Day 2: Tuesday, December 5th

Breakfast Briefing

8:00 AM - 8:45 AM Case Study: Strengthening Security Through SWIFT’s Customer Security Programme

Stefano Ciminelli, Deputy CISO – Global Security, SWIFT
(Breakfast service will begin at 7:45 a.m.)

Combating fraud is a challenge for the entire financial industry. The threat landscape adapts and evolves daily, and both SWIFT and its customers have to remain vigilant and proactive over the long term.

While all customers are responsible for protecting their own environments, SWIFT has established the Customer Security Programme (CSP) to support customers in the fight against cyber-attacks.

The CSP is articulated around three mutually reinforcing areas. Customers will first need to protect and secure their local environment (You), it is then about preventing and detecting fraud in your commercial relationships (Your counterparts) and continuously sharing information and preparing to defend against future cyber threats (Your community).


img

Stefano Ciminelli

Deputy CISO – Global Security
SWIFT

Vendor Session

8:45 AM - 9:15 AM Evolving Security for the Internet of Things

As technology continues to move away from the traditional perimeter, security teams need to access and protect all the touch points; managing and controlling how the Internet of Things (IoT) works. The Internet of Things is exploding for commercial and personal use. The fear part is well-established; now proactive measures need to be enacted. Today the devices most vulnerable to cyber threats are mobile phones and tablet, which means implementing mobile threat detection solutions with employees accessing calendars, email and other internal resources from personal devices.

This session will explore new and emerging IoT technologies which are increasingly becoming part of our connected world. We will discuss the risks and security concerns associated with these technologies, examples of where cyber criminals have exploited these technologies, and what can be done to secure them.

In this session:

•Optimizing enterprise systems for the next-generation work load
•Updating BYOD security policies
•Exploring leading practices in mobile device security

9:20 AM - 9:50 AM Business Meeting

9:50 AM - 10:20 AM Business Meetings

Master Class B1

10:25 AM - 11:10 AM Strengthening Data Center Security in Face of Breaches

In this interactive session discuss common security needs of all data centers. The session will explore operator versus attacker and who has the information advantage along with what decisions add or reduce complexities. Review what has changed in data center security along with emerging trends.

In this session:

•Evaluating models for hosting
•Navigating benefits and risks of data center solutions
•Analyzing the data center’s role with the expanding endpoints in need of protection

Master Class B2

10:25 AM - 11:10 AM Case Study: Applying Cognitive Cybersecurity to Existing Environments

Bob Kalka, VP of the IBM Security Business Unit, IBM
The evolving landscape of cybersecurity threats is outpacing humans' ability to properly harness and process data, especially in critical infrastructure environments. This session will discuss a real case study about how cognitive computing and machine learning can be applied to impact the discovery, understanding and mitigation of these threats.

img

Bob Kalka

VP of the IBM Security Business Unit
IBM

11:10 AM - 11:25 AM Networking Break

Master Class C

11:25 AM - 12:10 PM Unsupervised Machine Learning: A New Approach to Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

In this session, learn:
•How new machine learning and mathematics are automating advanced cyber defense
•Why full network visibility allows you to detect threats as or before they emerge
•How smart prioritization and visualization of threats allows for better resource allocation and lower risk
•Real-world examples of unknown threats detected by ‘immune system’ technology

BrainWeave C


11:25 AM - 12:10 PM When Shrinkage is Good—Reduce Incident Response Times from Hours to Minutes

Is your security team challenged with alert fatigue, a shortage of skilled staff, and maximizing the company’s product arsenal investment?
Solving such challenges isn’t easy and requires a delicate balance of people, processes, and tools. Investing in a comprehensive platform that enables security operation teams to reduce MTTR, create consistent and audited incident management process and increase analyst productivity is a step in the right direction.

Attend this round table to learn how a security orchestration platform can automate manual-intensive tasks and reduce response times from hours to minutes. See how the product’s machine learning suggestions can help your team become smarter with every incident and resolve complex threats faster and more accurately.

Benefits from shrinking your time to respond for every incident include:

•Improve your overall security posture,
•Enhance analyst productivity (from Tier 1-3), and
•Future-proof security operations.



12:10 PM - 1:10 PM Network Lunch

Afternoon Keynote

1:10 PM - 1:40 PM Managed Security Service Providers (MSSP) - Opportunities and Challenges

Jim Kastle, CISO, ConAgra Foods, Inc. Don Bacon, Manager Security Operations and Architecture, ConAgra Foods, Inc.
• Effectively managing a security team when most of the resources are offshore

• Selecting a MSSP for a particular function (e.g. Security Operations Center)

• Cost/Benefit analysis – what is the reason for outsourcing and how to avoid a degradation in services

• Achieving (and maintaining) an appropriate level of service

• Leveraging technologies to optimize the service, but reduce the need (in terms of overall headcount)


img

Jim Kastle

CISO
ConAgra Foods, Inc.
img

Don Bacon

Manager Security Operations and Architecture
ConAgra Foods, Inc.

1:45 PM - 2:50 PM Analyzing Attack Vectors and Providing Succinct Information for Sharing





1:45 PM - 2:50 PM Innovating Email Security: A Common Gateway to Your Networks

1:45 PM - 2:50 PM Provide a Passwordless, Frictionless Authentication Experience with Modern IAM

James Litton, CEO, Identity Automation

James Litton

CEO
Identity Automation

2:55 PM - 3:25 PM Business Meetings

3:25 PM - 3:55 PM Business Meetings

BrainWeave D

4:00 PM - 4:45 PM Safeguarding Privileged Access- Insider Threats

Traditional corporate security focuses on strengthening the external perimeter. But recent cyber breaches have shown a shift to attacks from within the enterprise’s corporate network using privileged accounts. Once cyber criminals gain access, they have the ability to elevate privileges and move about the network undetected. Understanding this approach to compromise systems is essential to developing ways to mitigate the risk.

In this session, we’ll
• Review a case study demonstrating abuse of privileged credentials
•Illustrate how privilege is used in these attacks
•Discuss effective mitigation and prevention strategies


Master Class D

4:00 PM - 4:45 PM Drawing out the Kill Chain

Staying ahead of the threat actors by sharing and learning from your colleagues and law enforcement. Map the tools to the kill chain and where each tool plays in by stage. Ensure the tools are fully capitalized; leverage existing investments and make the best of it. Hit and share metrics to demonstrate the value of the program in improving security posture.

In this interactive discussion explore:

•Segmenting and preventing various attack vectors on your networks
•Examining most advanced discovery and detection techniques
•Plan to bring and hear examples of what is and is not working to prevent and mitigate attacks

4:45 PM - 5:00 PM Networking Break

5:00 PM - 5:30 PM Business Meeting

5:30 PM - 6:00 PM Business Meetings

Evening Keynote

6:00 PM - 6:30 PM Crisis Management- The Waffle House Index

Pat Warner, Director of Public Relations and External Affairs , Waffle House
Pat Warner is the Director of Public Relations and External Affairs for Waffle House restaurants. His duties include developing and executing strategies intended to create and uphold a positive public image for the restaurant company. An 18-year Associate, Pat’s “Waffle House Experience” has included weddings, funerals, major motion pictures and Kid Rock.

A member of the corporate crisis team, he’s been involved in the Waffle House response to more than twelve hurricanes, and numerous ice storms and tornadoes. Pat will introduce you to the Waffle House Index and the company’s unique way of responding to major storms. In relation to crisis management --from planning, to practice, to after action reviews-- which Chief Information Security Officers must navigate in the light of a breach.


img

Pat Warner

Director of Public Relations and External Affairs
Waffle House

6:30 PM - 7:30 PM Networking Reception