Module 3: Combating Cyber Risks & Threats

Module 3: Combating Cyber Risks & Threats

05 Oct 2017, 08:30 - 12:30

Keynote Stage

Language:
English

Register to attend this Keynote Stage module to gain practical tactics to combat the latest risks and threats.

The recent ransomware cyber-attacks WannaCry and Petya that affected organizations across the world including the NHS in the UK and the Ukraine government, highlighted the vulnerability of enterprises to cybercrime. With talk of nation-state actors and claims that government has not disclosed the exploit that enabled the attack, the complexities of the threat landscape were thrown into sharp relief. Information security professionals are facing Increasingly sophisticated cybercriminals who connect and collaborate and it’s against this background that they are tasked with protecting their organization. This module will take a look at the latest cyber risks and threats and provide attendees with strategies and tactics to address them.

8.30am-8.40am Introduction from the Chair
Derek Brink, VP & Research Fellow, Aberdeen Group

8.40am-9.10am Keynote Presentation: Profiling the Agile Cyber Adversary

This session will examine the motivations, behaviours, tactics and techniques of the cybercriminal, how they connect and collaborate to be successful and how they affect different industry verticals. From organised crime syndicates to nation-states, who should you be worried about? You will gain actionable insight that will help you to defend your organization against cyber-attack.
Jeffrey Tricoli, Section Chief, Cyber Division, Federal Bureau of Investigation (FBI)

9.10am-9.55am Panel Discussion: Do You Really Know Who is in Your Supply Chain? - Managing 3rd Party Risk

  • Effectively managing the security of your supply chain and sub-contractors
  • How to conduct robust risk assessments of vendors and sub-contractors
  • How to assess the maturity of third party assurance within your organization
  • New approaches to enhance visibility of third party supplier security postures
  • Identifying appropriate standards and controls to apply to 3rd parties and discover how to apply them

 

Panellists:

Alex Cunningham, CISO, Commonwealth Financial Network
Esmond Kane, Deputy CISO, Partners HealthCare
Edna Conway, Chief Security Officer, Global Value Chain, Cisco 

Moderator: Derek Brink, VP & Research Fellow, Aberdeen Group

9.55am-10.25am Case studyCountering Ransomware: Attack Analysis, Business Impace & Lessons Learned

During this the session the speaker will share a case study on a Ransomware attack, analyse the business impact, discuss the lesson learned and provide practical advice on how to prevent your organization from falling victim to future attacks.

  • Understanding the vulnerabilities that expose organizations to ransomware threats
  • Essential security hygiene practices to protect your organization
  • Discovering how to protect legacy systems
  • Key steps to prepare for and respond to future attacks 

 Israel Barak, CISO, Cybereason

10.25am-10.45am Networking break

10.45am-11.15am Spotlight on Disruptive Technologies: What does Blockchain Mean for Cybersecurity?

The potential of Blockchain to support cybersecurity is currently much debated – many detractors are sceptical about its role and effectiveness, whilst others see it as the solution to information processing challenges. This session will cut through the hype and take an in-depth look at Blockchain technologies. The speaker will answer the question – is Blockchain the next frontier in cybersecurity or does it pose more security challenges than it solves?

Esmond Kane, Deputy CISO, Partners HealthCare 

11.15am-11.45am PresentationHacking the IoT: Driving Security When Everything is Connected

Insecurities in the IoT made headlines in 2016, when the hacking of internet infrastructure provider Dyn took down sites including Netflix, Facebook, Twitter. The vulnerability of the the IoT was thrown into sharp relief. During this session, the speaker will analyse the nature of the vulnerabilities of the Internet of Things and how existing and soon to be released IoT devices could be exploited. From healthcare to critical national infrastructure, this session will look at how to mitigate and respond to a range of threats.

Phillip Miller, Head of Infrastructure & CISO, Brooks Brothers

11.45am-12.20pm Closing Keynote PresentationManaging & Mitigating Risks & Threats in the Digital Enterprise

During this case study presentation, Jim Routh will share his organization’s journey in model-driven security deployment using data analytics. During the presentation Jim will discuss the role of data science in managing and mitigating risks, share what his organization learned from this experience, and the implications for security talent management and information sharing going forward.

Jim Routh, CSO, Aetna

12.20pm-12.30pm Closing remarks from the Chair
Derek Brink, VP & Research Fellow, Aberdeen Group

 

Contributors

  • Jim Routh

    Key Note Speaker

    CSO

    Aetna

    Jim Routh is the Chief Security Officer and leads the Global Security function for Aetna. He is the Chairman of the NH-ISAC Board. He serves on the...

  • Jeffrey Tricoli

    Key Note Speaker

    Section Chief, Cyber Division

    Federal Bureau of Investigation (FBI)

    Jeffrey A Tricoli has been Section Chief of the FBI’s Cyber Division since December 2016. Mr. Tricoli joined the FBI in 1998 as a professional staff...

  • Phillip Miller

    Speaker

    Head of Infrastructure & CISO

    Brooks Brothers

    Phillip has been innovating with computers since 1981, taking a brief hiatus to earn his BA and MA in Jurisprudence from The Queen’s College,...

  • Israel Barak

    Speaker

    CISO

    Cybereason

    Israel Barak is a cyber defense and warfare expert, with his extensive background established at the Israeli Defense Forces and the Government of...

  • Esmond Kane

    Speaker

    Deputy CISO

    Partners HealthCare

    Esmond Kane is the Deputy Chief Information Security Officer in the Partners HealthCare Information Security and Privacy Office. In this role, Esmond...

  • Edna Conway

    Panellist

    Chief Security Officer, Global Value Chain

    Cisco

    Edna Conway is Cisco’s Chief Security Officer, Global Value Chain. She drives her comprehensive security architecture throughout Cisco’s third-party...

  • Alex Cunningham

    Panellist

    CISO

    Commonwealth Financial Network

    Alex is the Chief Information Security Officer for Commonwealth Financial Network, and in this role Alex is responsible for providing strategic...

  • Derek Brink

    Chairperson

    VP & Research Fellow

    Aberdeen Group

    Derek Brink helps organizations to improve their security and compliance initiatives by researching, writing about and speaking about the people,...

Documents

  • Keynote Speaker Interview - Phillip Miller 301 KB

    Find out what Phillip thinks about the latest security challenges and get a sneak preview of what he's going to talk about on the Keynote Stage at Infosecurity North America.

    22 Sep 2017

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.