Schedule Builder

View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.

Cybersecurity Crash Course - Day 1

Sara Peters (Senior Editor, Dark Reading)

Tim Wilson (Co-Founder and Editor-in-Chief, Dark Reading)

Shawn Anderson (Executive Security Advisor, Microsoft)

Katie Burnell (Global Insider Threat Specialist, Dtex Systems)

Robert LaMagna-Reiter (Sr. Director, Information Security / CISO, First National Technology Solutions)

Maxine Holt (Research Director, Ovum)

Kelly Jackson Higgins (Executive Editor, Dark Reading)

Aurora Morales (Search Outreach Specialist, Google)

Date: Monday, May 20

Time: 9:00am - 5:00pm

Pass type: All Access, Summits & Workshops - Get your pass now!

Track/Topic: Security

Audience: All

Format: Summit

Vault Recording: TBD

Audience Level: All

See Day 2

If you are an IT pro who needs an introduction to information security, then Dark Reading's Cybersecurity Crash Course is for you. Taught by recognized experts in security, the Crash Course offers two days of education in a supportive, safe, and intimate setting where there are no dumb questions. We'll cover the fundamental concepts you need to understand today's security challenges and the attack landscape. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and responses, while at the same time updating you on the latest threats.

The State of the Enterprise Security Department
Tim Wilson (Editor-in-Chief, Dark Reading) & Kelly Jackson Higgins (Executive Editor, Dark Reading)
Cybersecurity has become one of the most significant – and least predictable – risks faced by today’s enterprises. What keeps IT security professionals awake at night, and how are they addressing those challenges? How are security teams spending their resources, and why do data breaches keep happening? This session will include data from several recent Dark Reading surveys of IT and security executives, as well as an overview of the major incidents and vulnerability news of recent months.

Insider Threats: How to Create and Maintain an Effective Program
Katie Burnell (Global Insider Threat Specialist, Dtex Systems)
Using real-world examples, a top expert on insider threats will offer advice on how to determine if insider risk exists; how to understand its potential causes; how to enlist employees to support the security cause; and how to overcome the pitfalls of an insider threat program. Attendees will learn how to develop an effective strategy for reducing insider threat risk and how to justify its costs.

Best Practices for Securing Your Website
Aurora Morales ( Search Outreach, Google)
With new threats constantly emerging, how can website owners protect themselves and their business? Aurora Morales, a specialist at Google, will cover this crucial topic and share several demos of website threats, as well as how they can be prevented. Find out what Google is seeing in hacking trends, what HTTPS does (and doesn't) do, and how to best address a hacked site. Attendees will learn how to protect against SQL injection attacks, sanitize user-generated input, and come away with other practical tips that can immediately be implemented to secure their sites.

Building a Cloud Security and Operating Model
Robert LaMagna-Reiter (Chief Information, First National Technology Solutions)
In a cloud-first era, enterprises are continually enhancing technology to keep up with customer demands. With new, faster and more functional technology comes expanded information security & risk management complexities. In order to bring order to chaos, it's critical to understand how to secure a multi-cloud model, build a repeatable operation model & leverage efficiencies. Learn how to fine tune your cloud security initiatives to effectively cover your most important assets. Put your existing security processes & solutions to work protecting your data from multi-cloud environments and digital initiatives to container and application development platforms. Understand the gaps between public cloud base packages and what's required to maintain the same level of security and granularity as your on-premise infrastructure.

Evaluating and Choosing Security Vendors and Technology
Maxine Holt (Research Director, Ovum)
With some 2,500 vendors offering technology for enterprise security, choosing the right product -- or even the right vendor -- can be an overwhelming task. In this session industry analyst Maxine Holt of Ovum Research explains how to define your requirements, select the criteria for evaluating security vendors, and how to write an RFP for technology that meets your organization’s specific security needs.

See Day 2