Day 1 - 28 November 2018

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2018, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced and current and potential solutions.

09:30AM

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Forrester

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

. Merritt Maxim, Principal Analyst Serving Security & Risk Professionals , Forrester
Hide Details
More Details

09:50AM

John Grimm

Senior Director of IoT Security Strategy

Thales eSecurity

Associated Talks:

09:50AM - Day 1

View Keynote: Unlock the IoT’s potential by establishing trust

View Full Info

Keynote: Unlock the IoT’s potential by establishing trust

IoT projects, the backbone of enterprise digital transformation, have the tantalizing potential to improve operations and deliver customer value. However, if you can’t trust your IoT data and the “things” that produce it, there’s no point in undertaking the massive effort to buy and connect devices, collect and analyze their data, or worst of all make business decisions based on questionable data. This session will reveal strategies to enable trust in the IoT, turning it from a barrier and source of new vulnerabilities to a competitive differentiator.

. John Grimm, Senior Director of IoT Security Strategy, Thales eSecurity
Hide Details
More Details

10:20AM

Aditya Balapure

Team Lead, Information Security

Grubhub

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity 

10:20AM - Day 1

View Common cyber security mistakes made by enterprises and how to avoid them

View Full Info

Common cyber security mistakes made by enterprises and how to avoid them

The technological disruption and innovation is bringing in a rapid shift to the global threat landscape. As enterprises are preparing to get better equipped with tools, technologies and resources to reduce their cyber security risks, so are the adversaries trying to stay ahead of the game. The common security problems at the core still remain the same; only the scale, the emerging technologies and the risks to the business have evolved over time. This presentation will cover some of the most common cyber security mistakes made by enterprises and the business impacts that come along with them. With enterprises moving away from a perimeter-based approach to zero trust networks, the security strategy is only as strong as the weakest link. Key takeaways for those attending include how to stay ahead of the conventional attacks that usually occur from common misses in a company’s security strategy and the necessity to plan for actions that could be potential emerging risks for organizations.

. Aditya Balapure, Team Lead, Information Security, Grubhub
Hide Details
More Details

10:50AM

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Forrester

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Senior Representative, Global Platform

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity 

View Full Info

BG Badriprasad

Chief Security Architect

Ross Stores

Associated Talks:

12:00PM - Day 2

View Panel: Exploring Identity Access Management

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity 

View Full Info

Aditya Balapure

Team Lead, Information Security

Grubhub

Associated Talks:

10:50AM - Day 1

View Panel: The importance of collaboration for enterprise cybersecurity 

10:20AM - Day 1

View Common cyber security mistakes made by enterprises and how to avoid them

View Full Info

Panel: The importance of collaboration for enterprise cybersecurity 

  • Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
  • How can companies across the ecosystem collaborate to ensure stronger security? 
  • What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each? 
  • Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security. 
Moderator: . Merritt Maxim, Principal Analyst Serving Security & Risk Professionals , Forrester
. Senior Representative, Global Platform, ,
. BG Badriprasad, Chief Security Architect, Ross Stores
. Aditya Balapure, Team Lead, Information Security, Grubhub
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Case Study: Industrial IoT attacks using DDoS

Hide Details

12:20PM

Matt Short

Senior Research Director, Internet of Things

IHS Markit

Associated Talks:

09:20AM - Day 2

View Connected Enterprise: Chair’s Welcome and Opening Comments

View Full Info

Darron Antill

CEO

Device Authority

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Gorav Arora

Director of Technology, CTO Office

Gemalto

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Mark Hearn

Head of IoT Security

Cloakware by Irdeto

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

09:20AM - Day 1

View Hackers Don’t Have A Visitor Pass for Your Smart Building

View Full Info

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information 
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc. 
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities? 
  • Importance of other aspects of IoT security; testing, education of staff and physical security for devices
Moderator: . Matt Short, Senior Research Director, Internet of Things, IHS Markit
. Darron Antill, CEO, Device Authority
. Gorav Arora, Director of Technology, CTO Office , Gemalto
. Mark Hearn, Head of IoT Security, Cloakware by Irdeto
Hide Details
More Details

01:00PM

Josh Jabs

Vice President, Office of the CTO

Entrust Datacard

Associated Talks:

01:00PM - Day 1

View Securing Industrial Control Systems

02:50PM - Day 1

View Panel: Moving beyond connectivity to insight

View Full Info

Securing Industrial Control Systems

. Josh Jabs, Vice President, Office of the CTO, Entrust Datacard
Hide Details
More Details

01:30PM

Networking Break

02:30PM

Jake Margolis

CISO

Metropolitan Water District of Southern California

Associated Talks:

02:30PM - Day 1

View Developing your Cybersecurity Procurement Strategy

10:50AM - Day 2

View Panel: Am I using the cloud securely?

View Full Info

Developing your Cybersecurity Procurement Strategy

  • Capital expenditure vs Operational expenditure
  • Focusing on organisational needs
  • Avoiding Shelf-Ware
. Jake Margolis, CISO, Metropolitan Water District of Southern California
Hide Details
More Details

03:00PM

Rhino Fang

Senior Technical Architect

Lanner Electronics

Associated Talks:

03:00PM - Day 1

View Threats to infrastructure: cyber security for energy

View Full Info

Threats to infrastructure: cyber security for energy

As energy systems in the US become increasingly connected and digitized, the need for adequate security threat planning is growing.  In response to this, the US Department of Energy has recently announced the creation of ‘The Office of Cybersecurity, Energy Security, and Emergency Response’ (CESER).  The offices’ goals will include:

  • Strengthen energy sector cybersecurity preparedness.
  • Coordinate cyber incident response and recovery.
  • Accelerate game-changing research, development & deployment of resilient energy delivery systems

 

. Rhino Fang, Senior Technical Architect, Lanner Electronics
Hide Details
More Details

03:30PM

Cyber security for the automotive industry

This talk will cover a specific case study from the automotive industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.

Hide Details
More Details

04:00PM

Saliq Khan

Vice President

Imperial Capital LLC

Associated Talks:

04:00PM - Day 1

View Trends in cybersecurity and investment opportunities – 2018 & Beyond

12:20PM - Day 2

View Keynote Panel: Strategies for funding your IoT Idea

View Full Info

Trends in cybersecurity and investment opportunities – 2018 & Beyond

  • Industry Review & Outlook
  • Convergence of Physical & Cyber
  • Public & Private Market Valuations
  • Investment Outlook for Cybersecurity Industry
. Saliq Khan, Vice President, Imperial Capital LLC
Hide Details
More Details

04:20PM

Session Close