Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

AGENDA

8:00-9:00
Breakfast
9:00-9:30
Digital Transformation and the Future of Cybersecurity | Renaud Deraison, Co-Founder & CTO in conversation with David Needle, technology reporter, editor and writer, eWeek, CIO.com and Computerworld
KEYNOTE
Digital Transformation and the Future of Cybersecurity | Renaud Deraison, Co-Founder & CTO in conversation with David Needle, technology reporter, editor and writer, eWeek, CIO.com and Computerworld
Renaud Deraison,
Co-founder and CTO, Tenable
Renaud Deraison is chief technology officer of Tenable. Prior to co-founding Tenable, Renaud redefined the vulnerability management market by authoring Nessus, the world’s most widely deployed vulnerability scanner, with over one million downloads. Nessus has received numerous awards, including SC Magazine’s 2015 five-star “Best Buy” rating, SANS Institute’s Best of 2015 Award for vulnerability assessment, and Network World Asia’s 2015 award for best vulnerability assessment and management product.
9:30-10:00

Track Sessions

Track A
Security Issues that Deserve a Logo
In the last couple of years, vulnerabilities with catchy names and vector logos have been hitting the headlines and driving knee-jerk reactions within organizations. These vulnerabilities are bad, some extremely critical, but while everyone is running around trying to patch the latest SSL vulnerability, huge flaws in security still linger. With ransomware closing hospitals and Internet outages being caused by default credentials on IoT devices, the focus needs to be less on zero-day vulnerabilities and more on operationalizing foundational security controls. Join Gavin Millard, who will share some of the true security issues that deserve a logo, and how focusing on foundational security controls can address them.

Gavin Millard

Technical Director
Tenable

Track B
I Can Do That? Building Custom Tools with the SecurityCenter API

This session will explain how to utilize the SecurityCenter API to build custom tools like alerting, creating tickets for teams and automating basic security tasks, so information security professionals can focus on more important activities. Did you know you can drop a file containing the top 10 vulnerable hosts into popular chat applications like Slack? Did you know you can automate ticket creation using the SecurityCenter API? All this and more will be covered in this session. A basic knowledge of programming concepts is preferred, but not required. We will cover these concepts using both Python and Bash.

Jered Bare

Security Professional
Carfax

10:00-10:30
Refreshments and Networking | Attendee Networking Lounge, Brain Bar and Partner Pavilion Open
10:30-11:00

Track Sessions

Track A
ServiceNow and Tenable – Leveraging Automation for Faster Vulnerability Response

Responding to vulnerabilities is akin to battling a forest fire. Responders pick which areas to go after and which areas to let burn, but there’s always damage. What if there were a better way to fight the right fires faster?

In this session, we will share how ServiceNow is partnering with Tenable to help security teams mitigate risks by enhancing vulnerability remediation efforts. From comprehensive vulnerability assessments to tracking issues through resolution, ServiceNow and Tenable are innovating and integrating to drive customer success.

Piero DePaoli

Director Security Business Unit
ServiceNow

Track B
The Current State of OT Cybersecurity Readiness and How Siemens and Tenable Can Help

We will look at how operational technology (OT) security needs differ from IT security, and the importance of purpose-built OT technology. We will assess where OT cybersecurity teams are investing today and the types of technology they will deploy in the future – from network visibility through security analytics. We will also show how organizations are moving to gain transparency across their IT and OT networks, for continuous understanding of and control over their cyber exposure. We will close with practical tips on how IT security teams can begin expanding their operations to support OT security.

Eitan Goldstein

Director Industrial Cyber and Digital Security, Siemens Energy
Siemens

11:00-11:30

Track Sessions

Track A
Combating Cyber Exposure with Tenable – Achieving Visibility and Insight

There are two stark realities that have emerged as organizations manage their cyber exposure:

  1. You cannot patch every vulnerability.
  2. You are drowning in a sea of information about cyber exposure.

This means your organization is in a perpetual state of risk and triage of that risk. Only the most important assets will get attention and the rest must wait.

At the same time, the visibility you have into your infrastructure generates an unimaginable volume of data. Herein lies another stark reality – you know a great deal about your assets, but you lack true insight into what’s most important to the business.

The solution to dealing with these two realities is to apply proper cyber exposure prioritisation principles. Applying these techniques allows you to leverage your visibility to make impactful decisions that reduce business risk.

Indrani Chandrasegaran-Kermorvant

VP, Information Security
Trusted Source

Track B
Using Tenable.io as a Compliance Monitoring Solution for a Global Accountancy Firm

In this talk, we will share how Capgemini has built and is operating a compliance monitoring solution for a global accountancy firm with 130 locations globally and 40,000 devices, with each location responsible for its own IT. The solution, built on Tenable.io, helps the local firms stay compliant with the global security policy and associated standards. We will present how Capgemini has set up a verification process for these standards, including automated verification provided by Tenable.io. Enabled by the solution’s flexibility, we are using custom audit files and reporting to support a heterogeneous global organization, with location-specific standards and reports. This also includes the use of agents to scan systems outside the office perimeters. Join us to learn how the flexibility and comprehensive coverage provided by Tenable.io can help monitor and assess even the most complex enterprise environment.

Edward Matray

IT Security Consultant
Capgemini

11:30-12:00

Track Sessions

Track A
Leveraging Tenable.io as a force multiplier to enable a minimally staffed security and compliance operation

In today’s competitive environment, e-tailers have limited resources and tight margins. This means protecting customer information and intellectual property often competes for resources with search engine optimization, social media marketing, and other marketing investments.

Therefore, in your role as the enterprise security professional, you must choose the best solutions to enable security and compliance with a limited budget, through solutions that make you more effective and efficient. This presentation will show how Venus Fashion leverages the cloud-based capabilities of Tenable.io to maintain a safe and compliant environment for e-tailing and a fantastic customer experience.

Jonah Goldsmith

Compliance Information Security Engineer
Venus Fashion

Track B
Best Practices for Securing AWS

Many organizations are rapidly adopting public cloud services, but securing assets in the cloud isn’t the same as protecting your on-prem resources. If you’re looking to take the guesswork out of securing your AWS environment, join this session for an overview of industry best practices and resources for configuring AWS deployments.

We will highlight what you need to know from Amazon’s own Security Guidelines, CIS AWS Foundations and AWS Three Tier Web Architecture Benchmarks, and CSA Cloud Controls Matrix (CCM) and Security Guidance. We will also cover how these best practices support broader compliance frameworks such as PCI, NIST 800-54, and ISO 27001/27002. Finally, we will recommend a number of specific actions which can help you validate and monitor the posture of your deployment. Throughout, we will illustrate these best practices with real-world examples of how Tenable solutions can support your cloud security journey.

Justin Brown

Sr. Research Engineer
Tenable

12:00-12:20
Closing Remarks
12:20-1:30
Lunch
Times are subject to change