CSX Europe Presentations and Descriptions 

 
 

As the program is developed, we will continue to add information to this page – check back frequently for updates!

Beginner Beginner
Intermediate Intermediate
Advanced Advanced

Track 1—Emerging Security Tools & Techniques

This track will provide attendees with concise information on emerging blockchain technology, cognitive technology, and emerging technology and the risks, implications and constraints associated with the adoption of these tools and various best practices to increase security related to them. More and more companies are turning to various emerging tools and techniques to save time and money. This track will equip the attendees with the strategies and common use cases for ensuring data remains secure.

111–Cyber Hunt, Session 1 Intermediate

Monday, 29 October | 10:00 – 11:00

2017 Top-Rated SpeakerFrank Downs
Director and SME, Cybersecurity Practice
ISACA

 

 

Dustin Brewer
Manager, Cybersecurity Technical Content
ISACA

*Each session is limited to 50 attendees, this is a first come, first serve ticketed event. Please select the session at the time of registration.

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

Challenge subsets include the following skills:

  • Network scanning;
  • Vulnerability identification;
  • System hardening;
  • System exploitation;
  • Exploitation response; and
  • Much, much more!

After completing this session, you will be able to:

  • Better understand asset identification and location via scanning techniques;
  • Understand how to identify vulnerabilities on a system of responsibility;
  • Better harden systems of responsibility;
  • Understand elements of conducting a penetration test; and
  • Understand elements of responding to an incident or attack.

Master’s Class
121–Cyber Hunt, Session 2 Intermediate

Wednesday, 29 October | 11:15 – 12:15

2017 Top-Rated SpeakerFrank Downs
Director and SME, Cybersecurity Practice
ISACA

 

 

Dustin Brewer
Manager, Cybersecurity Technical Content
ISACA

*Each session is limited to 50 attendees, this is a first come, first serve ticketed event. Please select the session at the time of registration.

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

Challenge subsets include the following skills:

  • Network scanning;
  • Vulnerability identification;
  • System hardening;
  • System exploitation;
  • Exploitation response; and
  • Much, much more!

After completing this session, you will be able to:

  • Better understand asset identification and location via scanning techniques;
  • Understand how to identify vulnerabilities on a system of responsibility;
  • Better harden systems of responsibility;
  • Understand elements of conducting a penetration test; and
  • Understand elements of responding to an incident or attack.

131–Information Coming Soon!

Monday, 29 October | 13:30 – 14:30

 


141–Five Ways for Securing SD-Wan Beginner

Monday, 29 October | 14:45 – 15:45

Brian Tokuyoshi
Palo Alto Networks

The emergence of SD-WAN introduces several complexities when looking at how to approach network security. This session will examine pros and cons for different network topologies.

After completing this session, you will be able to:

  • Understand background on SD-WAN adoption
  • Understand the 5 approaches towards securing SD-WAN
  • Identify Pros and Cons for different security measures
  • Identify criteria for deciding what works best for your requirements.

151–Penetrating Blockchain: How to Hard Distributed Blockchain Implementations Intermediate

Monday, 29 October | 16:15 – 17:15

Tony Gee
Security Consultant
Pen Test Partners

Blockchain tends to be perceived as secure by default but is this really the case? This session will explore how node, ledger and application security can be attacked and how organisations can assess and harden implementations.

After completing this session, you will be able to:

  • Understand the inherent weaknesses in Blockchain
  • Envisage future blockchain uses and the risks inherent in these
  • Have strategies for assessing vulnerabilities in the three areas specific to Blockchain ie node, ledger and application security
  • Put in place methods to help harden Blockchain implementations

211–Cybersecurity Performance: A Quantitative Approach Intermediate

Tuesday, 30 October | 10:00 – 11:00

Vinko Zlmosilic
Mercury Processing Services International

Cyber security management requires a strategic approach, supports business objectives, and counters prevalent threats. Quantification of the security posture is a significant enabler, which is presented through a specific methodology.

After completing this session, you will be able to:

  • Connect the organizational cyber security objectives with quantitative evaluations
  • Describe quantitative parameters required for security measurement
  • Develop cyber security performance measurement in an organization
  • Utilize cyber posture quantification for strategic and tactical decision making

221–FinTechs Between the Rise & the Challenge Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

Mahmoud Abouelhassan
Senior Manager
E-Finance

The rise of FinTechs firms whose providing technology based financial services and/or products have major role in the digital economy and they facing big challenges that we need to be aware of.

After completing this session, you will be able to:

  • Gain insight into Fintechs role in the digital economy and how to employ emerging technologies to support the rise of Fintechs
  • Identify challenges facing Fintechs and how to handle these challenges

231–No Silver Bullets: Cybersecurity in the Cognitive Era Advanced Technical

Tuesday, 30 October | 13:30 – 14:30

Neil Warburton
Security Architect
IBM

We'll investigate how cognitive technology is being applied in real organizations today, and try to get beyond the marketing and hype to understand this fundamental shift coming our way.

After completing this session, you will be able to:

  • Investigate how cognitive technology can help with security
  • Discuss threats in more detail.
  • Learn how to incorporate cognitive technology to help secure your organisation
  • Discuss the growing migration from compliance to risk-focused security

241–New Approach to Data Centric Security Intermediate

Tuesday, 30 October | 14:45 – 15:45

Nitin Aggarwal
Principal Consultant
InfoSys

New approach to security wherein Attribute Based access control is used to secure data across all applications in an enterprise and also when the data moves out of the application and even outside the organization.

After completing this session, you will be able to:

  • Get an overview of "Attribute Based Access Control" concept and understand how it can be applied to different enterprise applications
  • Learn ways of securing data in a standardized / centralized manner across all enterprise applications using policies including dynamic masking of data in productive systems
  • Understand how Digital rights management can be applied to Enterprise applications to secure sensitive data / documents on the move
  • Plan a solid data security strategy to comply with regulations such as GDPR

251–Blockchain: Everyone Is Selling, But Is It Right? Advanced Technical

Tuesday, 30 October | 16:15 – 17:15

Marco Ermini
Senior Security Architect
Telefonica Germany

Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project?

After completing this session, you will be able to:

  • Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems.
  • Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with "traditional" technology.
  • What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization.
  • How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials.

311–Trends in Application Security: Good & Bad Decisions Intermediate

Wednesday, 31 October | 8:30 – 9:30

Sergiu Zaharia
BearingPoint

The session presents why secure code review is important, how can be improved via machine learning algorithms and the benefits of full integration with other application security testing types, like pen-testing.

After completing this session, you will be able to:

  • Understand what the secure code review process is and where is it located within the application security context.
  • Understand how the secure code review analysis is executed and how the code is fixed (no commercial product involved).
  • Understand how Machine Learning concepts can improve the secure code review process.
  • Identify trends in applications security and their applicability in the IoT area.

321–The Coming Security & Privacy Risks Behind BCI Solutions Advanced Technical

Wednesday, 31 October | 9:45 – 10:45

Pablo Ballarin
Balusian

BCI solutions generate, process and transmit data coming from the brain activity. Security needs to understand why they are bringing completely new types of threats to our security and privacy, and what type of multidisciplinary strategy is needed.

After completing this session, you will be able to:

  • Understand how BCI solutions work and how they generate, process and transmit data coming from the brain activity.
  • Why the security and privacy threats that can affect those solutions have a completely different nature from the threats affecting traditional IT systems.
  • Understand why current security solutions and privacy legislations might not be enough to face those new threats.
  • Understand why current security industry needs to look at emerging technology differently, and why it needs to evolve in a multidisciplinary manner.


Return to Event Page >>
 

Track 2—Security Risk & Compliance

There are security risks associated with the web and other information technologies. Enterprises are exposed to them due to misconfiguration of systems resulting in vulnerabilities which increase their risk factor. This track will focus on computing security concepts including access control and management, governance, and risk-management strategies and best practices including the requirements to compliance with multiple security-related regulations.

112–Designing a Simple & Effective ISMS Advanced Managerial

Monday, 29 October | 10:00 – 11:00

Richard Hollis
CEO
RiskFactory

How do you meet your governance, risk and compliance requirements and implement a proven framework for preventing a breach? The session details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to manage information risk across the business and meet legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements.

After completing this session, you will be able to:

  • Structure an ISMS applicable to the business objectives
  • Define the scope, objectives & risk strategy
  • Design a risk treatment plan, asset register & classification guide “fit for purpose”
  • Build a policy framework & identify control objectives, evidence, testing & auditing requirements

122–Information Coming Soon!

Monday, 29 October | 11:15 – 12:15

 


132–Information Coming Soon!

Monday, 29 October | 13:30 – 14:30

 


142–Cloud Security & Risk Management: Security as a Service & Security Compliance in the Cloud Intermediate

Monday, 29 October | 14:45 – 15:45

Scott Harvey
Security Services Manager
Oracle Corporation

This session will be focused around going to the cloud. What can a company expect for security and compliance when going to the cloud? Security as a Service offerings, cloud security compliance for GDPR, HIPAA, PCI etc.

After completing this session, you will be able to:

  • Have a better understanding of the overall security and compliance approach used by cloud providers to keep data secure and adhere to standards.
  • Understand in detail more about Security as a Service which comes with their cloud offerings. What risk am I transferring to the cloud provider and what will I own for a cyber security program?
  • Understand in more detail about security compliance frameworks considered by cloud service providers. GDPR,HIPAA, PCI-what capabilities does my cloud service provider have to meet my data requirements?
  • Understand database security, vulnerability, web application, firewall networking for a cloud infrastructure.

152–Prepare Against Ransomware Intermediate

Monday, 29 October | 16:15 – 17:15

Claudio Cilli
University of Rome

Ransomware is the new frontier of cyber-attacks. Prevention begins from user with the adoption of proper measures. The presentation focuses on what a user can do to protect against cyber-attacks and what a company can do to ensure a safe environment.

After completing this session, you will be able to:

  • Know how ransomware works and why is so effective
  • Understand the social engineering flow which induces user to activate ransomware
  • Identify and understand vulnerabilities and reduce the threats
  • Understand the important role of user awareness and training

212–Integrating Data Protection Aspects into Development of Cyber Physical Systems Intermediate

Tuesday, 30 October | 10:00 – 11:00

Jana Karina Von Wedel
Invensity GmbH

Christian Beul
Invensity GmbH

A new approach aimed at integrating data protection topics into existing development processes and thereby achieving compliance with data protection regulations that follows the V-model and is inspired by concepts from functional safety development.

After completing this session, you will be able to:

  • Describe why data protection topics must be integrated into the development of cyber-physical systems handling personal data and which are the aspects to be considered
  • Describe how data protection topics for cyber-physical systems relate to the cyber security concepts of such systems and how synergies can be benefited from
  • Describe a clearly structured approach based on established and proven workflows aimed at integrating data protection topics into existing development processes
  • Describe how to prove and maintain compliance with data protection regulations by following such an approach

222–DPIA in Practice Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

Levente Habany
IT Security Officer
Bank of China Hungaria Ltd.

GDPR requires appropriate technical and organisational measures to be implemented for the protection of personal data. How to fix in a DPIA what is appropriate? Using the OSI model helps to tackle threats under the whole lifecycle of data processing.

After completing this session, you will be able to:

  • Understand the link between GDPR data protection principles and the generally accepted IT security principles.
  • Establish a meaningful structure for a data protection impact analysis which allows to take into consideration all potential threats to the processing of personal data, including legal, technical, organisational and IT risks.
  • Understand what the 'appropriate' level of protection of the personal data means in GDPR - both as far as organisational and technical protection measures are concerned in the application of Articles 24, 25 and 28.
  • See how decisions, relating to the analysed IT project, can be based on the structured analysis that the usage of OSI model is offering in combination with the data protection principles, when included in the Data Protection Impact Analysis concept.

232–Crypto Agility: Security Event Response Intermediate

Tuesday, 30 October | 13:30 – 14:30

Broderick Perelli-Harris
Senior Director of Solution Architecture, EMEA
Venafi

Most enterprises aren’t maintaining crypto-agility—the ability to quickly replace encryption certificates and keys in response to security events. Hear recent examples of security events and get an actionable plan for achieving crypto-agility.

After completing this session, you will be able to:

  • Understand the large-scale certificate and key security events that threaten organisations, including real-world examples
  • Know how to evaluate the current crypto-agility of their organisation
  • Develop a crypto-agility plan for their network environment that will successfully respond to certificate security events
  • Leverage certificate governance to improve risk posture

242–Do You Protect Your Machine Identities? Intermediate

Tuesday, 30 October | 14:45 – 15:45

Gordon Hutton
Head of Professional Services, EMEA
Venafi

There are two kinds of actors on every network—people and machines. We spend billions securing passwords but almost nothing protecting the keys and certificates machines use to authenticate themselves. Learn how to control machine identity risks.

After completing this session, you will be able to:

  • Understand what serves as machine identities and how this compares to human identities on the internet and networks, as well as how each impacts the need for protection.
  • Know how the definition of machine is evolving and how that impacts the exploding number of machines and their need for protection.
  • See the key reasons organizations aren’t protecting machine identities, including challenges in management and security.
  • Determine the level of maturity of their organizational machine identity protection and how to create a short-term and long-term roadmap for improving machine identity protection within their organization.

252–Third Party Risk Management Intermediate

Tuesday, 30 October | 16:15 – 17:15

Manoj Agarwal
Head of Internal Audit
Metro Shoes Limited

Today, most organizations are outsourcing critical business operations to third parties. While internal business activities present a level of risk, it is third party relationships that make overall risk management challenging.

After completing this session, you will be able to:

  • Learn how to assess risks emerging out of outsourced activity.
  • Learn how to define governance surrounding contract governance.
  • Determine how to protect the organization's interests through contract governance and audit.
  • How to help operation in gearing up to meet challenge of managing third party risk.

312–Cyber Crisis Management, Part 1 Beginner

Wednesday, 31 October | 8:30 – 9:30

Guy Dagan
CAO
Consienta

 

 

Oren Elimelech
CyberTeam 360

Cyber crisis management relies heavily on internal communication. During a breach miscommunication poses a huge risk to the response process and remediation time. The exercise promotes the organizations’ preparation increasing the knowledge emphasise

After completing this session, you will be able to:

  • Understand where team coordination is most difficult? What can we do to improve it?
  • Are there any steps currently performed by other members that can be done to reduce friction?
  • increase the knowledge base and emphasize what should be done in case of a cyber-attack.
  • Raise awareness

322–Cyber Crisis Management, Part 2 Beginner

Wednesday, 31 October | 9:45 – 10:45

Guy Dagan
CAO
Consienta

 

 

Oren Elimelech
CyberTeam 360

Cyber crisis management relies heavily on internal communication. During a breach miscommunication poses a huge risk to the response process and remediation time. The exercise promotes the organizations’ preparation increasing the knowledge emphasise.

After completing this session, you will be able to:

  • Understand where team coordination is most difficult? What can we do to improve it?
  • Are there any steps currently performed by other members that can be done to reduce friction?
  • Increase the knowledge base and emphasize what should be done in case of a cyber-attack.
  • Raise awareness


Return to Event Page >>
 

Track 3—Cyber Threat Intelligence & Technologies

This track will focus on the threats associated with operating on the web. Threats and attacks are increasing rapidly. Enterprises erroneously believe their network infrastructures are safe. This track will also focus on methods used to attack corporate networks and how to prevent them.

113–Hacking Closed Networks Advanced Technical

Monday, 29 October | 10:00 – 11:00

2017 Top-Rated SpeakerIra Winkler
Secure Mentem

People believe that a large portion of critical infrastructures are safe, because they are on closed networks. While the networks may be closed, they are not safe. This presentation shows methods to attack closed networks, and how to prevent them.

After completing this session, you will be able to:

  • Understand that closed networks might not be closed, and even if they are, they are not immune from attack.
  • Identify potential attack vectors of closed networks.
  • Understand the real risk posed by attack vectors targeting closed networks.
  • Determine how to better secure both closed and open networks.

123–Information Coming Soon!

Monday, 29 October | 11:15 – 12:15

 


133–Information Coming Soon!

Monday, 29 October | 13:30 – 14:30

 


143–Rise of the Machines: Protecting the New Identities Intermediate

Monday, 29 October | 14:45 – 15:45

Tammy Mostkites
Managing Director & Senior Security Executive
Accenture

There are two kinds of actors on every network—people and machines—and both need to be secured. People rely on user names and passwords, but machines don’t.

After completing this session, you will be able to:

  • Learn that identities are more than just User ID's and Passwords and the importance of Machine Identities.
  • Recognize the different types of machines identities, where they proliferate in your network
  • Identify the risks of digital/machine identities bring to your environment.
  • Understand the importance of managing Machine Identities and steps you can take immediately to get these risks under control.

153–Breaches 2013-2018: What Can We Learn? Intermediate

Monday, 29 October | 16:15 – 17:15

Todd Fitzgerald
Managing Director/CISO
CISO Spotlight, LLC

We all talk about the rising number of breaches, but how much do you know about what happened and the response? This session will examine the breaches, responses and most importantly, the lessons learned. We will discuss what we would have done.

After completing this session, you will be able to:

  • Communicate the breaches of the past 5 years and the lessons learned
  • Discuss different technical approaches to mitigating risk
  • Discuss different responses and what works and what doesn't
  • Build knowledge into future company breach protection and response

213–Threat Intelligence Sharing: Trusted Circles & ISAC’s Intermediate

Tuesday, 30 October | 10:00 – 11:00

Manoj Patel
Senior Advisory, Security & Risk Global Practice
ServiceNow

What's all the fuss about? Why share threat intelligence? The bad guys share tools, tactics and procedures. Prevent Bad Guys. Learn about Threat Intelligence, Trusted Circles (ISACs), and Sightings Search. It's about: Immunity by Community.

After completing this session, you will be able to:

  • Learn about what are ThreatIntel, Sighting Search, ISACs and Trusted Security Circles
  • Understand Importance of Threat Sharing How to use Threat intelligence to identify, remediate and/or assess the impact of a cyber attack
  • How to drive, Drive Immunity by community
  • Find current resources for Threat Sharing.

223–Applying a Threat Based Approach to Security Testing Intermediate

Tuesday, 30 October | 11:15 – 12:15

Joe Vest
SpectreOps

Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and conduct vulnerability assessments. How do you know if they protect against real threats?

After completing this session, you will be able to:

  • Understand differences between vulnerabilities and cyber threat tactics, techniques and procedures (TTPs) and how approaching security from a threat perspective can dramatically reduce operational risk due to cyber activities
  • Understand how the inclusion of cyber threat TTPs in security operations planning, design, implementation, and testing can greatly improve organizational security posture by applying a threat-based approach to security testing
  • Distinguish between common security testing types used to measure an organization's security posture and identify the gaps threat-based security testing can address
  • Understand the concepts of Red Teaming, Adversarial Emulation, and Threat Emulation as they are defined and explored as a means to perform threat-based security testing

233–Cyber Warfare & The New Threat to Security Intermediate

Tuesday, 30 October | 13:30 – 14:30

Claudio Cilli
University of Rome

Cyber-warfare is the last frontier of human insanity. Rules of cyber-war and how dangerous an information warfare can be, and why it can be used against a nation or a big company. How to protect critical infrastructure from information flooding.

After completing this session, you will be able to:

  • Know critical infrastructures: what they are and why they need to be protected
  • Comprehend cyber-warfare definition and techniques
  • Understand the rules of cyber-warfare
  • Protect their companies against cyber-attacks

243–A Framework for Choosing an ISMS Intermediate

Tuesday, 30 October | 14:45 – 15:45

Steve Mair
Senior Cyber Security Consultant
PGI Cyber

There are several different security management systems in use, but how do you know which is the right one for your business? Here we’ll look at practical guidance on how to choose the most appropriate models and systems for your organisation.

After completing this session, you will be able to:

  • Identify some of the more common security models and understand how they should change in the future
  • Identify some of the common security management systems in use today, and the key differences between them
  • Determine business requirements and map those on to security management systems
  • Decide which security management systems are most appropriate for their organisation

253–The Supply Chain: A Major Threat? Advanced Managerial

Tuesday, 30 October | 16:15 – 17:15

Peter Smith
Head of Information Security
Tokio Marine Kiln

Real life study in managing supply chain risk in the financial services industry.

After completing this session, you will be able to:

  • Understand the options for supply chain management
  • Give CISOS and CIOs an understanding of the regulatory drivers
  • Know how supply chain risks management fits in overall risks management
  • Understand the nature of supply chain risk

313–The Art of Red Teaming Without Insulting Beginner

Wednesday, 31 October | 8:30 – 9:30

Frans Szabo
Senior Security Specialist
Rabobank

Red Teaming is considered the "next level" of obligatory security controls. But if you do RT properly, you will disclose flaws made by colleagues. And they are the ones who must solve the issues. How to you keep away from a game of denial?

After completing this session, you will be able to:

  • Understand the basic difference between penetration testing and Red Teaming.
  • Why Red Teaming is seen as a threat by many Blue Teams
  • Talk to Red Teamers without getting angry
  • Give the proper follow-up on recommendations made by the Red Team and know how to put the "problems" discovered to a (communicational) advantage.

323–The Five P’s of Breach Response Intermediate

Wednesday, 31 October | 9:45 – 10:45

2017 Top-Rated SpeakerBen Smith
RSA

Organizations of all sizes are under attack today, and one common challenge is how ill-prepared we all tend to be while responding. Learn how to most effectively combine people, processes, and technologies in the midst of a breach response.

After completing this session, you will be able to:

  • Understand that effective breach response begins *before* the breach occurs.
  • Appreciate the key importance of leveraging business context of affected assets in the midst of a breach response.
  • Recognize how to incent and retain technical personnel in what is traditionally a high-burnout profession.
  • Understand the unique attack vector represented by third parties.


Return to Event Page >>
 

Track 4—Security Governance

This track will provide attendees with tools and techniques to effective security program to risk and comply with security regulations. It will cover components of the NIST Cybersecurity Framework and the European Privacy regulations. It will also cover concepts and processes that will help an enterprise create and maintain an effective and sustainable security program.

114–How to Build Valuable CSIRTS/SOC’s with Constrained Budgets Advanced Managerial

Monday, 29 October | 10:00 – 11:00

Vilius Benetis
NRD Cyber Security

Computer Security Incident Response Teams and Security Operations Centers (CSIRT/SOCs) are considered the proper ways to build resilience to cyber-threats. Speaker will discuss best practices from own experience building such capabilities.

After completing this session, you will be able to:

  • Identify key success factors to CSIRT/SOC buildouts and understand definitions of the discipline.
  • Process requirements for own CSIRT
  • Quantify value of becoming members of FIRST and regional CSIRT organisations.
  • Prepare own plan to move into formalised CSIRT/SOC operations.

124–Information Coming Soon!

Monday, 29 October | 11:15 – 12:15

 


134–Information Coming Soon!

Monday, 29 October | 13:30 – 14:30

 


144–The Ocean is Full of Phish Intermediate

Monday, 29 October | 14:45 – 15:45

Todd Fitzgerald
Managing Director/CISO
CISO Spotlight, LLC

Session will discuss costs of phishing, how to develop a phishing security awareness program, selecting a phishing product, questions to ask, and a case study of rolling out phishing.

After completing this session, you will be able to:

  • Build an information security Phishing awareness program
  • Understand the costs and ROI model of phishing
  • Review an actual case study of phishing in a global organization.
  • Select a phishing product by asking the right questions

154–IoT Privacy Maturity Framework & Solutions Intermediate

Monday, 29 October | 16:15 – 17:15

Vinayak Sastri
IBM India

The talk aims to present the challenges of privacy in the Internet of Things world and potential solutions to tackle the same. This would be presented through a comprehensive maturity framework to understand privacy in the IoT landscape. The IoT landscape is fast changing the data privacy landscape and is creeping into every aspect of life. The framework aims to simplify the IoT and privacy landscape in a unique combination which has never been attempted to be understood before.

After completing this session, you will be able to:

  • Understand the areas and industries that IoT will impact the world and specific industries
  • Understand the privacy challenges that would be pervasive across industries and enable participants to categorise them basis the IoT / privacy matrix
  • Identify potential solutions to tackle privacy challenges using the matrix and look at ways to implement the same basis the maturity matrix.
  • Assess the financial implications for tackling privacy challenges, risks to revenue and profitability and identify potential cost drivers

214–Shadows of the Cloud: Dealing with Shadow IT Advanced Managerial

Tuesday, 30 October | 10:00 – 11:00

Matthew Harvey
Senior Consultant
CrowdStrike

Organizational users increasingly turn to consumer-oriented, third-party services for their work. We will explore how to deal with this challenge, from policy and governance to technical controls to mitigate the risk of this type of "shadow IT."

After completing this session, you will be able to:

  • Conduct an assessment of an organization's risk from the use of shadow IT and requirements for protection from these risks.
  • Define an organizational policy and plan for addressing information security risk stemming from the use of shadow IT.
  • Select appropriate technical and procedural measures to mitigate an organization's information security risk stemming from the use of shadow IT.
  • Describe the functioning and implementation of multiple key technical security measures used to mitigate information security risk stemming from the use of shadow IT.

224–Why Awareness Efforts Fail Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

2017 Top-Rated SpeakerIra Winkler
Secure Mentem

 

 
 

Tracy Celaya
Go Consulting International

Awareness efforts essentially attempt to get users to practice strong security behaviors. The problem is that these behaviors should be required, and not just encouraged. We show how to embed behaviors into governance and make them requirements.

After completing this session, you will be able to:

  • Understand how security related behaviors create vulnerable business practices.
  • Identify business processes that require strong user security behaviors.
  • Specify the user behaviors that should be embedded into the business processes.
  • Create awareness programs that make people aware of their required behaviors.

234–Challenges in Cybersecurity Program Development Advanced Managerial

Tuesday, 30 October | 13:30 – 14:30

Chris Moschovitis
CEO
TMG-Emedia, INC.

The talk will cover the main phases of cybersecurity program development and the challenges we must overcome to successfully develop and manage the program throughout its life cycle.

After completing this session, you will be able to:

  • Identify the phases of cybersecurity program development and the challenges presented at each phase, and the recommended approaches to successfully address them.
  • Have an easy to follow roadmap to successfully implement a cybersecurity program.

244–Impact of GDPR on Third Party and M&A Security Advanced Managerial

Tuesday, 30 October | 14:45 – 15:45

Marco Ermini
Senior Security Architect
Telefonica Germany

GDPR impact has been dissected and examined to death - however, M&A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that.

After completing this session, you will be able to:

  • Understand the general impact of GDPR on M&A prospects.
  • Evaluate the impact of GDPR on third-party and outsourcing security.
  • Identify if specific programs need to be set-up in your organization because of the GDPR, which ones affect third-party, outsourcing and M&A processes, and how.
  • Get a clearer picture of what "privacy" means in the context of M&A activities, outsourcing and third-party involved in business processes.

254–Chief Security Officer: A View of the Equifax Breach Intermediate

Tuesday, 30 October | 16:15 – 17:15

Eva Thorne-Holst
Chief Security Officer
UC AB

In 2017 Equifax, a US credit information company, was hacked and had to report a breach affecting over 140 million posts of personal data. My presentation will summarize what media has reported regarding the hack and I will share what I and UC (Sweden's largest credit information company) have learned from the Equifax hack and how we work to improve our cyber resilience. I will share hands on tips for how to identify relevant controls and implement them in business-as-usual within a small to mid-size organization. I will also present how UC has chosen to work with modern solutions, including AI/machine learning tools as well as more traditional tools and procedures to enhance cyber resilience.

After completing this session, you will be able to:

  • At a high level, understand what went wrong before, during and after the Equifax hack.
  • Understand the kind of information that will be generated and decisions that will need to be made when an organization starts implementing modern security solutions.
  • Understand the importance of connecting organizational readiness with technical readiness.
  • Compile a catalogue of critical controls for cyber resilience and how these can be integrated into business-as-usual within the organization.

314–DevSecOps: Bringing the Security: The Missing Link in Delivering on the Promise of Business Velocity & Quality to DevOps

Wednesday, 31 October | 8:30 – 9:30

2018 Top-Rated SpeakerRob Stroud
Chief Product Officer
XebiaLabs
ISACA Board of Directors

There is one constant in all our lives – change! Change is accelerating driven by disruptive technologies which are fueling innovative business models across every vertical from Banking to public services. To succeed with Innovation at speed, IT organizations must accelerate their release velocity - and do it with greater quality, security, and availability! Enter DevOps!

For most organizations, the transition to DevOps starts small, in a single team or a new project with cobbled together open source solutions, with security often an afterthought. To scale effectively, deploying daily or hourly or even more frequently, requires organizations treat security as a first-class citizen – engaged in all aspects of the development and deployment lifecycle. Robert will share market trends, tips and techniques to incorporate security into the complete DevOps lifecycle – delivering DevSecOps.

After completing this session, you will be able to:

  • Explain the core DevOps and DevSecOps principles
  • Identify the key components of DevSecOps in the SDLC
  • Analyze the SDLC and select the appropriate security techniques to incorporate
  • Develop techniques to transition skills to product teams

324–Creating Adaptable Security Awareness Program in a Global Corporation Intermediate

Wednesday, 31 October | 9:45 – 10:45

Ales Zupan
Principal Consultant
BrightStar Consulting

All major security frameworks recognize Security Awareness of organization’s associates as a key protective measure against information breaches. However, breaches still happen. Is there something wrong with our security awareness approach?

After completing this session, you will be able to:

  • Identify components of an effective Information security awareness and training program.
  • Understand key indicators to measure the efficiency of awareness and training activities.
  • Create an awareness program that would fit their environment.


Return to Event Page >>
 

Workshops

WS1—Cybersecurity Fundamentals

Saturday, 27 October; Sunday, 28 October | 9:00 – 17:00

Richard Hollis, CISM, CRISC
CEO
Risk Factory Ltd.

Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamentals workshop is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This workshop will also prepare learners for the CSX Fundamentals Exam.


WS2—CSX Penetration Testing Overview

Saturday, 27 October; Sunday, 28 October | 9:00 – 17:00

2017 Top-Rated SpeakerFrank Downs

 

 

 

Dustin Brewer

The Cybersecurity Nexus (CSX) Penetration Testing Overview (CPTO) course provides students an introductory understanding of penetration testing and ethical hacking. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will understand the overall concepts guiding penetration testing from a practical, hands-on vantage point.

*Please note: To fully participate in this workshop, all attendees are required to bring a laptop with an Internet accessible browser.

 

Return to Event Page >>

 

Keynotes

Opening Keynote Speaker

The Next Big Hacking Challenge

Monday, 29 October | 8:30 – 9:30

James Lyne
Cyber Security Expert, Global Head of Security Research at Sophos

James is a self-professed 'massive geek' and has technical expertise spanning a variety of the security domains from forensics to offensive security. He has worked with many organisations on security strategy, handled a number of severe incidents and is a frequent industry advisor. James is a certified instructor at the SANS Institute and is often a headline presenter at industry conferences.

James firmly believes that one of the biggest challenges we face is in making security accessible and interesting to those outside the industry. As a result, he takes every opportunity to educate on security threats and best practice - always featuring live demonstrations and scenarios of how cyber criminals operate in the real world.

James has given multiple TED talks, including at the main TED event. He's also appeared on a long list of national TV programmes to educate the public including CNN, NBC, BBC News, Bill Maher and John Oliver. As a spokesperson for the industry, he is passionate about talent development, regularly participating in initiatives to identify and develop new talent for the industry.

Use patterns from social media to bizarre internet of things are rapidly changing at home and at work. Alongside this cyber criminals have previously unseen levels of sophistication tools but most interestingly motives that are changing in impactful ways. In this session, James Lyne will reveal some of the latest trends from the criminal underground and the challenge ahead for us as businesses, individuals and security practitioners to thwart their attacks.


Closing Keynote Speaker

The Future Of Cybersecurity – From A Friendly Hacker's Perspective

Wednesday, 31 October | 11:00 – 12:15

Keren Elazari
Strategic Cyber Security Analyst, Author & Researcher

Keren Elazari is an internationally acclaimed security researcher, author and strategic analyst, with years of experience in the international cybersecurity industry. Since 2000, Keren has worked with leading Israeli security firms, government organizations, Big 4 firms, advised Fortune 500 and groundbreaking startup companies, helping global organizations navigate complex cybersecurity issues. Elazari’s independent research work and writing about emerging security issues has been featured by Scientific American, WIRED, and she is a frequent speaker and commentator in international events and in the media.

Ms. Elazari holds an MA in Security Studies from the prestigious Security & Technology workshop at Tel Aviv University – where she is a senior researcher with the Blavatnik Interdisciplinary Cyber Research Center, focusing on the complex relationships between hackers, industry and government. Elazari is also a Security Fellow with Singularity University, a private future-oriented think tank.

In 2014, Keren became the first Israeli woman to speak at the annual TED conference. Keren’s TED talk has been viewed by millions online, translated to 27 languages and selected for TED’s list of ‘Most Powerful Ideas in 2014’ and Inc.com’s list of ‘Top TED Talks of 2014’. Her collaborative book with 8 leading women, Women in Tech, was published by Penguin USA in March 2016 and became an Amazon bestseller.

Cybersecurity is no longer about protecting secrets. It's about our way of life: from autonomous cars, to webcams medical devices, to the manipulation of political campaigns and global markets. But are you thinking about what's next? This talk will aim to inspire the audience of security professionals to take action about the things that require our attention the most. We will shed light on emerging security threats and inspire the audience to take action with practical ideas on how to make a difference in their organizations – and what we can learn from, and work with, friendly hackers. We will discuss the future workforce and business challenges in this space and how to foster more diversity in cybersecurity. Finally, we’ll take a look at the future of cybersecurity and learn why resilience will be defined not just by our efforts to balance technology’s benefits against the risks it brings with it - but by how we evolve our paradigms about security, privacy and digital access.


Culture of Cybersecurity Panel

Tuesday, 30 October | 8:30 – 9:30

ISACA and CMMI Institute debut findings of their inaugural Culture of Cybersecurity global research study at CSX 2018. The results will be analyzed and explored across a panel of experts representing cybersecurity teams and senior leaders. Discussion includes recommendations on how to embed a culture of cybersecurity in your organization and its importance in your overall business strategy.

 

Return to Event Page >>