CSX Europe Presentations and Descriptions 

 
 

As the program is developed, we will continue to add information to this page – check back frequently for updates!

Beginner Beginner
Intermediate Intermediate
Advanced Advanced

Track 1—Emerging Security Tools & Techniques

This track will provide attendees with concise information on emerging blockchain technology, cognitive technology, and emerging technology and the risks, implications and constraints associated with the adoption of these tools and various best practices to increase security related to them. More and more companies are turning to various emerging tools and techniques to save time and money. This track will equip the attendees with the strategies and common use cases for ensuring data remains secure.

111–Cyber Hunt, Session 1 Intermediate

Monday, 29 October | 10:00 – 11:00

2017 Top-Rated SpeakerFrank Downs
Director and SME, Cybersecurity Practice
ISACA

 

 

Dustin Brewer
Manager, Cybersecurity Technical Content
ISACA

*Each session is limited to 50 attendees, this is a first come, first serve ticketed event. Please select the session at the time of registration.

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

Challenge subsets include the following skills:

  • Network scanning;
  • Vulnerability identification;
  • System hardening;
  • System exploitation;
  • Exploitation response; and
  • Much, much more!

After completing this session, you will be able to:

  • Better understand asset identification and location via scanning techniques;
  • Understand how to identify vulnerabilities on a system of responsibility;
  • Better harden systems of responsibility;
  • Understand elements of conducting a penetration test; and
  • Understand elements of responding to an incident or attack.

Master’s Class
121–Cyber Hunt, Session 2 Intermediate

Monday, 29 October | 11:15 – 12:15

2017 Top-Rated SpeakerFrank Downs
Director and SME, Cybersecurity Practice
ISACA

 

 

Dustin Brewer
Manager, Cybersecurity Technical Content
ISACA

*Each session is limited to 50 attendees, this is a first come, first serve ticketed event. Please select the session at the time of registration.

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

Challenge subsets include the following skills:

  • Network scanning;
  • Vulnerability identification;
  • System hardening;
  • System exploitation;
  • Exploitation response; and
  • Much, much more!

After completing this session, you will be able to:

  • Better understand asset identification and location via scanning techniques;
  • Understand how to identify vulnerabilities on a system of responsibility;
  • Better harden systems of responsibility;
  • Understand elements of conducting a penetration test; and
  • Understand elements of responding to an incident or attack.

131–A Path to Achieving Network Security ZEN

Monday, 29 October | 13:30 – 14:30

Den Jones
Director of Enterprise Security
Adobe

 

 

Carlos Martinez
Sr. Enterprise Security Engingeer
Adobe

Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. If you do not find the right balance, users may revolt! The need to use a certain username and password for some services while saving additional credentials for other services can contribute to a headache for both security pros and users. Users encounter access and authentication controls many times during their day – so, is it even possible to balance greater security while still providing a good overall user experience? Adobe believes this is possible. Project “ZEN” is a framework developed by Adobe to help achieve this balance.

Project ZEN is an initiative based upon principles found in zero-trust frameworks. Since there is no “off-the-shelf” solution to fully deliver on these principles today, ZEN consists of pioneering technology and policies to make the path to a zero-trust network more efficient and attainable. The ZEN initiative plans to accomplish the following:

  • Remove the need for VPN and replace usernames/passwords with certificate-based authentication and multiple options for second factor authentication (2FA). 2FA will only be required as needed based on data security policies.
  • Leverage existing network controls combined with machine learning to control network access.
  • Help prevent lateral movement within the network during an incident or breach scenario.
  • Better automate management of access to internal applications to streamline the overall user experience while also tightening security controls.
  • Deploy device management technology across user devices.
  • Deploy a “trust score engine” that will better automate access rules based upon real-time data.

After completing this session, you will be able to:

  • Llearn about the principles behind Adobe ZEN
  • Understand the Adobe experience so you can start your own journey by leveraging existing security technology investments and targeted automation technologies
  • Explore common issues you might encounter along the journey, with guidance on overcoming those issues.

141–Five Ways for Securing SD-Wan Beginner

Monday, 29 October | 14:45 – 15:45

Brian Tokuyoshi
Palo Alto Networks

The emergence of SD-WAN introduces several complexities when looking at how to approach network security. This session will examine pros and cons for different network topologies.

After completing this session, you will be able to:

  • Understand background on SD-WAN adoption
  • Understand the 5 approaches towards securing SD-WAN
  • Identify Pros and Cons for different security measures
  • Identify criteria for deciding what works best for your requirements.

151–So Apparently the Blockchain Fixes Everything … Hacking the Blockchain Intermediate

Monday, 29 October | 16:15 – 17:15

  Download Presentation

Tony Gee
Security Consultant
Pen Test Partners LLP

 

 

Luke Turvey
Security Consultant
Pen Test Partners LLP

Blockchain tends to be perceived as secure by default but is this really the case? This session will explore how node, ledger and application security can be attacked and how organisations can assess and harden implementations.

After completing this session, you will be able to:

  • Understand the inherent weaknesses in Blockchain
  • Envisage future blockchain uses and the risks inherent in these
  • Have strategies for assessing vulnerabilities in the three areas specific to Blockchain ie node, ledger and application security
  • Put in place methods to help harden Blockchain implementations

211–Cybersecurity Performance: A Quantitative Approach Intermediate

Tuesday, 30 October | 10:00 – 11:00

  Download Presentation

Vinko Zlomislic
Mercury Processing Services International

Cyber security management requires a strategic approach, supports business objectives, and counters prevalent threats. Quantification of the security posture is a significant enabler, which is presented through a specific methodology.

After completing this session, you will be able to:

  • Connect the organizational cyber security objectives with quantitative evaluations
  • Describe quantitative parameters required for security measurement
  • Develop cyber security performance measurement in an organization
  • Utilize cyber posture quantification for strategic and tactical decision making

221–FinTechs Between the Rise & the Challenge Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

  Download Presentation

Mahmoud Abouelhassan
Senior Manager
E-Finance

The rise of FinTechs firms whose providing technology based financial services and/or products have major role in the digital economy and they facing big challenges that we need to be aware of.

After completing this session, you will be able to:

  • Gain insight into Fintechs role in the digital economy and how to employ emerging technologies to support the rise of Fintechs
  • Identify challenges facing Fintechs and how to handle these challenges

231–No Silver Bullets: Cybersecurity in the Cognitive Era Advanced Technical

Tuesday, 30 October | 13:30 – 14:30

  Download Presentation

Neil Warburton
Security Architect
IBM

We'll investigate how cognitive technology is being applied in real organizations today, and try to get beyond the marketing and hype to understand this fundamental shift coming our way.

After completing this session, you will be able to:

  • Investigate how cognitive technology can help with security
  • Discuss threats in more detail.
  • Learn how to incorporate cognitive technology to help secure your organisation
  • Discuss the growing migration from compliance to risk-focused security

241–New Approach to Data Centric Security Intermediate

Tuesday, 30 October | 14:45 – 15:45

  Download Presentation

Nitin Aggarwal
Principal Consultant
InfoSys

New approach to security wherein Attribute Based access control is used to secure data across all applications in an enterprise and also when the data moves out of the application and even outside the organization.

After completing this session, you will be able to:

  • Get an overview of "Attribute Based Access Control" concept and understand how it can be applied to different enterprise applications
  • Learn ways of securing data in a standardized / centralized manner across all enterprise applications using policies including dynamic masking of data in productive systems
  • Understand how Digital rights management can be applied to Enterprise applications to secure sensitive data / documents on the move
  • Plan a solid data security strategy to comply with regulations such as GDPR

251–Blockchain: Everyone Is Selling, But Is It Right? Advanced Technical

Tuesday, 30 October | 16:15 – 17:15

Marco Ermini
Senior Security Architect
Orange Business Services GmbH

Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project?

After completing this session, you will be able to:

  • Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems.
  • Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with "traditional" technology.
  • What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization.
  • How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials.

311–Trends in Application Security: Good & Bad Decisions Intermediate

Wednesday, 31 October | 8:30 – 9:30

  Download Presentation

Sergiu Zaharia
BearingPoint

The session presents why secure code review is important, how can be improved via machine learning algorithms and the benefits of full integration with other application security testing types, like pen-testing.

After completing this session, you will be able to:

  • Understand what the secure code review process is and where is it located within the application security context.
  • Understand how the secure code review analysis is executed and how the code is fixed (no commercial product involved).
  • Understand how Machine Learning concepts can improve the secure code review process.
  • Identify trends in applications security and their applicability in the IoT area.

321–Don’t Hack My Brain! The Coming Security & Privacy Risks Behind Brain Computer Interface Solutions Advanced Technical

Wednesday, 31 October | 9:45 – 10:45

  Download Presentation

Pablo Ballarin
Balusian

BCI solutions generate, process and transmit data coming from the brain activity. Security needs to understand why they are bringing completely new types of threats to our security and privacy, and what type of multidisciplinary strategy is needed.

After completing this session, you will be able to:

  • Understand how BCI solutions work and how they generate, process and transmit data coming from the brain activity.
  • Why the security and privacy threats that can affect those solutions have a completely different nature from the threats affecting traditional IT systems.
  • Understand why current security solutions and privacy legislations might not be enough to face those new threats.
  • Understand why current security industry needs to look at emerging technology differently, and why it needs to evolve in a multidisciplinary manner.


Return to Event Page >>
 

Track 2—Security Risk & Compliance

There are security risks associated with the web and other information technologies. Enterprises are exposed to them due to misconfiguration of systems resulting in vulnerabilities which increase their risk factor. This track will focus on computing security concepts including access control and management, governance, and risk-management strategies and best practices including the requirements to compliance with multiple security-related regulations.

112–Designing a Simple & Effective ISMS Advanced Managerial

Monday, 29 October | 10:00 – 11:00

  Download Presentation

Richard Hollis
CEO
RiskFactory

How do you meet your governance, risk and compliance requirements and implement a proven framework for preventing a breach? The session details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to manage information risk across the business and meet legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements.

After completing this session, you will be able to:

  • Structure an ISMS applicable to the business objectives
  • Define the scope, objectives & risk strategy
  • Design a risk treatment plan, asset register & classification guide “fit for purpose”
  • Build a policy framework & identify control objectives, evidence, testing & auditing requirements

122–8 Controls: 85% Reduction in Risk

Monday, 29 October | 11:15 – 12:15

  Download Presentation

Piers Wilson
Head of Product Management
Huntsman Security

It has been said that continuous measurement and audit is a nirvana for managing risk. In cybersecurity the threats and regulatory challenges are growing all the time with the technology and supply chain landscape becoming more complex.

This talk will discuss how the measurement of 8 key controls is being used to deliver more cost-effective cybersecurity – in a measurable, auditable and consistent way. We will demonstrate this with some examples of cost effective approaches to automated and continuous cybersecurity auditing.

After completing this session, you will be able to:

  • Understand the cyberrisk picture – and the factors that exacerbate this like resources and technology.
  • See how some other parts of the world are trying to deliver more measurable and cost effective cybersecurity.
  • Learn from examples where continuous measurement of control effectiveness delivers benefits to auditors, risk managers and supply chain management.

132–Cyber Risk: It’s All About People

Monday, 29 October | 13:30 – 14:30

John Bass
Director, Global Data Risk
Duff & Phelps

Major breaches most often have a human dimension. This talk discusses a holistic approach to cybersecurity, examining both technical and human elements of risk, for a comprehensive corporate security program including c-suite engagement on risks.

After completing this session, you will be able to:

  • Understand that the dominant approach in commercial cyber security is technical, involving penetration testing. This model is predicated on understanding possible attack capabilities and methods of likely attackers.
  • Learn how to implement a comprehensive corporate security program – with employees, customers and vendors expecting to interact dynamically with core systems, and managing the cyber risks of the partner ecosystem, supply chain and vendors.
  • Determine ways to handle the human element in cyber-security risks, what happens when someone clicked on a weaponized link because of a lack of training, or a trusted contractor deployed a Trojan device to a conferencing telephone.
  • Involve c-suite engagement on cyber risks: Corporations need to ask who on high has the responsibility to bridge the gap between technical and human aspects of cybersecurity, and the implications for the modern corporation.

142–Cybersecurity Capability & Resilience

Monday, 29 October | 14:45 – 15:45

  Download Presentation

Doug Grindstaff
New Market & Business Developer
CMMI Institute

87% of C-suite professionals and board members lack confidence in their organization’s cybersecurity initiatives, yet it’s the #1 corporate governance challenge. Cyberthreats never stop evolving, so your cybersecurity program shouldn’t either. Learn how the CMMI Cybermaturity Platform, an ISACA Cyber Solution, prioritizes weaknesses in your cybersecurity capabilities with a continually updated, evidence-based approach, so you can efficiently and effectively improve—and wisely invest.


152–Prepare Against Ransomware Intermediate

Monday, 29 October | 16:15 – 17:15

  Download Presentation

Claudio Cilli
University of Rome

Ransomware is the new frontier of cyber-attacks. Prevention begins from user with the adoption of proper measures. The presentation focuses on what a user can do to protect against cyber-attacks and what a company can do to ensure a safe environment.

After completing this session, you will be able to:

  • Know how ransomware works and why is so effective
  • Understand the social engineering flow which induces user to activate ransomware
  • Identify and understand vulnerabilities and reduce the threats
  • Understand the important role of user awareness and training

212–Integrating Data Protection Aspects into Development of Cyber Physical Systems Intermediate

Tuesday, 30 October | 10:00 – 11:00

  Download Presentation

Jana Karina Von Wedel
Invensity GmbH

Christian Beul
Invensity GmbH

A new approach aimed at integrating data protection topics into existing development processes and thereby achieving compliance with data protection regulations that follows the V-model and is inspired by concepts from functional safety development.

After completing this session, you will be able to:

  • Describe why data protection topics must be integrated into the development of cyber-physical systems handling personal data and which are the aspects to be considered
  • Describe how data protection topics for cyber-physical systems relate to the cyber security concepts of such systems and how synergies can be benefited from
  • Describe a clearly structured approach based on established and proven workflows aimed at integrating data protection topics into existing development processes
  • Describe how to prove and maintain compliance with data protection regulations by following such an approach

222–DPIA in Practice Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

  Download Presentation

Levente Habany
IT Security Officer
Bank of China Hungaria Ltd.

GDPR requires appropriate technical and organisational measures to be implemented for the protection of personal data. How to fix in a DPIA what is appropriate? Using the OSI model helps to tackle threats under the whole lifecycle of data processing.

After completing this session, you will be able to:

  • Understand the link between GDPR data protection principles and the generally accepted IT security principles.
  • Establish a meaningful structure for a data protection impact analysis which allows to take into consideration all potential threats to the processing of personal data, including legal, technical, organisational and IT risks.
  • Understand what the 'appropriate' level of protection of the personal data means in GDPR - both as far as organisational and technical protection measures are concerned in the application of Articles 24, 25 and 28.
  • See how decisions, relating to the analysed IT project, can be based on the structured analysis that the usage of OSI model is offering in combination with the data protection principles, when included in the Data Protection Impact Analysis concept.

232–Crypto Agility: Security Event Response Intermediate

Tuesday, 30 October | 13:30 – 14:30

  Download Presentation

Broderick Perelli-Harris
Senior Director of Solution Architecture, EMEA
Venafi

Most enterprises aren’t maintaining crypto-agility—the ability to quickly replace encryption certificates and keys in response to security events. Hear recent examples of security events and get an actionable plan for achieving crypto-agility.

After completing this session, you will be able to:

  • Understand the large-scale certificate and key security events that threaten organisations, including real-world examples
  • Know how to evaluate the current crypto-agility of their organisation
  • Develop a crypto-agility plan for their network environment that will successfully respond to certificate security events
  • Leverage certificate governance to improve risk posture

242–Do You Protect Your Machine Identities? Intermediate

Tuesday, 30 October | 14:45 – 15:45

Gordon Hutton
Head of Professional Services, EMEA
Venafi

There are two kinds of actors on every network—people and machines. We spend billions securing passwords but almost nothing protecting the keys and certificates machines use to authenticate themselves. Learn how to control machine identity risks.

After completing this session, you will be able to:

  • Understand what serves as machine identities and how this compares to human identities on the internet and networks, as well as how each impacts the need for protection.
  • Know how the definition of machine is evolving and how that impacts the exploding number of machines and their need for protection.
  • See the key reasons organizations aren’t protecting machine identities, including challenges in management and security.
  • Determine the level of maturity of their organizational machine identity protection and how to create a short-term and long-term roadmap for improving machine identity protection within their organization.

252–Third Party Risk Management Intermediate

Tuesday, 30 October | 16:15 – 17:15

  Download Presentation

Manoj Agarwal
Head of Internal Audit
Metro Shoes Limited

Today, most organizations are outsourcing critical business operations to third parties. While internal business activities present a level of risk, it is third party relationships that make overall risk management challenging.

After completing this session, you will be able to:

  • Learn how to assess risks emerging out of outsourced activity.
  • Learn how to define governance surrounding contract governance.
  • Determine how to protect the organization's interests through contract governance and audit.
  • How to help operation in gearing up to meet challenge of managing third party risk.

312–Cyber Crisis Management, Part 1 Beginner

Wednesday, 31 October | 8:30 – 9:30

  Download Presentation

Guy Dagan
CAO
Consienta

 

 

Oren Elimelech
CyberTeam 360

Cyber crisis management relies heavily on internal communication. During a breach miscommunication poses a huge risk to the response process and remediation time. The exercise promotes the organizations’ preparation increasing the knowledge emphasise

After completing this session, you will be able to:

  • Understand where team coordination is most difficult? What can we do to improve it?
  • Are there any steps currently performed by other members that can be done to reduce friction?
  • increase the knowledge base and emphasize what should be done in case of a cyber-attack.
  • Raise awareness

322–Cyber Crisis Management, Part 2 Beginner

Wednesday, 31 October | 9:45 – 10:45

  Download Presentation

Guy Dagan
CAO
Consienta

 

 

Oren Elimelech
CyberTeam 360

Cyber crisis management relies heavily on internal communication. During a breach miscommunication poses a huge risk to the response process and remediation time. The exercise promotes the organizations’ preparation increasing the knowledge emphasise.

After completing this session, you will be able to:

  • Understand where team coordination is most difficult? What can we do to improve it?
  • Are there any steps currently performed by other members that can be done to reduce friction?
  • Increase the knowledge base and emphasize what should be done in case of a cyber-attack.
  • Raise awareness


Return to Event Page >>
 

Track 3—Cyber Threat Intelligence & Technologies

This track will focus on the threats associated with operating on the web. Threats and attacks are increasing rapidly. Enterprises erroneously believe their network infrastructures are safe. This track will also focus on methods used to attack corporate networks and how to prevent them.

113–Hacking Closed Networks Advanced Technical

Monday, 29 October | 10:00 – 11:00

  Download Presentation

2017 Top-Rated SpeakerIra Winkler
Secure Mentem

People believe that a large portion of critical infrastructures are safe, because they are on closed networks. While the networks may be closed, they are not safe. This presentation shows methods to attack closed networks, and how to prevent them.

After completing this session, you will be able to:

  • Understand that closed networks might not be closed, and even if they are, they are not immune from attack.
  • Identify potential attack vectors of closed networks.
  • Understand the real risk posed by attack vectors targeting closed networks.
  • Determine how to better secure both closed and open networks.

123–Cyber Resiliency: Up Against the Upcoming & Unknown Threats

Monday, 29 October | 11:15 – 12:15

Leonard Ong, CISA, CISM, CRISC, CGEIT
Board Director of ISACA
Associate Director, Merck & Co., Inc.

Most common approaches in defending to cyber threats are against the known threats based on past incidents. Accelerated technology development outpaced our ability to defend in a conventional manner. A new and holistic approach will be discussed in this presentation based on actual case study of a significant incident and the countermeasures that follows.


133–GDPR Article 28: Operationalising 3rd and 4th Party Vendor Risk Management

Monday, 29 October | 13:30 – 14:30

Ian Evans
Managing Director, EMEA
One Trust

In this session, you’ll learn from organisations that have implemented a successful vendor risk management process and explore helpful tips and practical advice to improve your privacy program

After completing this session, you will be able to:

  • Review GDPR regulation, scope, and the new legal obligations it presents for 3rd and 4th party vendor risk management
  • Identify priorities before, during, and after vendor procurement
  • Hear real case studies from privacy experts on how to practically tackle Article 28
  • Learn how to build GDPR-approved vendor risk management practices

143–Threat Intelligence Sharing: Trusted Circles & ISAC’s Intermediate

Monday, 29 October | 14:45 – 15:45

  Download Presentation

Manoj Patel
Senior Advisory, Security & Risk Global Practice
ServiceNow

What's all the fuss about? Why share threat intelligence? The bad guys share tools, tactics and procedures. Prevent Bad Guys. Learn about Threat Intelligence, Trusted Circles (ISACs), and Sightings Search. It's about: Immunity by Community.

After completing this session, you will be able to:

  • Learn about what are ThreatIntel, Sighting Search, ISACs and Trusted Security Circles
  • Understand Importance of Threat Sharing How to use Threat intelligence to identify, remediate and/or assess the impact of a cyber attack
  • How to drive, Drive Immunity by community
  • Find current resources for Threat Sharing.

153–Breaches 2013-2018: What Can We Learn? Intermediate

Monday, 29 October | 16:15 – 17:15

  Download Presentation

Todd Fitzgerald
Managing Director/CISO
CISO Spotlight, LLC

We all talk about the rising number of breaches, but how much do you know about what happened and the response? This session will examine the breaches, responses and most importantly, the lessons learned. We will discuss what we would have done.

After completing this session, you will be able to:

  • Communicate the breaches of the past 5 years and the lessons learned
  • Discuss different technical approaches to mitigating risk
  • Discuss different responses and what works and what doesn't
  • Build knowledge into future company breach protection and response

213–Gaining Ground on the Cyber Attacker: Building a Cyber Resilient Business

Tuesday, 30 October | 10:00 – 11:00

Tammy Moskites
Managing Director & Senior Security Executive
Accenture

Cyber-resilient business brings together capabilities of cybersecurity, business continuity & enterprise resilience. It applies fluid security strategies to respond quickly to threats, so it can minimize the damage & continue to operate under attack.

After completing this session, you will be able to:

  • Identify how Cyber-resilient business brings together the capabilities of cybersecurity, business continuity & enterprise resilience.
  • Answer "Why Does it Matter? & Where its Going" Innovating securely, strengthening customer trust and boosting shareholder value even while facing threats. Elevating the importance of security, transforming it to "business as usual" and embedding it into the fabric of the organization.
  • Explain "What is it?" How Combining cybersecurity, business continuity and enterprise resilience to respond quickly to threats, minimize damage and operate under attack.

223–Deep Dark Web

Tuesday, 30 October | 11:15 – 12:15

  Download Presentation

Claudio Cilli
University of Rome

This is a practical and comprehensive presentation on what is hidden in internet but still under our eyes. The dark web is a mysterious world who attracts everyone. This presentation will allow attendees to have a full immersion in this deep sea and to see what is under their eyes although not seen. Tools and techniques are explained with real examples, allowing attendees to discover this fascinating world, through an interactive session. Surfing, and worse, interacting in the dark web exposes the company to a large amount of risks, even legal. The presentation will show how to prevent users from accessing dark web without affecting normal. operations, with techniques, tools and practical examples.

After completing this session, you will be able to:

  • Recognize what is behind the normal web navigation
  • Understand the TOR network operation, anonymity and hidden services
  • Have a knowledge of deep & dark web, difference and content
  • Prevent internet misuse and avoid employee surfing dark web using company assets

233–Cyber Warfare & The New Threat to Security Intermediate

Tuesday, 30 October | 13:30 – 14:30

  Download Presentation

Claudio Cilli
University of Rome

Cyber-warfare is the last frontier of human insanity. Rules of cyber-war and how dangerous an information warfare can be, and why it can be used against a nation or a big company. How to protect critical infrastructure from information flooding.

After completing this session, you will be able to:

  • Know critical infrastructures: what they are and why they need to be protected
  • Comprehend cyber-warfare definition and techniques
  • Understand the rules of cyber-warfare
  • Protect their companies against cyber-attacks

243–A Framework for Choosing an ISMS Intermediate

Tuesday, 30 October | 14:45 – 15:45

  Download Presentation

Steve Mair
Senior Cyber Security Consultant
PGI Cyber

There are several different security management systems in use, but how do you know which is the right one for your business? Here we’ll look at practical guidance on how to choose the most appropriate models and systems for your organisation.

After completing this session, you will be able to:

  • Identify some of the more common security models and understand how they should change in the future
  • Identify some of the common security management systems in use today, and the key differences between them
  • Determine business requirements and map those on to security management systems
  • Decide which security management systems are most appropriate for their organisation

253–The Supply Chain: A Major Threat? Advanced Managerial

Tuesday, 30 October | 16:15 – 17:15

  Download Presentation

Peter Smith
Head of Information Security
Tokio Marine Kiln

 

Real life study in managing supply chain risk in the financial services industry.

After completing this session, you will be able to:

  • Understand the options for supply chain management
  • Give CISOS and CIOs an understanding of the regulatory drivers
  • Know how supply chain risks management fits in overall risks management
  • Understand the nature of supply chain risk

313–The Art of Red Teaming Without Insulting Beginner

Wednesday, 31 October | 8:30 – 9:30

  Download Presentation

Frans Szabo
Senior Security Specialist
Rabobank

Red Teaming is considered the "next level" of obligatory security controls. But if you do RT properly, you will disclose flaws made by colleagues. And they are the ones who must solve the issues. How to you keep away from a game of denial?

After completing this session, you will be able to:

  • Understand the basic difference between penetration testing and Red Teaming.
  • Why Red Teaming is seen as a threat by many Blue Teams
  • Talk to Red Teamers without getting angry
  • Give the proper follow-up on recommendations made by the Red Team and know how to put the "problems" discovered to a (communicational) advantage.

323–The Five P’s of Breach Response Intermediate

Wednesday, 31 October | 9:45 – 10:45

  Download Presentation

2017 Top-Rated SpeakerBen Smith
RSA

Organizations of all sizes are under attack today, and one common challenge is how ill-prepared we all tend to be while responding. Learn how to most effectively combine people, processes, and technologies in the midst of a breach response.

After completing this session, you will be able to:

  • Understand that effective breach response begins *before* the breach occurs.
  • Appreciate the key importance of leveraging business context of affected assets in the midst of a breach response.
  • Recognize how to incent and retain technical personnel in what is traditionally a high-burnout profession.
  • Understand the unique attack vector represented by third parties.


Return to Event Page >>
 

Track 4—Security Governance

This track will provide attendees with tools and techniques to effective security program to risk and comply with security regulations. It will cover components of the NIST Cybersecurity Framework and the European Privacy regulations. It will also cover concepts and processes that will help an enterprise create and maintain an effective and sustainable security program.

114–How to Build Valuable CSIRTS/SOC’s with Constrained Budgets Advanced Managerial

Monday, 29 October | 10:00 – 11:00

  Download Presentation

Vilius Benetis
NRD Cyber Security

Computer Security Incident Response Teams and Security Operations Centers (CSIRT/SOCs) are considered the proper ways to build resilience to cyber-threats. Speaker will discuss best practices from own experience building such capabilities.

After completing this session, you will be able to:

  • Identify key success factors to CSIRT/SOC buildouts and understand definitions of the discipline.
  • Process requirements for own CSIRT
  • Quantify value of becoming members of FIRST and regional CSIRT organisations.
  • Prepare own plan to move into formalised CSIRT/SOC operations.

124–The Ocean is Full of Phish Intermediate

  Download Presentation

Monday, 29 October | 11:15 – 12:15

Todd Fitzgerald
Managing Director/CISO
CISO Spotlight, LLC

Session will discuss costs of phishing, how to develop a phishing security awareness program, selecting a phishing product, questions to ask, and a case study of rolling out phishing.

After completing this session, you will be able to:

  • Build an information security Phishing awareness program
  • Understand the costs and ROI model of phishing
  • Review an actual case study of phishing in a global organization
  • Select a phishing product by asking the right questions

134–Cybersecurity as A Critical Business Need in Payments

Monday, 29 October | 13:30 – 14:30

  Download Presentation

Alen Beganovic
Ethernaut Informtion Technologies

PSD2 has introduced new players in payment arena (AISP & PISP) and bring new and emphasize existing cyber risks in payments and digital banking. PSD2 is a milestone to “Open Banking”, and it will demand new skills and competences for cyber security.

After completing this session, you will be able to:

  • Understand strong customer authentication options through real-life examples.
  • Describe dynamic linking methods and how to find balance between security and usability.
  • Understand transaction risk analyses as central security control in payments and how to increase effectiveness of anti-fraud teams.
  • Describe new cyber security challenges in “Open Banking”, and what key skills, competences, tools and techniques are required to address business and technology risks.

144–DevSecOps-Bringing the Security-The Missing Link in Delivering on the Promise of Business Velocity and Quality to DevOps

Monday, 29 October | 14:45 – 15:45

  Download Presentation

2017 Top-Rated SpeakerFrank Downs
Director and SME, Cybersecurity Practice
ISACA

There is one constant in all our lives – change! Change is accelerating driven by disruptive technologies which are fueling innovative business models across every vertical from Banking to public services. To succeed with Innovation at speed, IT organizations must accelerate their release velocity - and do it with greater quality, security, and availability! Enter DevOps! For most organizations, the transition to DevOps starts small, in a single team or a new project with cobbled together open source solutions, with security often an afterthought. To scale effectively, deploying daily or hourly or even more frequently, requires organizations treat security as a first-class citizen – engaged in all aspects of the development and deployment lifecycle. Robert will share market trends, tips and techniques to incorporate security into the complete DevOps lifecycle – delivering DevSecOps. Robert will identify traps and roadblocks teams often experience, discuss approaches and actions to help you facilitate a smooth, and swift, transformation.

After completing this session, you will be able to:

  • Explain the core DevOps and DevSecOps principles
  • Identify the key components of DevSecOps in the SDLC
  • Analyze the SDLC and select the appropriate security techniques to incorporate
  • Develop techniques to transition skills to product teams

154–IoT Privacy Maturity Framework & Solutions Intermediate

Monday, 29 October | 16:15 – 17:15

  Download Presentation

Vinayak Sastri
IBM India

The talk aims to present the challenges of privacy in the Internet of Things world and potential solutions to tackle the same. This would be presented through a comprehensive maturity framework to understand privacy in the IoT landscape. The IoT landscape is fast changing the data privacy landscape and is creeping into every aspect of life. The framework aims to simplify the IoT and privacy landscape in a unique combination which has never been attempted to be understood before.

After completing this session, you will be able to:

  • Understand the areas and industries that IoT will impact the world and specific industries
  • Understand the privacy challenges that would be pervasive across industries and enable participants to categorise them basis the IoT / privacy matrix
  • Identify potential solutions to tackle privacy challenges using the matrix and look at ways to implement the same basis the maturity matrix.
  • Assess the financial implications for tackling privacy challenges, risks to revenue and profitability and identify potential cost drivers

214–Introducing COBIT 2019

Tuesday, 30 October | 10:00 – 11:00

  Download Presentation

Dirk Steuperaert
Consultant
IT in Balance, BVBA

In this session we will present the COBIT 2019 Framework, the long-awaited successor of COBIT 5. First we will discuss the drivers for the update, and then we will cover the key concepts and structure of the Framework. The major differences with COBIT 5 will be explained next. In a last part we will highlight the relevance of the new COBIT 2019 Framework for Security Governance.

After completing this session, you will be able to:

  • Understand the structure and key concepts of the COBIT 2019 Framework
  • Understand and appreciate the improvements made compared to COBIT 5
  • Understand the relevance of COBIT 2019 for the Information Security community

224–Why Awareness Efforts Fail Advanced Managerial

Tuesday, 30 October | 11:15 – 12:15

  Download Presentation

2017 Top-Rated SpeakerIra Winkler
Secure Mentem

 

 
 

Tracy Celaya
Go Consulting International

Awareness efforts essentially attempt to get users to practice strong security behaviors. The problem is that these behaviors should be required, and not just encouraged. We show how to embed behaviors into governance and make them requirements.

After completing this session, you will be able to:

  • Understand how security related behaviors create vulnerable business practices.
  • Identify business processes that require strong user security behaviors.
  • Specify the user behaviors that should be embedded into the business processes.
  • Create awareness programs that make people aware of their required behaviors.

234–Challenges in Cybersecurity Program Development Advanced Managerial

Tuesday, 30 October | 13:30 – 14:30

  Download Presentation

Chris Moschovitis
CEO
TMG-Emedia, INC.

The talk will cover the main phases of cybersecurity program development and the challenges we must overcome to successfully develop and manage the program throughout its life cycle.

After completing this session, you will be able to:

  • Identify the phases of cybersecurity program development and the challenges presented at each phase, and the recommended approaches to successfully address them.
  • Have an easy to follow roadmap to successfully implement a cybersecurity program.

244–Impact of GDPR on Third Party and M&A Security Advanced Managerial

Tuesday, 30 October | 14:45 – 15:45

  Download Presentation

Marco Ermini
Senior Security Architect
Telefonica Germany

GDPR impact has been dissected and examined to death - however, M&A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that.

After completing this session, you will be able to:

  • Understand the general impact of GDPR on M&A prospects.
  • Evaluate the impact of GDPR on third-party and outsourcing security.
  • Identify if specific programs need to be set-up in your organization because of the GDPR, which ones affect third-party, outsourcing and M&A processes, and how.
  • Get a clearer picture of what "privacy" means in the context of M&A activities, outsourcing and third-party involved in business processes.

254–Essential Security Concerns for Emerging Tech

Tuesday, 30 October | 16:15 – 17:15

  Download Presentation

Lindsay Nuon
Chief Risk Officer
Stanger Labs

This session allows us to move beyond polarizing rhetoric focused sharply on the promises and peril of emerging tech and drives the dialogue around risks, resources, tools, and techniques to help security practitioners craft an effective security strategy.

After completing this session, you will:

  • Be introduced to new vulnerabilities and attack vectors that the blockchain and cognitive technologies have introduce
  • Learn some helpful threat modeling tools, techniques, and resources
  • Have an overview of who is using the these technologies to improve the security practitioners technology stack
  • Learn how other organizations are addressing challenge areas through an interactive group discussion

314–Are You at Risk from a Cybersecurity Breach and a GDPR Fine?

Wednesday, 31 October | 8:30 – 9:30

  Download Presentation

Mike Hughes
Partner
Haines Watts

As we live in an a ever connected world, where even a kettle can be used to access your commercial secrets (if you want to know how this can be so, you need to attend Mike’s Presentation), and organisations become increasingly reliant on technology to run and manage their business, than organisations need to fully understand their cyber and digital resilience risks and ensure that these risks are being appropriately and effectively managed.

Whist many organistions recognise that they need to manage their business technology risks, there are still too many organisations taking “it won’t happen here” approach, or “cyber criminals won’t be interested in us”. The session will look at some of risks organisations need to effectively address, to reduce the cyber security threats, damaging their business. You could be working for such an organisation, or you may have such an organisation in your supply chain, and therefore potentially exposing you to risk!

During the presentation we will look at some of the Security Governance and Management practices organiations should consider adopting. We will also consider some of the wider implications following the introduction of GDPR.

After completing this session, you will be able to:

  • Identify and assess cyber security and digital resilience related risks
  • Select a suitable risk response
  • Consider some of the Security Governance and Management practices to appropriately and effectively manage your cyber security and digital resilience related risks
  • Reduce the risk of a GDPR fine, following a Cyber Security Breach

324–Creating Adaptable Security Awareness Program in a Global Corporation Intermediate

Wednesday, 31 October | 9:45 – 10:45

  Download Presentation

Ales Zupan
Principal Consultant
BrightStar Consulting

All major security frameworks recognize Security Awareness of organization’s associates as a key protective measure against information breaches. However, breaches still happen. Is there something wrong with our security awareness approach?

After completing this session, you will be able to:

  • Identify components of an effective Information security awareness and training program.
  • Understand key indicators to measure the efficiency of awareness and training activities.
  • Create an awareness program that would fit their environment.


Return to Event Page >>
 

Workshops

WS1—Cybersecurity Fundamentals

Saturday, 29 October; Sunday, 28 October | 9:00 – 17:00

Richard Hollis, CISM, CRISC
CEO
Risk Factory Ltd.

Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamentals workshop is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This workshop will also prepare learners for the CSX Fundamentals Exam.


WS2—CSX Penetration Testing Overview

Saturday, 27 October; Sunday, 28 October | 9:00 – 17:00

2017 Top-Rated SpeakerFrank Downs

 

 

 

Dustin Brewer

The Cybersecurity Nexus (CSX) Penetration Testing Overview (CPTO) course provides students an introductory understanding of penetration testing and ethical hacking. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment. Upon completion, students will understand the overall concepts guiding penetration testing from a practical, hands-on vantage point.

*Please note: To fully participate in this workshop, all attendees are required to bring a laptop with an Internet accessible browser.


Return to Event Page >>
 

Keynotes

Opening Keynote Speaker

The Next Big Hacking Challenge

Monday, 29 October | 8:30 – 9:30

James Lyne
Cyber Security Expert, Global Head of Security Research at Sophos

James is a self-professed 'massive geek' and has technical expertise spanning a variety of the security domains from forensics to offensive security. He has worked with many organisations on security strategy, handled a number of severe incidents and is a frequent industry advisor. James is a certified instructor at the SANS Institute and is often a headline presenter at industry conferences.

James firmly believes that one of the biggest challenges we face is in making security accessible and interesting to those outside the industry. As a result, he takes every opportunity to educate on security threats and best practice - always featuring live demonstrations and scenarios of how cyber criminals operate in the real world.

James has given multiple TED talks, including at the main TED event. He's also appeared on a long list of national TV programmes to educate the public including CNN, NBC, BBC News, Bill Maher and John Oliver. As a spokesperson for the industry, he is passionate about talent development, regularly participating in initiatives to identify and develop new talent for the industry.

Use patterns from social media to bizarre internet of things are rapidly changing at home and at work. Alongside this cyber criminals have previously unseen levels of sophistication tools but most interestingly motives that are changing in impactful ways. In this session, James Lyne will reveal some of the latest trends from the criminal underground and the challenge ahead for us as businesses, individuals and security practitioners to thwart their attacks.


Closing Keynote Speaker

The Future Of Cybersecurity – From A Friendly Hacker's Perspective

Wednesday, 31 October | 11:00 – 12:15

Keren Elazari
Strategic Cyber Security Analyst, Author & Researcher

Keren Elazari is an internationally acclaimed security researcher, author and strategic analyst, with years of experience in the international cybersecurity industry. Since 2000, Keren has worked with leading Israeli security firms, government organizations, Big 4 firms, advised Fortune 500 and groundbreaking startup companies, helping global organizations navigate complex cybersecurity issues. Elazari’s independent research work and writing about emerging security issues has been featured by Scientific American, WIRED, and she is a frequent speaker and commentator in international events and in the media.

Ms. Elazari holds an MA in Security Studies from the prestigious Security & Technology workshop at Tel Aviv University – where she is a senior researcher with the Blavatnik Interdisciplinary Cyber Research Center, focusing on the complex relationships between hackers, industry and government. Elazari is also a Security Fellow with Singularity University, a private future-oriented think tank.

In 2014, Keren became the first Israeli woman to speak at the annual TED conference. Keren’s TED talk has been viewed by millions online, translated to 27 languages and selected for TED’s list of ‘Most Powerful Ideas in 2014’ and Inc.com’s list of ‘Top TED Talks of 2014’. Her collaborative book with 8 leading women, Women in Tech, was published by Penguin USA in March 2016 and became an Amazon bestseller.

Cybersecurity is no longer about protecting secrets. It's about our way of life: from autonomous cars, to webcams medical devices, to the manipulation of political campaigns and global markets. But are you thinking about what's next? This talk will aim to inspire the audience of security professionals to take action about the things that require our attention the most. We will shed light on emerging security threats and inspire the audience to take action with practical ideas on how to make a difference in their organizations – and what we can learn from, and work with, friendly hackers. We will discuss the future workforce and business challenges in this space and how to foster more diversity in cybersecurity. Finally, we’ll take a look at the future of cybersecurity and learn why resilience will be defined not just by our efforts to balance technology’s benefits against the risks it brings with it - but by how we evolve our paradigms about security, privacy and digital access.


Opening Leadership Brief

Culture of Cybersecurity

Monday, 29 October | 8:30 – 9:30

Chris Dimitriadis, Ph.D., CISA, CISM, CRISC
Past chair of ISACA’s Board of Directors and group director of Information Security for INTRALOT

ISACA and CMMI Institute revealed new global research this month on how enterprises can build a culture of cybersecurity throughout their organizations. Ninety-five percent of companies report a gap between the security culture they want and the one they have. Take a first look at the results and learn how to build a stronger cybersecurity culture to increase the profitability and viability of your organization.


Closing Leadership Brief

Digital Transformation

Wednesday, 31 October | 11:00 – 12:15

Leonard Ong, CISA, CISM, CGEIT, CRISC
ISACA Board Director & Associate Director at MSD International (Singapore)

ISACA research, released in September 2018, reveals how leadership and enterprises are doing with their ongoing journeys to reimagine business practices by securely and effectively deploying new technologies such as artificial intelligence (AI). Digital transformation is just as much about leadership as it is about the technology itself; learn how we need to continue to reimagine what these changes mean for us in our roles.


Culture of Cybersecurity Panel

Tuesday, 30 October | 8:30 – 9:30

Moderator:

Chris Dimitriadis, Ph.D., CISA, CISM, CRISC
Past chair of ISACA’s Board of Directors and group director of Information Security for INTRALOT

 

 


Panelists:

Neil Warburton
Security Architect
IBM

 

 

2017 Top-Rated SpeakerIra Winkler
Secure Mentem

Based on new research from ISACA and CMMI Institute, this much-needed discussion will examine how—or whether—organizations are incorporating a culture of cybersecurity at every level. What are the most important steps to building a cybersecurity culture? How can you embed cybersecurity awareness at every level? Organizations with strong, robust cyber cultures are risk-aware and focus on building and supporting the capabilities of the people, processes and technologies of their cyber programs, both from the bottom up and from the board of directors down. Get the latest data and guidance on this topic from renowned business and cybersecurity leaders.


Return to Event Page >>
 

Spotlight Sessions

SS1—How to Protect your Crown Jewels

Monday, 29 October | 17:30 - 18:00

  Download Presentation

Harry Zorn
VP of Sales, EMEA
Accellion

Harry Zorn, VP Sales at Accellion, will talk about how the Accellion platform enables organizations to securely share sensitive information beyond enterprise borders while maintaining the controls and visibility needed to demonstrate compliance.

After completing this session, you will be able to:

  • Understand Privacy, Protection and Peace of Mind for Sharing Enterprise Information
  • How Accellion Helps You Secure and Govern File Sharing
  • Recognize How One-Click Compliance Reports Help CISOs Quickly Prove Full Visibility and Control of Sensitive Information for Compliance with GDPR, HIPAA, GLBA, ITAR and other Regulations

SS2—Big Things Have Small Beginnings: How Advanced Cyber Actors Exploit Trivial Network Infrastructure Issues

Monday, 29 October | 17:30 - 18:00

Alexandra Moore
Senior Analyst, Languages and Internet Investigations
Digital Shadows

Mainstream media coverage of cyber threats often dwells on attention grabbing and highly sophisticated exploits. However, in reality, the most advanced attackers often use commonly available vulnerabilities and holes in an organization's security to achieve a major compromise of critical systems.

After completing this session, you will be able to:

  • How to look at your organization from a threat actor's perspective
  • Define your organization's critical functions
  • Manage your digital risk

SS3—Successfully Automating 3rd Party Risk Measurement

Monday, 29 October | 17:30 - 18:00

  Download Presentation

Adrian Bishop
Head of Engineering
Huntsman Security

In this talk you will hear how technology can provide benefits in managing third party and supply chain cyberrisk.

Approaches such as manually auditing suppliers, running self-assessment questionnaires and external scanning all attempt to measure how robust third party/supply chain risk controls are. However, these approaches are often incomplete, subjective and inconsistent.

Through the use of automation we can now provide light-touch assessment and reporting on actual control effectiveness within suppliers and third parties. This provides more accurate and reliable measurement of cybersecurity risks.

After completing this session, you will be able to:

  • See how third parties have been the root cause of security breaches
  • Appreciate the limitations with traditional third party assurance approaches
  • See how continuous measurement of cybersecurity controls delivers a new level of visibility of supply chain or third party cybersecurity risk.

SS4—Adobe’s Open Source CCF Enables Quick Adoption of New Compliance Standards

Monday, 29 October | 18:15 - 18:45

Prasant Vadlamudi
Director of Tech GRC
Adobe

Over the past several years, we have developed and open sourced Adobe Common Controls Framework by Adobe (CCF), enabling our cloud products, services, platforms and operations to achieve compliance with various security certifications, standards, and regulations such as SOC2, ISO, PCI, HIPAA, and others. CCF is a cornerstone of our company-wide security compliance strategy. It also provides the flexibility to quickly adapt to and tackle new compliance and certification requirements as needed for our business and solutions. The power of CCF has most recently helped us achieve the FedRAMP Tailored authorization and will continue to help Adobe adapt to constantly changing requirements. This talk will focus on how we achieved the above using our open source framework.

After completing this session, you will be able to:

  • Understand how Adobe’s open source CCF framework provides the flexibility to quickly adapt to new or changing compliance standards
  • Learn how we rapidly integrated FedRAMP Tailored into our compliance portfolio
  • Learn about the future of open source CCF

SS5—Cyber Attack Trends from the Threatscape

Monday, 29 October | 18:15 - 18:45

  Download Presentation

Joe Nelson
Principal Solutions Architect, EMEA
eSentire

Defending against evolving threats has never been more important for midsized organisations working to guard against financial and reputational risk. eSentire’s Quarterly Threat Report, produced by the Threat Intelligence team, provides an overview of the threats detected by the eSentire Security Operations Centre (SOC) in 2018. The report analyses threat types, volume, and preferred attack methods based on data gathered from 1500+ proprietary network and host-based detection sensors.

After completing this session, you will be able to:

  • Answer what are the latest trends in the cyber-criminal underworld?
  • Identify which attacks are you likely to be preventing as we move into 2019?
  • Identify who’s looking for vulnerabilities on your network?

SS6—Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan

Monday, 29 October | 18:15 – 18:45

Ian Evans
Managing Director, EMEA
OneTrust

Under the GDPR, data controllers are required to notify their supervisory authority when a personal data breach occurs, unless it is unlikely to result in risks to the rights and freedoms of individuals. The notification needs to be done without undue delay, no later than 72 hours after the controller has become aware of the breach (with some exceptions). It is crucial for organizations to understand their obligations and the details of this tight timeline as well as the risk-based triggers, and what they entail. In this session, we’ll review the personal data breach rules under the GDPR and provide tips to help you map out a 72-hour personal data breach action plan.

After completing this session you will be able to:

  • Understand what is involved in the 72-hour action plan post incident and breach
  • Identify the legal obligations of the organization following a breach
  • Recognize the personal data breach rules according to GDPR
  • Takeaway tips to help you with the 72-hour action plan


Return to Event Page >>