IEEE Computer Science is inviting rock stars in cybersecurity technologies to share the most effective ways to predict cyberattacks and improve detect and response time. This sharing is significantly important as all entities, from companies to government organisations, are desparate to protect their customer data and intellectual property right from any cyber crimes.
From this event, you will learn success as well as failures of the invited leading cybersecurity executive in the industry while they are dealing with ransomware and cyberextortion. In addition, you will get the first hand insight about how artificial inteligence is helping predict cybercrime before it happened. Invited speakers are from Microsoft, McAfee, FICO, Webroot Inc, Akamai, GE Digital and Virtual CISO. More detailed information please find the agenda below.
Time and place:
September 26, 2017 | Denver, CO
Cybersecurity leaders share their successes and failures.
- Ransomware: Understand how to respond to these threats. Better yet, you’ll hear about the best ways to predict them.
- Extortapalooza: Extortion attacks aren’t new. Hear the new ways to avoid them.
- Prediction is emerging as the new Holy Grail of cybersecurity. Prevention is passé, and even detection technologies will be supplanted by prediction, with machine learning becoming a key tool to help organizations anticipate where hackers will strike.
Paul Edlund: What is Microsoft Doing in Security?
You could read the title of this session in many ways. You could read it like “Microsoft is in the security business?” or perhaps “How is Microsoft affecting the security of my company if I use other stuff?” or even “What is Microsoft DOING to secure my business?”Read Less
Either way, there will be something in this session for everyone as Microsoft discusses how they leverage hyperscale data to help companies become more secure… even if you’re not a Microsoft customer. We will discuss the types of things we see, how we mitigate against threats, and how we leverage Artificial Intelligence and Machine Learning to stop bad things on the Internet. We might even discuss the future and what Microsoft thinks about some of the bigger risks coming in the next few years.
Paul is a passionate learner and someone who thrives in places where people are looking for ways to solve their toughest technology problems. He spends a lot of time figuring out ways to define complex technologies in plain English. As the CTO for Microsoft in the Midwest District, Paul has a desire to help customers navigate the complexity of their own industries while leveraging Microsoft’s tools, methodologies, and resources to solve their toughest problems.Click here to Read More
Sumit Sehgal: Evidence-Based Security – Reality or Fantasy…
2016 was a year of fundamental shifts in cybercrime. We saw whole industries fall to ransomware, and in particular, healthcare. IoT exposes vulnerabilities that can literally threaten lives in a healthcare ecosystem.
This session, presented by a leading cybersecurity healthcare strategist, offers practical, actionable advice on how to build a security program that goes past just data protection and regulatory compliance. Read Less
Sumit Sehgal is the Chief Healthcare Technical Strategist for McAfee. His primary focus is on identifying needs specific to the healthcare industry from a products and practices perspective. Sehgal leverages his extensive experience in Health IT to identify priorities that are key in helping McAfee roadmap the next generation of solutions in this space.Read Less
Sehgal’s prior roles include Chief Information Security Officer for leading academic medical centers located in Boston Massachusetts and Washington D.C. Sehgal is an alumnus of Milwaukee School of Engineering focusing on Software Engineering and holds multiple industry certifications relating to Information Security program management and auditing.
Dr. Scott Zoldi: Analytics Tackles Cyber Security
Artificial intelligence and machine learning technologies are commonplace today to detect financial crime. Credit risk scorecards have long been used to empirically quantify and operationalize risk appetite. We will contrast state of art in financial spheres to Cyber Security today and review leading artificial intelligence technologies such as self-calibrating models, collaborative profiles, and anomaly detection techniques in the fight against cyber threat and use in cyber risk prediction.
Scott Zoldi is Chief Analytics Officer at FICO responsible for the analytic development of FICO’s product and technology solutions, including the FICO™ Falcon® Fraud Manager product which protects about two-thirds of the world’s payment card transactions from fraud. While at FICO, Scott has been responsible for authoring 79 analytic patents with 38 patents granted and 41 in process. Scott is actively involved in the development of new analytic products utilizing Artificial Intelligence and Machine Learning technologies. Scott is most recently focused on the applications of streaming self-learning analytics for real-time detection of Cyber Security attack.
Gary Hayslip: Cyber, an evolving ecosystem: Learn how cyber designs of Smart Cities can protect your company’s data and the accompanying risk exposure.
Key insights from today’s smart, big cities can be applied to companies and corporations. A revolution in technology is underway. Larger municipalities across the globe are taking the International Organization for Standardization (ISO) 37150/51 Smart Community frameworks to heart and are looking to a future in which they must manage the massive data generated by public services.Click here to Read More
As Chief Information Security Officer (CISO) for the City of San Diego, Gary advises the City of San Diego’s executive leadership consisting of Mayoral, City Council, and 40+ city departments and agencies on protecting city government information resources. Gary oversees citywide cyber security strategy and the enterprise cyber security program, cyber operations, compliance and risk assessment services. His mission includes creating a “risk aware” culture that places a high value on securing city information resources and protecting personal information entrusted to the City of San Diego. Click here to Read More
Andy Ellis: Tackling the Impending Complexity Apocalypse
The course of human evolution is one where certain risk management behaviors have helped us thrive (and dominate the planet). The advent of increasingly complex systems, social networks, and real-time communications have combined to create an environment where humanity’s optimized behaviors may lead to questionable, and dangerous, decision-making. How did we get here – and how can we blunt the effects of this perfect storm?
Bio: Andy Ellis is Akamai’s Chief Security Officer, governing the safety, resilience, and compliance of its planetary-scale network. He is the designer of several critical Akamai technologies, including its secure TLS acceleration network and many of the core components of the company’s web security solutions.Click here to Read More
Daneen DeFiore: NextGen Risk: Information Security in a Digital World
As companies embrace digital solutions and next generation IT, it’s up to us as Information Security professionals to understand and manage the associated risk. It’s no longer just about risk avoidance and mitigation, but rather acknowledging how to unlock the value of new tools, processes, and approaches through effective risk management that maximizes return on investment. Join as Deneen describes her company’s views concerning Next Generation IT threat management on their IT transformation journey.
Cindy Cullen: CyberSecurity and the Digital Revolution
The digital revolution is happening around us. Transformations include:
- Technology – Cloud, IoT, SAAS, smart devices
- Business – Netflix, Uber, Amazon, PayPal, GE, Walt Disney Company
- Social – housing, marriage, purchases, ownership
- Governance – privacy, compliance, financial services
- Cybercriminals/nation-state hackers/hacktivists – ransomware, social engineering, exploiting known vulnerabilities
Cybersecurity is a major initiative of every government, company, and society. Governance, risk, compliance, security frameworks, strategies, services, products/tools … are all undergoing major shifts to transformation to meet the challenges of the digital revolution.
This talk will address how cybersecurity is transforming to meet the challenges of the digital revolution.
Bio: Ms. Cullen has 15+ years experience leading cybersecurity and information risk programs. Cindy is President of the NJ Chapter of (ISC)2, is an experienced vCISO, was Chief Cyber Security Strategist at HPE driving strategic initiatives and providing thought leadership and insight regarding the ever-changing global threat landscape. Additionally, she was an ICIT Fellow advising Congress and staff on cybersecurity issues, was CISO at Telcordia/Bellcore, VP – Information Security Officer at Citi, CTO at SAFE BioPharma and designed an S-SDLC process for Bristol-Myers Squibb. Cindy is an in-demand speaker with experience at national & international venues (i.e. NIST, OWASP, RSA, …).