View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.
Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.
Date: Tuesday, May 21
Time: 9:00am - 5:00pm
Pass type: All Access, Summits & Workshops - Get your pass now!
Vault Recording: TBD
Audience Level: All
See Day 1
If you are an IT pro who needs an introduction to information security, then Dark Reading's Cybersecurity Crash Course is for you. Taught by recognized experts in security, the Crash Course offers two days of education in a supportive, safe, and intimate setting where there are no dumb questions. We'll cover the fundamental concepts you need to understand today's security challenges and the attack landscape. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and responses, while at the same time updating you on the latest threats.
Why Data Breaches Occur
Suzanne Widup (Verizon RISK Team, Verizon Business)
Based on forensic evidence collected from our partner organizations as well as the Verizon caseload, the 2019 Verizon Data Breach Investigations Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its twelfth year of publication, this research has been used by thousands of organizations to evaluate and improve their security programs. The presentation will discuss the evolution of results over the years, and delve into the people, methods and motives that drive attackers today. Attendees will learn about the most common attacks that affect their industry. They will learn about the actors who perpetrate these incidents, the techniques they use to carry out their attacks, the assets they prefer to exploit to gain entry into their victim’s systems and networks, and the results of their actions. They will leave this session better equipped to make evidence-based decisions on the risks their organizations face on a daily basis.
Incident Response: Concepts and Considerations
Don Weber (Principal Consultant and Founder, Cutaway Security)
No matter what the size of your enterprise or the nature of your business, you will at some point experience that “very bad day” in which your critical systems are compromised by a cyber attack. What steps should you take? Who should be notified, and how can you shorten the time to remediation? Most importantly, how can you build systems and processes today that will help create as smooth a response as possible when a compromise occurs tomorrow? In this session, a top expert discusses the people, technology, and best practices that form the core of an effective incident response program.
Who Are the Bad Guys and Why Do They Want to Hack Your Organization?
Justin Weissert (Director of Proactive Services, CrowdStrike)
Today's cyber attackers range from financially-motivated criminals to politically-motivated hacktivists to state-sponsored information-gathering hacker units. What are the motives and methods of these disparate adversaries? This session offers a look at the different types of cyber attackers – and how you can build a cyber defense strategy that extends across a wide variety of threats.
Closing The IT and Security Chasm With Cyber Intelligence Management and Fusion
Paul Kurtz (Founder and CEO of TruSTAR)
The convergence between IT operations and security is already here. With explosive data growth, cloud adoption, and mobile device usage at its all time high, IT operation teams must work closely with their security counterparts to be more security forward across the enterprise, starting with the data. In this session, threat intelligence expert Paul Kurtz will outline best practices for cyber intelligence management and fusion by walking through two real-life case studies.
Five Key Considerations When Evaluating Cyber Insurance
John Pironti (President, IP Architects LLC)
Cyber insurance can be a valuable tool and risk management capability in any size organization’s tool box if properly understood and leveraged. At the same time, it is important for organizations to understand that the cyber insurance industry and its products are still in their relative infancy and are changing regularly. This session will explore five key considerations that an organization should consider when considering adopting and using cyber insurance policies.
See Day 1