Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
EDGE EMEA - Save the Date!

Tenable’s Inaugural
EMEA User Conference is Here!


November 6 - 7, 2018


The May Fair Hotel, London

Over 18 keynotes and educational sessions. A full day of hands-on labs and training. Meet the Tenable Experts.

We’re arming you - our industry’s cybersecurity leaders - with the edge. Learn how Cyber Exposure is reimagining how organizations of all sizes understand and reduce cyber risk.

REGISTER NOW

Calling All Tenable Customers!Share Your Story and Receive A Complimentary Amazon Gift Certificate

Learn More

November 6Tenable University

A full day of hands-on labs where the Tenable experts go deep into our solutions to help you hone your skills and take your deployment to the next level.

November 7Tenable Edge

Our user conference will demonstrate – through thought leadership, inspirational keynotes and hands-on sessions – that Cyber Exposure represents among the most strategic advantages available to organizations today.

Tenable Edge Agenda

8:30 - 17:30
Registration Open
Tenable University
Session Topic:
Tenable.io
SecurityCenter
10:00 - 10:45
Data Acquisition with Tenable.io

Tenable.io offers several approaches to security data acquisition, including active scanning, passive monitoring, and locally hosted agents. We will discuss different approaches to data acquisition, the advantages and challenges of each, and data integration into Tenable.io.

SecurityCenter Advanced Scanning Techniques

SecurityCenter can perform scans that do not interfere with your IT infrastructure. We will discuss creating scan blackout windows, scans that chain together in sequence to avoid excessive bandwidth utilization, importing partial scan results, and handling incomplete scans. We will also talk about configuration of scan zones and repositories to efficiently scan geographically diverse deployments.

11:00 - 11:45
Tenable.io Asset Categorization

With Tenable.io, you can organize computing infrastructure into meaningful groups for scanning, analysis and visibility of data. We will discuss Tenable.io’s unique approach to asset identification, the benefits of that approach, and how to group assets for scanning, analysis, and permissions.

SecurityCenter Scan Policy Tuning

SecurityCenter provides the capability of performing scans that acquire security data beyond a typical credentialed scan. We will discuss how to maximize scan performance, fine- tune discovery, adjust for low bandwidth and scan fragile environments.

12:00 - 12:45
Tenable.io Cloud Security

In the modern IT environment, acquiring security data on cloud services can be challenging. We will discuss the challenges in securing cloud assets and how to gather and scan data from various cloud environments.

SecurityCenter Custom Reporting

SecurityCenter’s reporting features include the ability to generate complex reports with data organized in some new and useful ways. We will discuss how to perform Host-by-Host security data reporting, how to generate warning indicator dashboards and alerts and how to measure Key Performance Indicators in your infrastructure with Assurance Report Cards.

12:45 - 13:30
Lunch
Lunch
13:30 - 14:15
Tenable.io Web Application Scanning

Tenable.io provides automatic scanning of your web infrastructure for vulnerabilities commonly exploited in web applications. We will discuss how to use Tenable.io’s layered approach to web application scanning to identify vulnerabilities in your web infrastructure.

Policy and Compliance Auditing with SecurityCenter

Every organization has security policies, hardening practices, and standardized configurations that can be verified through running compliance scans. Also considerations are audit requirements like PCI, HIPAA, NIST 800-53, or ISO 27000. We will discuss how to perform compliance scanning, how to evaluate the results, and tips to make these scans work effectively.

14:30 - 15:15
Tenable.io Container Security

Many organizations utilize pre-configured host images for rapid deployment. We will discuss how Tenable.io can scan container images for vulnerabilities prior to their deployment in a live environment.

Managing Agents with SecurityCenter

Nessus Agents are the best way to manage devices for a mobile workforce, scanning while offline, and reporting the results when the device is available on the network. Importing those results into SecurityCenter puts all vulnerabilities in a central location for the most meaningful analysis. We will discuss how to set up agent scans using either Nessus Manager or Tenable.io, import those results into SecurityCenter, and manage that data.

15:30 - 16:15
Industrial Security

One of Tenable’s newest offerings, Industrial Security provides the capability to passively monitor network activity and thus identify assets and vulnerabilities in Industrial Control Systems (ICS) networks.

Complementing SecurityCenter with Tenable.io

Tenable.io adds to your existing SecurityCenter solution in several significant ways - visibility of cloud assets, agent management, PCI ASV, container security and more. We will discuss leveraging Tenable.io’s unique capabilities to support your cyber security program. Additionally, you will learn how to set up Tenable.io within SecurityCenter in order to scan cloud-facing assets, and import Agent scan results.

Times are subject to change
18:00 - 21:00
Welcome Reception - The May Fair Terrace

May Fair Terrace is a sleek, open-air enclave in the heart of luxury Mayfair. An intimate setting, perfect for drinks, conversation, and welcoming attendees to Edge! Be sure to join us for an evening of surprises.

7:30 - 8:30
Breakfast
8:30 - 8:45
Doors Open
8:45 - 9:00
Opening Remarks: David Cummins, Vice President of Sales | EMEA
David Cummins, Vice President | EMEA

David Cummins has over 15 years of technology sales experience. As Tenable’s Vice President of International Sales for the EMEA region, David and his team are shaping strategy, creating opportunities, building sustainable partner relationships and driving growth. Prior to joining Tenable, David served as EMEA Sales Director for AirMagnet where he was responsible for developing and managing all strategic relationships with customers, partners and alliances across EMEA. He also ensured the successful transition of the EMEA business to Fluke Networks following its acquisition of AirMagnet.

ver the years, David held a variety of positions within multinational corporations including IBM, where he contributed to the successful development of its SMB business and he supported the strategy and execution for a number of start-up companies.

9:00 - 9:30
Keynote: Amit Yoran, Chairman and CEO
Amit Yoran, Chairman and Chief Executive Officer | Tenable

As Chairman and Chief Executive Officer, Amit Yoran oversees the company’s strategic vision as Tenable works to empower organizations to understand and reduce their cyber security risk. Amit brings to Tenable a unique blend of leadership in the private and public sectors. Previously, he served as president of RSA, leading its transformation into one of the most successful global security companies. Amit joined RSA through the acquisition of NetWitness, the network forensics company he founded and led as CEO.

9:30 - 10:00
Keynote: Dave Cole, Chief Product Officer
Dave Cole, Chief Product Officer | Tenable

As chief product officer, Dave Cole leads initiatives in continued technology innovation and product excellence. He is an accomplished security veteran with a history of leading product innovation and building highly scalable systems, including product design and development for SaaS and cloud.

10:30 - 11:00
Customer Keynote: N Brown
Mike Koss - N. Brown

Mike is a seasoned and extremely passionate IT Security professional, with over 22 years’ experience in the industry, he has worked across many different sectors starting out in Central Government then moving to Media and more recently Finance and Retail. Mike has spent the majority of his time working in offensive security. Currently Mike is delivering a significant IT Security Transformation project to N Brown Group, a FTSE 250 listed retailer headquartered in the North West. In addition to this Mike provides cyber security leadership advisory services and also continues to work on a number of other personal side projects related to offensive security and security research.

Jennifer Johnson, Chief Marketing Officer | Tenable
10:30 - 11:00
Break
Track Session A
Track Session B
11:00 - 11:30
Tips and tricks from the trenches
Session Abstract

Get vulnerability scanning tips and tricks from a seasoned Nessus and SecurityCenter pro. Frederic will share learnings collected from 10+ years of experience – as a Nessus home user, security consultant, cyber war games participant, and vulnerability assessment team leader in Afghanistan, to using SecurityCenter as the former head of NATO's Cyber Security Hygiene Indicator programme. Get practical advice on how to scan large networks, avoid outages, and create continuous, actionable insight into your network vulnerability posture.

Frederic Coene - Cyber Security Engineer | Beosec
Building an effective Cyber Exposure program
SESSION ABSTRACT

In this session, Andy will discuss the importance of reviewing security processes when deploying supporting technologies – and how to truly adopt a business-focused approach. He’ll provide a point of view on common processes impacted by Cyber Exposure. Finally, he’ll cover a supporting maturity model that provides insight into your current and target future states.

Andy Herrington - Director of Professional Services | Tenable
11:40 - 12:10
Data Science - Leveraging Machine Learning for effective vulnerability prioritisation
SESSION ABSTRACT

Tenable has invested heavily in data science to effectively harvest and utilise the vast amounts of data generated on the platform. In combination with relevant third party data and powered by artificial intelligence we have enormous potential to solve some of the biggest challenges in cyber security faced by our customers. In this talk I am going to focus on Tenable's risk driven prioritisation strategy. We will propose Tenable's new vulnerability score (TVS), that is an adaptation of CVSS to incorporate a machine learning derived threat score. The threat score dynamically responds to the changing threat landscape. We will highlight the advantages TVS has over CVSS in terms of vastly more efficient prioritisation and its overall responsiveness to changing threat levels.

Vincent Gilcreest - Head of Data Science | Tenable
How to manage the convergence of OT and IT with Siemens and Tenable
SESSION ABSTRACT

Curious about how to manage the convergence of OT and IT? Ian and Eitan will cover: the top pain points around securing OT environments, how you can start addressing OT cybersecurity challenges and – importantly – how to gain a holistic view of your converged IT/OT environment.

Ian Bramson - Head of Global Cybersecurity Sales and Strategy | Siemens
Eitan Goldstein - Senior Director, Strategic Initiatives | Tenable
12:20 - 12:50
Research - Zero Day hunting and plugin creation
SESSION ABSTRACT

In this talk, Tom Parsons will provide an overview of the Tenable Research team. Tenable Research is a global cyber security team most strongly associated with plug-in development driving most of Tenable’s product such as Nessus, SC and Tenable.io but also made news this year with the discovery of the Peekaboo vulnerability, a major flaw in global surveillance software. The team consists of many exceptional researchers and focuses on key issues affecting how organizations defend themselves. This session will give a broad overview of the diverse work the team is doing to address the full scope of vulnerability management from asset coverage, to plug-in development, primary research and discovering zero-days. For example in 2018, Tenable Research has discovered and disclosed 30 vulnerabilities and published three whitepapers based on real-world defender behavior. The work by Tenable Research is instrumental in the effort to reduce the Cyber Exposure Gap, this session will explore how that work is accomplished.

Tom Parsons, Senior Director Product Management | Tenable
Closing the Cyber Exposure gap with automation and orchestration
SESSION ABSTRACT

Major data breaches are headline news, but those well-publicized breaches are only the tip of the iceberg. To better understand why large-scale breaches continue to occur, ServiceNow surveyed more than 2,900 security professionals involved in vulnerability response. This survey uncovered that manual processes are slowing security teams down and putting their organisations at risk. Learn how you can close the cyber exposure gap by combining Tenable and ServiceNow to make identification, prioritisation, and patching of vulnerabilities more efficient with workflows and automation.

Janene Casella, Director, Product Marketing, Security & Risk | ServiceNow
13:00 - 14:15
Lunch
14:30 - 15:00
Research - Vulnerability trends and insights
SESSION ABSTRACT

Leveraging anonymized telemetry data, Tenable Research has conducted and published three major studies this year. The research is quantitative and data-driven, providing real-world insights into how cyber defenders are actually behaving. Oliver will walk through the findings of each report:

  • Quantifying the Attacker’s First-Mover Advantage: Comparing the time it takes for enterprises to assess for a vulnerability versus the time attacker’s need to obtain a working exploit
  • Cyber Defender Strategies: Looking at enterprise vulnerability discovery and assessment maturity – and the four maturity styles organizations display
  • Vulnerability Intelligence: Showcasing the latest trends in vulnerability disclosures – and the most prevalent vulnerabilities in enterprise environments – the ones representing a truly global risk

Upcoming report (will be announced on November 7).

Oliver Rochford - Research Director | Tenable
Make your SOC Rock with Splunk, Phantom and Tenable
SESSION ABSTRACT

This session will focus on best-of-breed SOC use cases based on leading platform offerings from Splunk, Phantom and Tenable. Learn how to better leverage Splunk's security nerve center to drive efficiency within your security operations center (SOC). See how analytics-driven security combined with security automation and orchestration can enhance and accelerate Tenable Security Center’s ability to evaluate vulnerability data, prioritize security risks, and provide a clear view of your security posture. Also see how this group of technologies can better defend against threats by accelerating the cycle from incident detection, to vulnerability assessment, to faster automated response.

Don Leatham, Global Strategic Alliances - Security Markets | Splunk
Wissam Ali-Ahmad, Technical Lead - Global Strategic Alliances | Splunk
15:10 - 15:40
Avoid getting lost in translation: How to substantiate SecurityCenter results in Splunk custom dashboards
SESSION ABSTRACT

Hear the security success story behind the Holcim and Lafarge merger, executed in July 2015. You’ll learn how they orchestrated a global project to manage security vulnerabilities using SecurityCenter. Additionally, see how a custom global dashboard helps LafargeHolcim optimize resources allocated to vulnerability management.

Jose Maria Labernia, Head of IT Security and Internal Control, European IT Services | LafargeHolcim
Managing a vulnerability management program
Session Abstract

Join Laurence Bentley, information security operations manager for a global healthcare organization, as he discusses deploying Tenable to quantify and assess their cyber exposure. Laurence will share lessons learned and insights from operationalising a vulnerability management program in a large, disparate network.

Laurence Bentley - Information Security Operations Manager | A Leading Health & Insurance Company
15:50 - 16:20
The Complete Vulnerability Management Approach
Session Abstract

The presenter will address the complete vulnerability management approach needed to run a successful security department and thus diminish the risk of Cyber Exposure. Understanding your environment through live discovery methods such as scanning, a good asset management program based on best-of-breed security practices and partnering with the IT department are all essential to maintaining a strong awareness of your environment. Having a good understanding of your assets within the attack surface is crucial and priority remediation on critical security infrastructure is needed to maintain a safe environment. Continuous visibility is imperative, but so is strategic insight and the validation of success through effective security metrics, reporting and open communication with the senior management and risk management teams. Security is complicated, but with knowledge and understanding of the complete vulnerability management approach, you can reduce the risk of cyber attacks.

Ramin Lamei - Sr. Director, Information Security Officer | Tenable
Vulnerability Management in a highly heterogeneous and agile environment
SESSION ABSTRACT

The transformation of enterprise into Agile often means DevOps can choose and configure their own systems. Maciej will discuss how to handle the many technical issues related to vulnerability assessment and secure configuration monitoring.

Maciej Wrobel - Security Expert | ING
16:30 - 17:00
Securing DevOps and Cloud without slowing down
SESSION ABSTRACT

In this session, Daniel and Jonathan will examine the security issues caused by dynamic modern assets and discuss ways that Tenable can help you secure them – without slowing down business-critical processes like DevOps. Learn how to understand the vulnerabilities and the actions you can take to keep these cloud assets safe.

Dan Grice - Security Engineer | Tenable
Jonathan Fernandes - Security Engineer | Tenable
Customise your way to success with SecurityCenter
SESSION ABSTRACT

One of the key reasons organizations choose SecurityCenter is its extensive customizable reporting and dashboard capabilities. Every team is different, with unique data analysis and reporting needs. In this session, David will walk through customization approaches – and why it’s critical to consider the data before reporting on it to improve accuracy and minimize frustration.

David Bradley - Security Engineer | Tenable
17:10 - 17:30
Fireside chat with Renaud Deraison
Renaud Deraison, Chief Technology Officer & Co-Founder | Tenable

Renaud Deraison is chief technology officer of Tenable. Prior to co-founding Tenable, Renaud redefined the vulnerability management market by authoring Nessus, the world’s most widely deployed vulnerability scanner, with over one million downloads. Nessus has received numerous awards, including SC Magazine’s 2015 five-star “Best Buy” rating, SANS Institute’s Best of 2015 Award for vulnerability assessment, and Network World Asia’s 2015 award for best vulnerability assessment and management product.

17:30 - 18:30
Closing Reception

Registration is Open!

The May Fair Hotel will be our home base for Tenable Edge 2018 London. We will have reserved rooms at special, discounted rates for all registered attendees.

Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save