Agenda

Agenda

Cyber:Secured Forum 2019 will be held July 29-31 at The Westin Dallas Park Central in Dallas, Texas.

July 29th, 201912:00am12:00am
 
July 30th, 20197:00am8:00am

Breakfast/Networking

 
July 30th, 20198:00am9:00am

Keynote

 
July 30th, 20199:15am10:15am
 

Where:The Westin Dallas Park Central | Dallas, Texas

As enterprises embark on digital transformation, leading organizations are emphasizing a converged risk management approach bringing new players to the decision-making table. Physical security solutions increasingly interact with critical data sources to deliver more value to an organization, so what are information security professionals interested in when interacting with their physical security counterparts and their partners? How can physical security provide value –and hence buy in – from these new decision makers – with often bigger budgets. A distinguished panel of executives from the office of the chief information security officer (CISO) from leading organizations discuss these questions and more.

default-speaker-headshot
Head of Reengineering and Global Security Engineering
RBC Capital Markets
July 30th, 201910:15am10:45am

Coffee/Networking break

 
July 30th, 201910:45am11:45am

Morning Breakout Sessions

 
 

Where:The Westin Dallas Park Central | Dallas, Texas

Can security integrators monetize cybersecurity? To do so, they need to offer managed security services that provide long-term security for clients and a steady revenue stream for their integration business. To do this, integrators need to understand what threats companies face and know what products and services mitigate those threats. This discussion will identify the threats in understandable, non-techno-geek terms and outline the security products that match up against each. Participants will receive a framework with which to evaluate client risk and build a mitigation strategy that they can sell to clients.

Mains-Steven
CEO and Managing Partner
TechMIS LLC
 

Where:The Westin Dallas Park Central | Dallas, Texas

Nearly every day, the headlines are full of breach announcements of major companies and organizations that leave us with many questions. How do these breaches happen? Why didn’t anyone notice? Why does this keep happening? Could this happen to me? This session will cover how attackers select, plan and attack their targets from start to finish with real-world scenarios and conclude with what you can do to protect your company’s reputation as a manufacturer or systems integrator.

Valerie Thomas
Executive Information Security Consultant
Securicon
July 30th, 201910:45am11:45am
 

Where:The Westin Dallas Park Central | Dallas, Texas

What can a hacker and a lawyer teach the physical security industry about the legal landscape of cybersecurity? We all know that costs and liabilities associated with cyber breaches are multiplying; however, there is a tremendous number of cybersecurity blind spots that threaten the industry and can rare their ugly heads in the near future. A cyber-legal mind takes a microscope to some of the glaring legal ramifications that can impact the industry specifically and issues relating to the domain name system, intellectual property, nation state actors and privacy of information collected by security systems.

Alexander Urbelis
Partner
Blackstone Law Group
July 30th, 201911:45am1:00pm

Lunch/Networking break

 
July 30th, 20191:00pm2:00pm

Mid Day Breakout Sessions

 
July 30th, 20191:00pm2:00pm
 

Where:The Westin Dallas Park Central | Dallas, Texas

Five years after its initial release, the NIST Cybersecurity Framework is still a gold-standard process for prioritized, flexible, repeatable, performance-based and cost-effective approach to managing cybersecurity risk at all levels in an organization. The framework is applicable to organizations of all sizes and sectors. This presentation will address using the NIST Cybersecurity Framework for building a cybersecurity program (engineering, technology and business) that’s addresses today’s cybersecurity landscape and cyber risks, providing attendees with assessments, executive scorecards and a road map to remediate control gaps.

Larry Wilson
CISO
University of Massachusetts President's Office
July 30th, 20191:00pm2:00pm
 

Where:The Westin Dallas Park Central | Dallas, Texas

Research firms forecast that video will produce 15.1 zettabytes of data annually – no other IoT application comes close to this rate of data production. This influx in data, as well as the growing adoption of video analytics and artificial intelligence, propels video to be used in a wide variety of ways. These trends enhance video’s value but also pose challenges, such as threats related to cybersecurity. This presentation explores how the latest innovations in IT enable users to better capture, store and protect data. Attendees will understand how data has become today’s “modern currency” and how deep learning enables you to pinpoint the exact data that is important to your business. Attendees will also learn how video data is affected by data privacy regulations like the Health Insurance Portability and Accountability Act and Europe’s General Data Protection Regulation and mandates encryption.

default-speaker-headshot
HyTrust
Brandon-Reich
Senior Director of Surveillance Solutions
Pivot3
 

Where:The Westin Dallas Park Central | Dallas, Texas

For any organization that has attempted a Runtime Application Self Protection (RASP) deployment, you know the frustrations that come with getting C-level buy-in and customer engagement. This presentation walks through the ups and downs of a successful RASP deployment, including how to deal with delays, how to measure whether the deployment is actually working and how to integrate your RASP deployment with common security information and event management tools while consistently delivering added value to the business. In this session, attendees will learn how to
  1. assess the do’s and don’ts of deploying RASP in a large enterprise,
  2. effectively guide senior management expectations of deployment and
  3. evaluate how it works and gauge effectiveness.

troy-bowen
Manager, Application Security
Verizon
July 30th, 20192:15pm3:15pm

Afternoon Breakout Sessions

 
July 30th, 20192:15pm3:15pm
 

Where:The Westin Dallas Park Central | Dallas, Texas

Post-cyber breach, your next steps are critical to the recovery success, or potential demise of your company. What do you do? Who do you call, and when? The time to create a data response plan is before an incident happens. During this session we’ll discuss the critical components that should be included in a cyber incident response plan to help protect you, your customers and your company from reputational and monetary damages.

Wayne Dean
Vice President
McGriff Insurance Services
Hoeflinger, Hannah
Professional Lines Broker
INSUREtrust
 

Where:The Westin Dallas Park Central | Dallas, Texas

The cloud has revolutionized the scale and security of physical security operations, reducing maintenance and provisioning time and redirecting those efforts to the actual practice of security; however, even with the major cloud service providers ramping up security and implementing world class cybersecurity procedures, these back-end practices do not always translate to security on endpoint applications, as standards and APIs must be configured securely by customers. This session will take attendees through the recommended on-premises procedures of deploying a security application securely on the major cloud services.

Chris Peckham
Chief Operating Officer
Building Intelligence
July 30th, 20192:15pm3:15pm
 

Where:The Westin Dallas Park Central | Dallas, Texas

In today’s world, security is mission-critical and needs to be looked at holistically. The once predominantly physical security business is no longer enough to protect against an increasingly complex risk landscape. As today’s threats and breaches frequently target an organization’s IT infrastructure, it is paramount that businesses turn to a more unified and collaborative security strategy that incorporates both physical and cyber aspects. This requires convergence among the enterprise: cyber, IT and traditional security teams must unite to strengthen risk mitigation. Security solutions must now take into account all methods in which a threat could be presented, which requires gathering intelligence from a range of sources such as the web and applying relevant insight to physical components. A comprehensive strategy built with all areas of security in mind can lead to better incident management and faster response, ultimately positively impacting business continuity, employee safety, customer experience and brand reputation.

Bill Eckard
Director, Strategic Accounts, Situational Intelligence Solutions
Verint
Gilles Perez
Head of Business Development – North America, Threat Intelligence Group
Verint
July 30th, 20193:15pm3:45pm

Coffee/Networking break

 
July 30th, 20193:45pm4:45pm
 

Where:The Westin Dallas Park Central | Dallas, Texas

Technologies Shaping the Converged Cyber-Physical World

Edward Lee
Security and Trust Advisor
Google Cloud
July 30th, 20194:45pm6:00pm

Networking Reception

 
July 31st, 20197:00am8:00am

Breakfast/Networking

 
 

Where:The Westin Dallas Park Central

What Physical Security Can Learn From Cybersecurity…and Vice Versa  

Finney, George
CISO
Southern Methodist University
July 31st, 20199:15am10:15am
 
July 31st, 201910:30am11:30am

Morning Breakout Sessions

 
 

Where:The Westin Dallas Park Central | Dallas, Texas

Over the past decade, hundreds of millions, if not billions, of dollars of valuable data and the future opportunity it embodies have been stolen from American industry. Despite huge investments in cybersecurity, breaches and data thefts continue to happen on what seems to be an exponentially increasing basis. The uncomfortable truth about that investment, however, is that it has focused on failed methodologies or closing the barn door after the horse has bolted. This session will explore solutions and exemplary products that implement “deterrence by denial,” a cyber defense strategy that assumes an attacker will be successful in penetrating the perimeter but removes financial motivation to do so by rendering the ultimate targets of the attack, industrial information and intellectual property, useless even if successfully stolen.

Firestone, Adam
Chief Engineering Officer
Secure Channels, Inc.
 

Where:The Westin Dallas Park Central | Dallas, Texas

Supply chain cybersecurity scrutiny is increasing across the entire critical infrastructure ecosystem, not just the Department of Defense. This presentation reviews the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments and includes advice for configuring, monitoring, automating and reporting upon shared National Institute of Standards & Technology (NIST) 800-171 controls.

Lanning_Andrew
Defense Industrial Base Sector Chief
InfraGard Hawaii Member Alliance
David Stevens
Managing Director
Kapu Technologies, LLC
 

Where:The Westin Dallas Park Central | Dallas, Texas

TBA

Eldon Spickerhoff
Founder and Chief Innovation Officer
eSentire
 

Where:The Westin Dallas Park Central | Dallas, Texas

Innovations in policy, technology and people can lead to breakthrough results in security. Specifically, investments in public-private partnership can go a long way in aligning the enterprise mission of cybersecurity with our nations. David Hogue, technical director for the National Security Agency’s (NSA’s) Cybersecurity Threat Operations Center (NCTOC) will share principles on how the NSA is approaching cybersecurity innovation and how the security industry can partner in the overall mission. David will share his thoughts on how the industry can develop solutions for managing  gateways and cyber perimeters, hardening endpoints to meet best practices and standards, embracing comprehensive and automated threat intelligence and cultivating a culture of curiosity and innovation.

HOGUE
Technical Director, Cybersecurity Threat Operations Center
National Security Agency