Navigate the current IT landscape and today's technologies
Enjoy the tranquil atmosphere while bolstering your security posture
Most importantly, we want you to have fun and get a better sense of our company culture and values.
|Presentation||Demo Lab||Discovery Zone||Restaurant|
|Room 1||Room 2||Room 13|
|8:45 - 9:30||Registration and Tech Expo|
|9:30 - 10:10||Opening Remarks|
|10:15 - 11:00|
Join Richard & Jeff from Canadian Solar to hear about their experience making the switch to Nutanix
Security in the enterprise datacenter begins with a robust infrastructure platform. However, maintaining security with a traditional infrastructure environment is challenging. In a legacy three-tier environment, hardening each component requires specialized expertise and a time-consuming process, only to relax security rules when applications stop working. Join this session to learn about how you can quickly deploy applications on a hardened, self-healing infrastructure platform, thereby driving increased business value without compromising security. You’ll also hear live from Richard Briston and Jeff Holota from Canadian Solar, Camp Secure Sense veterans, about their experience switching to Nutanix.
Presented by Richard Briston, Network Administrator, and Jeff Holota, Jr. Network Administrator
Software is the New BlackBerry Driving Business Value Outcomes through Innovative, Secure Mobile Technologies
In this session, BlackBerry will deliver an update on their corporate strategy as it relates to topics addressing business collaboration, data sharing and security threats. BlackBerry is a leading software company with a standard of security that manages the network of endpoints within the enterprise. Their integrated security solution, BlackBerry Secure, helps organizations manage and secure their mobile devices and connected things and secures communications for all messaging and file types. In today’s world of instant information exchange, providing ready access to key information to employees, business partners, and customers is a must. But doing so while maintaining secure control of corporate data is an increasing requirement. BlackBerry will share best practices on how to stay ahead of the curve, by mobilizing people, processes, apps and information in a secure manner.
Presented by David Hodge, Vice-President
|11:00 - 11:20||Tech Expo|
|11:30 - 12:30|
Security Fabric Summary * Rafi Wanounou of Fortinet will be leading the conversation during lunch to discuss their architectural approach to security.
Fortinet’s Security Fabric is designed to co-ordinate different security tools in a holistic manner in order to detect and remediate security threats with an automated response. Solutions for network, endpoint, application, data center, cloud, and access are designed to work together as an integrated and collaborative whole. The objective is to provide clients with a powerful, integrated end-to-end security solution across the entire attack surface. The Security Fabric is designed to provide control, integration, and simplified management of security across your entire organization, from IoT to the cloud.
Presented by Rafi Wanounou, Presales SE Manager
|12:30 - 1:00||Tech Expo|
|1:05 - 1:50|
Visibility Matters Applying context to find the needle in the hay stack
Conventional security strategies just aren’t working against today’s cybercriminals. Learn how to leverage a visibility fabric to eliminate blind spots in traditional networks, virtualized environments and cloud infrastructure. The presentation will also cover the following use cases:
Presented by Marc Edun, Senior Systems Engineer
Visibility, Hygiene, & Incident Response No Pain No Gain
Attackers will always target the weakest links and look for gaps in your environment. Understanding what's running on your network, how it's configured, and how to respond to an incident in a timely fashion are crucial to your success. Yet, many InfoSec professionals are challenged to keep up with security hygiene best practices. In this informative session, Tanium's Michael Alexander Martin will teach you how to take a step back from the day-to-day grind in order to assess and prioritize your task list. Such practices enable you to effectively deal with, and respond to, the latest and most dangerous threats in order of importance.
Presented by Michael Alexander Martins, Director of Technical Account Management
|1:55 - 2:05||Tech Expo|
|2:15 - 3:00|
Honeypots for Active Defense – What is the data telling us?
When honeypots are given the proper attention, care and feeding, they produce invaluable information. This intelligence has been primarily used by security researchers and organizations with advanced defensive capabilities to study their adversaries and learn from their actions.
But what about the rest of us? Honeypots are a lot of work to configure, maintain, and monitor -- how can an organization that is not focused on research gain valuable intelligence using honeypots and actively defend their network using the data obtained? The answer is honeypots for active defense. There are currently many open source security tool distributions that come pre-loaded with honeypots among other useful tools, however the honeypot software is often not deployed in an effective manner. This session will discuss techniques to deploy honeypots in ways that will not overburden the security team with massive logs to sift through and focuses on correlating active threat data observed in the honeypot with the production environment. When deploying honeypots effectively, this can give security analysts one additional mechanism to tip them off to nefarious activity within their network.
Presented by Damon Gross, Sr. Security Engineer
Bears are in your campsite. Can they eat your HONEY?
It is generally accepted that Third Party Vendors are responsible for over 70% of the data breaches today. This conversation lead by Devin Archer, VP Vertical Markets and Channels from Prevalent Inc. will discuss current best practices for maturing risk programs, current compliance requirements by industry, response tactics and some standardized approaches for reducing costs across this complex and critical practice.
Presented by Devin Archer, VP Vertical Markets and Channels
|3:00 - 3:15||Tech Expo|
|3:20 - 4:05|
Effective Security in Zero-Trust Environment
It’s no secret that the network perimeter is blurry and expanding. Google sees little distinction between board rooms and bars, cubicles and coffee shops; all are untrusted under its perimeter-less security model called BeyondCorp. This new model verifies the trust of the user and the device before granting access to critical applications, every single time. Google made this radical change, after the major attack they suffered in 2011 (project aurora), to better manage today’s risks and business needs.
How does a company that doesn’t have the resources of Google achieve a similar security posture? What does BeyondCorp mean for the rest of us? Attend this session to discuss this topic with Duo Security.
Presented by Scott Reeder, Enterprise SE
It’s Time to Look at Network Security from a New Angle How to Close the Gap Between Technology & Staff with More Intelligent Management
Security teams today are under tremendous pressure due to the rising frequency and impact of breaches and business that wants to move faster and faster. The answer to both challenges has always been to add more technology and more staff resources.
However, every new technology added creates complexity. More rules are created and more data is generated. As networks continue to evolve, this complexity will grow. And while staff resources may increase, they will never match this exponential growth of technology.
Join FireMon as they explore the causes of this “Complexity Gap” as well as how intelligent tools like automation and intelligence can help organizations close the gap for more effective, more efficient network security.
Presented by Simon Taylor, VP Firemon
|4:05 - 5:30||Break||Tech Expo|
|4:20 - 5:30||Solution Speed Dating|
|5:30 - 6:15||
|6:20 - 7:40|
Symantec Internet Security Trend Report (ISTR)
2016 saw major shifts in techniques used by attackers and cybercriminals. Based on data from Symantec’s Global Intelligence Network (GIN), Symantec’s Internet Security Threat Report (ISTR) provides a detailed analysis of recent global threat activity. This seminar will share highlights from Symantec’s ISTR 22 and describe the latest threats and trends in information security, as well as key findings and best practices:
Presented by Ajay Sood, Vice President, GM
|7:45 - TBD||Networking Party
Dueling Pianos, Whisky Tasting & Cigars, Open Bar
|Presentation||Demo Lab||Discovery Zone||Restaurant|
|Room 1||Room 2||Room 13|
|7:00 - 8:30||Breakfast|
|8:25 - 9:10|
Reconsider the Security Stack
What would it take to get you to consider removing a piece of your security stack? If Cylance can prove to you that we have your endpoints locked down at a near 100% protection rate… would you reconsider your approach to securing your network? This interactive discussion will examine the shifting nature of the threat landscape, and how to move beyond signature-based threat detection to rely on a mathematical, algorithmic, and scientific approach to disarm a threat.
Presented by Matt Stephenson, Product Market Manager
|9:10 - 9:20||Tech Expo|
|9:20 - 9:50|
The Enemy Within Detecting and Mitigating Insider Threats
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files these insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Presented by Own Lamb, Manager of Sales and Engineering
Threat Protection and Compliance for Office 365
As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
Presented by Flaaz Walji, Country Manager
|9:50 - 10:05||Tech Expo|
|10:05 - 10:35|
Using UEBA, to Shine a Light on Modern Cyber Attacks
Exabeam's platform is the world’s most-deployed User and Entity Behavior Analytics (UEBA) solution. It detects insider threats, compromised accounts, and data loss via deep learning and specialized statistical risk models. With the ability to accurately model the behavior of users, entities, and even security alerts from other security solutions, Exabeam can quickly detect complex threats, prioritize security alert investigation, and slash the response time of incident investigations. By automatically recreating entire attack chains, and piecing together both normal and anomalous behavior of users and entities, Exabeam dramatically reduces the time and effort security analysts must spend on investigations. Based on a patented session data model, Exabeam creates, in seconds, automatic incident timelines that show all activity – good and bad – across multiple IP addresses, devices, and credentials. Exabeam amplifies the abilities of SOC and IR staff by automating the manual drudge of investigations, thus freeing up resources for more proactive security initiatives like threat hunting.
* Exabeam will present a live demonstration, showing the power of its UEBA Platform and the impact it has on an organization’s Cybersecurity Team.
Presented by Richard Kent, Security Engineer, and Steven Flowers, Regional Sales Director - Canada
Next-Generation Antivirus Evolving Your Security to Defend Against Modern Attacks
Cb Defense is the most powerful NGAV platform. With its breakthrough streaming prevention, market-leading detection and response capabilities and single lightweight agent. Join us on Day 2 for a session to learn more about this innovative cloud-based platform.
Presented by Mary Ann Fitzsimmons & Philippe Dumont
|10:45 - 11:15|
SSLi Insight, 360 Degrees Visibility
“Security by obscurity or vulnerability by obscurity? You can’t stop what you can’t see..” SSL encrypted traffic is growing, rendering most security devices ineffective. Gain visibility into encrypted traffic with SSL Insight and stop potential threats on Day 2 with A10.
Presented by Roger Valencia, Senior Systems Engineer
An Unlikely Romance The Current State of Bug Bounties
Our current approach to application security assessment is inherently flawed; automation tools only find what they are programmed to find and penetration testing is extremely limited. Bug bounties build upon and improve upon these existing application security testing tools by harnessing the human creativity of the white hat researcher community with a pay-for-results rewards model.
As a cybersecurity veteran, Sean will analyze the evolution of the application security industry over the past several years and address why the existing tools and practices are falling short. With data from hundreds of bug bounty programs, he will also show how bug bounties are bridging the gap between companies who need to find security flaws before they’re exploited, and the hackers at the table ready to help.
Presented by Sean Henry, Director of Sales - East
|11:15 - 12:00||Tech Expo|
|12:00 - 12:45||Lunch|
|12:45 - 1:00||Closing Remarks|
Golf @ St. Andrews*The bus for golf will be departing The Kingbridge Centre at 1:45pm!
|1:30 - 3:30||Axe Throwing @ Kingbridge|