

  • Threat: Concerns that IT departments are facing. We’ll stay away from FUD, but life is sometimes scary.
  • Theory: Nowadays, everyone has backups. So why are people still paying ransoms? (Clue: Complexity)
  • Solutions: Yes, you can do more than just have a current resume when hit by ransomware. We’ll explore what you can do in this event and how Rubrik can help along with other unexpected benefits.

Speakers

Centura Health: Healthcare Security Trends

03:00 PM 04:00 PM Gold Club

Speakers

Logrhythm: Phishing – Easy as PIE

04:00 PM 05:00 PM Main Stage

Phishing is often the bane of a security analyst's existence. Even with all of the fancy tools in place, organizations still have to be prepared to handle targeted attacks, scams, generic spam, and more as they continue to reach end users. The toughest part is the fact that analyzing, tracking, and reporting on these attacks is a massive time sink - costing organizations valuable time and money.

For this reason, we've been hard at work developing an open source toolset to help streamline and automate the entire process of tracking, analyzing, and responding to phishing emails, without the need for commercial software. The Phishing Intelligence Engine (PIE) -- a PowerShell Active Defense framework built around Office 365, that continuously evaluates Message Trace logs for malicious contents, and dynamically responds as threats are identified or emails are reported. All links, files, and other potential malware are dynamically sandboxed for analysis and results are streamlined to the SOC without the need for manual intervention. If the message is deemed 'dirty' PIE will hard-delete all mail from every recipient's inbox, and extract copies of each, along with refined metadata to a case folder for the SOC to analyze.

Speakers

OverWatchID: Uncover the Realistic Path to Implementing the Zero Trust Framework

04:00 PM 05:00 PM North Concourse

In today’s IT environments, personnel are inundated with requests, maintenance, updates, deployments, and defending against threats. New technologies and paradigms are interesting and could provide a path to improved security, but no one has time to take the risk to find out.

Learn how to address these challenges while also implementing the zero-trust framework. As a result, you strengthen your company’s security posture and defend your information and infrastructure against insider threats and external attackers.

Speakers

Riverbed: Defending the network is not a spectator sport

04:00 PM 05:00 PM South Concourse

Traditional security posture has centered around building defenses and responding to incidents. And although these are necessary, they are by no means sufficient in todays world where the an increasingly advanced adversary is evolving at the same pace as we are evolving the sophistication of our detection tooling. By realizing that a big wall is no longer enough to keep the network safe, we are admitting we take a more dynamic approach to security. Cyber hunting is the art of actively seeking out and disabling the most skilled and dangerous network intruders. Hunting is best done with dedicated teams with ubiquitous of access to telemetry across the network. The hunters must have an "active defense" mindset, as they need to realize that they are playing a cat & mouse game with other humans on the other end. This talk explores the challenges surrounding effective cyber hunting, from building an executive-level use case, building out a telemetry gathering network, and evolving the security game from static defense to active pursuit.

Speakers

Women In Security

04:00 PM 06:00 PM Gold Club

Speakers

Happy Hour

05:00 PM 06:00 PM