Cybersecurity Crash Course - Day 1


Shawn Anderson (Chief Security Advisor, Microsoft)

Katie Burnell (Insider Threat Analyst (EMEA), Dtex Systems)

Jeff Crume (Distinguished Engineer, IT Security Architect, IBM Master Inventor, IBM)

Gene Fredriksen (CISO, PCSU)

Chris Eng (VP, Research, Veracode)

Kelly Jackson Higgins (Executive Editor, Dark Reading)

Barbara Kay (Senior Director of Security, ExtraHop)

Brett Kelsey (VP & Chief Technology Strategist, McAfee)

Jihad Nance (Customer Experience Sales Engineer, Mimecast)

Sara Peters (Senior Editor, Dark Reading)

Melanie Swan (Theorist, Purdue University)

Tim Wilson (Editor in Chief, Dark Reading)

Location: Grand Ballroom F

Date: Monday, April 30

Time: 9:00am - 5:00pm

Pass Type: All Access, Summits & Workshops

Format: Summit

Track: Security

Audience: Introductory

Vault Recording: TBD

Audience Level: Introductory

Arctic Wolf
Summit Sponsor
Summit Sponsor
Summit Sponsor
Summit Sponsor

Note: an RSVP is required for Workshops & Summits. Please RSVP by making your selections in your registration account.

An intensive, two-day event for IT pros who need to bone up on information security essentials
If you are an IT pro who needs a fast, comprehensive, and authoritative course that will catch you up on all of the latest developments and thinking about data security, then Dark Reading’s Cybersecurity Crash Course is for you. Taught by recognized experts in their respective areas of security specialty, the Cybersecurity Crash Course offers two days of education that will give you the fundamental concepts you need to understand today’s security challenges, as well as an overview of the latest attacks, threats, and vulnerabilities that put enterprises at risk. You’ll get insights on the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you “security savvy” by giving you the basics you need to understand the threats and responses, while at the same time catching you up on the latest exploits being perpetrated by computer criminals, nation-states, and hacktivists. Best of all, uou’ll have an opportunity to ask the experts questions about specific threats to your environment – in a supportive, safe, and intimate setting where there are no dumb questions.

Day 1: Cyber Defender Crash Course

9:00-9:45am: Opening Address: The State of the Enterprise Security Department
Kelly Jackson Higgins and Tim Wilson
Cybersecurity has become one of the most significant – and least predictable – risks faced by today’s enterprises. This session will include data from several recent Dark Reading surveys of IT and security executives, as well as an overview of the major incidents and vulnerability news of recent months.

9:45-10:30am: Five Key Elements of Enterprise Security
Gene Fredriksen
No matter how large or small your organization, there are some core functions, tasks, and principles that are critical to building an effective defense. This session outlines key building blocks that are central to developing a cybersecurity architecture and processes that really work.

10:30-10:45am: Break

10:45-11:00am: Lightning Talk 1: Your E-W Data is a Gold Mine for AI Driven Investigations
Barbara Kay

11:00-11:45am: Principles of Endpoint Defense
Many IT security experts agree: The endpoint is often the weakest link in enterprise cyber defense. Learn about current threats to the endpoint, basic principles of endpoint protection, and key issues including user authentication, malware defense, and how to train users to protect their systems and data.

11:45am-1:00pm: Networking/Lunch

1:00-1:45pm: The Unseen Insider Threat: Negligence
Katie Burnell
While malicious leaks of enterprise data often grab the headlines, employee negligence accounts for most insider security threats. We'll explore the role of end user negligence in exposing enterprise data to compromise, offering specific examples of recent incidents as well as recommendations on how to protect your organization from critical data leaks.

1:45-2:30pm: Application Security: How to Develop Secure Software (And What to Do When It Isn’t)
The keys to your enterprise’s kingdom lie in its applications, but application security vulnerabilities are often overlooked, both by software manufacturers and internal app development teams. What steps can your organization take to find and repair application vulnerabilities and ensure its own applications are secure in the first place? Learn key practices for scanning and securing applications and improving security in your software development organization.

2:30-2:45pm: Break

2:45-3:30pm: Defending Your Data in the Service Provider’s Cloud
Shawn Anderson
Enterprises of all sizes are becoming increasingly reliant on third-party cloud services to provide computing and storage resources, but can expose your data and applications to potential attacks or data leaks. In this session, attendees will learn to work with cloud providers to ensure that their critical information is secure – and to guarantee a swift response if a compromise occurs.

3:30-3:45pm: Lightning Talk 2: Advanced Threat Protection: Maintaining Cyber Resilience in an Evolving Threat Landscape
Jihad Nance

3:45-4:30pm: Blockchain Technology Explained
Melanie Swan
Blockchain is a distributed ledger technology with disruptive potential for many industries. Blockchains allow trusted and open exchange over the Internet without relying upon central servers or other third-party intermediaries. This session provides a comprehensive explanation of blockchain technology, the status of its adoption and applications in diverse industries, and practical examples that show how blockchain transactions work.

4:30-5:15 pm: Hacking Everything: The Dark Side of the Internet of Things
Jeff Crume
With the Internet of Things (IoT), essentially everything becomes a computer. We know that computers can be hacked. This means that everything can be hacked including cars, home appliances, medical devices and more. This session will give examples of IoT hacks and the consequences of not getting security right as we move to this important new technology.

View the Day 2 agenda.

Presentation Files