View, browse, and sort the ever-growing list of sessions by pass type, track, and format. With this Schedule Builder, you can build your schedule in advance and access it during the show via export or with the mobile app, once live. For your schedule to sync properly with the mobile app, be sure to login to Schedule Builder with the same email address you used to register for Interop 2019.
Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.
Don Weber (Principal Consultant and Founder, Cutaway Security)
Justin Weissert ( Director of Proactive Services, CrowdStrike)
Paul Kurtz (Co-Founder and CEO, TruSTAR)
John Pironti (President, IP Architects)
Suzanne Widup (Senior Analyst, Verizon Business)
Dave Lewis (Global Advisory CISO, Cisco, Duo Security)
Fred Kwong (Director, Information Security (CISO), Delta Dental)
Mark Mao (IP partner and Privacy Lead for the Cybersecurity, Information Governance and Privacy Practices, Troutman Sanders)
Location: Grand Ballroom E
Date: Tuesday, May 21
Time: 9:00am - 5:00pm
Pass type: All Access, Summits & Workshops - Get your pass now!
Vault Recording: TBD
See Day 1
If you are an IT pro who needs an introduction to information security, then Dark Reading's Cybersecurity Crash Course is for you. Taught by recognized experts in security, the Crash Course offers two days of education in a supportive, safe, and intimate setting where there are no dumb questions. We'll cover the fundamental concepts you need to understand today's security challenges and the attack landscape. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and responses, while at the same time updating you on the latest threats.
Why Data Breaches Occur
Suzanne Widup (Verizon RISK Team, Verizon Business)
Based on forensic evidence collected from our partner organizations as well as the Verizon caseload, the 2019 Verizon Data Breach Investigations Report (DBIR) presents a rare and comprehensive view into the world of corporate cybercrime. Now in its twelfth year of publication, this research has been used by thousands of organizations to evaluate and improve their security programs. The presentation will discuss the evolution of results over the years, and delve into the people, methods, and motives that drive attackers today. Attendees will learn about the most common attacks that affect their industry. They will learn about the actors who perpetrate these incidents, the techniques they use to carry out their attacks, the assets they prefer to exploit to gain entry into their victim’s systems and networks, and the results of their actions. They will leave this session better equipped to make evidence-based decisions on the risks their organizations face on a daily basis.
Incident Response: Concepts and Considerations
Don Weber (Principle Consultant and Founder, Cutaway Security)
No matter what the size of your enterprise or the nature of your business, you will at some point experience that "very bad day" in which your critical systems are compromised by a cyberattack. What steps should you take? Who should be notified, and how can you shorten the time to remediation? Most importantly, how can you build systems and processes today that will help create as smooth a response as possible when a compromise occurs tomorrow? In this session, a top expert discusses the people, technology, and best practices that form the core of an effective incident response program.
Who Are the Bad Guys and Why Do They Want to Hack Your Organization?
Justin Weissert (Director of Proactive Services, CrowdStrike)
Today's cyberattackers range from financially motivated criminals to politically motivated hacktivists to state-sponsored information-gathering hacker units. What are the motives and methods of these disparate adversaries? This session offers a look at the different types of cyberattackers – and how you can build a cyber defense strategy that extends across a wide variety of threats.
Closing the IT and Security Chasm with Cyber Intelligence Management and Fusion
Paul Kurtz (Founder and CEO, TruSTAR)
The convergence between IT operations and security is already here. With explosive data growth, cloud adoption, and mobile device usage at its all-time high, IT operation teams must work closely with their security counterparts to be more security forward across the enterprise, starting with the data. In this session, threat intelligence expert Paul Kurtz will outline best practices for cyber intelligence management and fusion by walking through two real-life case studies.
Implementing Zero Trust in Your Organization
Dave Lewis (Global Advisory CISO, Cisco/ Duo Security)
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads, screaming “Thou shall not pass!” has at long last reached its end. No matter what your business, it is necessary to adapt and learn to “zero trust, but verify." In this session, you will learn how to make the zero trust concept work for your enterprise.
Choosing and Working with Managed Security Service Providers
Fred Kwong (CISO, Delta Dental)
The demand for security resources has made it difficult to find enough qualified staff. With the change in the environment, more and more enterprises are looking to managed security service providers (MSSP) to help provide basic security support services. This discussion will discuss how to choose a good MSSP that will build a partnership with you, rather than just throwing over the first alert they see. All MSSPs are not the same -- learn the keys to choosing a service provider that’s right for your organization, and how to build a strong relationship with them.
Five Key Considerations When Evaluating Cyber Insurance
John Pironti (President, IP Architects LLC)
Cyber insurance can be a valuable tool and risk management capability in any size organization's toolbox if properly understood and leveraged. At the same time, it is important for organizations to understand that the cyber insurance industry and its products are still in their relative infancy and are changing regularly. This session will explore five key considerations that an organization should keep in mind when deciding whether to adopt and use cyber insurance policies.
Legal and Financial Risks of Cyberattack
Mark Mao (IP Partner and Privacy Lead for the Cybersecurity, Information Governance and Privacy Practices, Troutman Sanders)
A major data breach may not only present technical problems and interrupt your business – it may put you in court. What are your organization’s legal responsibilities when it comes to cybersecurity, and what can you do to minimize legal risks? What are some of the financial risks associated with data breaches, and how can you manage them? A top legal expert will discuss some of the issues and liabilities associated with cybersecurity, including the strengths and weaknesses of cyber insurance policies – and the hidden costs that they may not cover.
See Day 1