Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

2019 IG3 Mid-Atlantic Conference Agenda

52 visualizaciones

Publicado el

Join Hector Del Castillo, Chief Product Officer at Byond, at a panel discussion at the 2019 IG3 Mid-Atlantic Conference. This will be held June 25-27, 2019 at the Watergate Hotel in Washington, DC.

Wednesday, June 26, 2019 | 3:10 - 4:00 PM

This will be an engaging discussion of the challenges in protecting consumer personal data, and for marketers in being able to utilize the power of collected customer data.

Consumer Privacy - Survival in the Electronic Marketplace
Finding common ground in preserving consumer privacy while supporting internet marketers in selling good and services. Consumers in today’s web-based marketplace want the “freedom to consume”. Marketers of products and services want the “freedom to sell”. Both want to maximize the power of the internet, but one wants to protect personal information while the other wants to access it. Their goals seem at odds with one another in terms of personal data ownership, privacy, and utilization for business success. Is there common ground where each can function successfully and in an ethical manner? We will discuss the challenges for consumers in protecting their personal data, and for marketers in being able to utilize the power of collected customer data.

About 2019 IG3 Mid-Atlantic Conference
Join hundreds of practitioners from the public and private sector (Government, Enterprise and Mid-Market companies, SMBs, and law firms.) for the IG3 Mid-Atlantic Conference.

We will be discussing best practices and current trends in: (Track 1) Cybersecurity, Privacy & Data Protection, (Track 2) Legal Ops, eDiscovery & Records Management, and (Track 3) Audit, Risk & Compliance.
Follow this link to learn more or to register: bit.ly/2019ig3conf.

Follow this link to view or download the conference agenda: bit.ly/ig3dcagenda.

About Byond
A business strategy consulting firm who believes in making a massive positive impact within any organization. We assess and analyze a client's business health and strength. We provide actionable intelligence to business executives and owners who want to grow their companies fast to outperform their competition.

About Hector Del Castillo
Hector is a product executive with over 18 years of experience working for digital companies with world-class offerings. He substantially grows digital companies by designing and implementing a bold product strategy and helping them adopt leading methods and tools to achieve smarter outcomes resulting in over 26% increase in profitability.

If you are looking to grow your company fast, set up an appointment with Hector to identify your specific business situation and show you how we can help you.

Contact: hector@byondma.com Follow: @byondma Visit: www.byondma.com

Publicado en: Empresariales
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y3nhqquc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Sé el primero en recomendar esto

2019 IG3 Mid-Atlantic Conference Agenda

  1. 1. WATERGATE WATERGATE HOTEL JUNE 25-27, 2019 ◆ WASHINGTON, DC
  2. 2. Great Speakers. Great Locations. Great Experience. For more information, please email Chris@thinkbigexit.com Join us in 2019!
  3. 3. A NEW VENTURE CAPITAL FUND, WITH A TWIST. www.thinkbigexit.com
  4. 4. Pg. 1 Agenda Tuesday - June 25, 2019 4:00-5:00PM - Exhibit Hall Exhibit Set-up Opportunity #1 3:00-6:00PM - The Watergate Hotel Check into the Hotel 6:00-9:00PM - TBD Pirvate Dinner Events Wednesday - June 26, 2019 7:45-8:30AM - Exhibit Hall Registration and Exhibit Set-up - Opportunity #2 7:45-8:30AM - Exhibit Hall Continental Breakfast 8:30-9:20AM - Moretti Ballroom C/D Welcome Remarks and Keynote Address Wednesday Keynote Address 8:30-9:20AM - Moretti Ballroom C/D Nemi George - From The War Room to the Board Room...Elevating the Role of Information Security The average cost of a data breach globally increased by ~6.4% in 2018 from 2017. This number is bound to increase taking into consideration the amount of regulatory oversight across USA and Europe with CCPA and GDPR coming into effect. As a result, Information Security and Compliance can no longer be left to technology professionals in I.T. looking to proffer often tactical short term - point solutions but rather has to be elevated to the board room so the overall business risk and impact is understood, and long term strategic solutions can be focused on. 9:20-9:40AM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 9:40-10:30AM - Moretti Ballroom C/D Managing Risk with Cyber Readiness Models You’ve been as proactive as possible, but how can you be aggressively REACTIVE when (not if) you are breached? Join our panelists as they discuss how threats have evolved over the last two decades, while defenses have not kept pace with these threats. The panelists will also discuss whether all parts are equal in Perimeter, Alarm, and Response investments, why we are seeing gaps in organizations’ cyber readiness models, and why combining overlapping technologies produces an effect that exceeds the sum of their parts by means of a “belt and suspenders approach” to fill your Cyber Readiness gaps. Sponsor: CyFIR Moderator: Ben Cotton, Founder at CyFIR Panelist: Chris Konrad, Global Security Director at WTT Panelist: Brian Herr, CISO at CyFIR Panelist: Mark Phinick, VP at BigFix HCL Panelist: Jeff Tutton, President Global Cybersecurity DFIR and Remediation at IntersecWorld Panelist: Brett Conlon, CISO at Edelman Financial Services 9:40-10:30AM - Moretti Ballroom E/F Balancing Innovation, Data Privacy Compliance and Ethics Please join us for a lively discussion about the role compliance plays in Innovation. Does the need to comply with new regulations like GDPR and other data privacy laws cause business and technology to choose between technological innovation and customer experience like personalization, or to find even better ways, more innovative ways to achieve business goals while protecting customers’ privacy?
  5. 5. Pg. 2 Sponsor: JEM Moderator: Jen McClure, CEO at JEM Panelist: Harry Broadman, Partner and Practice Chair at Berkeley Research Group LLC and Johns Hopkins University Faculty Panelist: Genevieve Grabman, Author, The Technology Takers Panelist: Mike Tibodeau, Operations Manager, Data Protection & Privacy at Cisco Panelist: Mark Potter, CISO at NewWave Telecom & Technologies, Inc. Panelist: Jamie Danker, Director of Privacy at Easy Dynamics Corp 10:30-10:50AM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 10:50-11:40AM - Moretti Ballroom C/D Responding to the Insider Threat Insider threat is a growing source of risk for many companies, ranging from the mid-market to the Fortune 10. This panel will cover different themes around insider threat, including the different types of insiders (witting and unwitting) as well as things an organization can do to mitigate damage to brand and reputational value when an insider threat has been discovered. Sponsor: Nisos Moderator: Sean Weppner, Chief Strategy Officer at Nisos Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy Panelist: Kwabena Appenteng, Shareholder at Littler Panelist: Lee Bailey, CISO at ABC Fine Wine & Spirits Panelist: Chuck Brooks, Principal Market Growth Strategist -- Cyberse- curity and Emerging Technologies at General Dynamics Mission Systems Panelist: Aaron Tantleff, Partner at Foley & Lardner LLP 10:50-11:40AM - Moretti Ballroom E/F Risk Assessments, Vulnerability Assessments and Cybersecurity Insurance - The Holy Grail of Cyber Risk Risk and Vulnerability Assessment are invaluable to companies in understanding the risks associated with their informational “Crown Jewel” and the vulnerabilities associated with their network assets and defenses. What remains after controls is residual cyber risk which must be assumed by a company, or transferred to a cyber insurance carrier for a fair premium. This panel discuss cyber and network risk concepts and explores the great utility of a cybersecurity insurance program. Sponsor: Greenberg Traurig, LLP Moderator: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP Panelist: Andrew Maychruk, Executive Vice President and Chief Technology Officer at Old Second Bank Panelist: Judy Selby, Partner at Clearview Privacy Consulting Panelist: Tony Dolce, Vice President, Cyber Lead, North American Financial Lines Claims at Chubb Panelist: Josh MacDonald, Assistant Vice President at Cyber/E&O Underwriting Panelist: Stephen Fridakis, CISO at HBO 11:40-12:50PM - Exhibit Hall Lunch (Visit w/Speakers, Attendees, and Sponsors) 50-Minute Concurrent Panel Discussions 12:50-1:40PM - Moretti Ballroom C/D Cyber Threat Hunting to Achieve Network Resilience Across Your Cyber Terrain Wayne Lloyd, RedSeal Federal CTO, along with key industry panelists discuss their real-world experience using Cyber Threat Hunting to achieve successful real-world business outcomes by: ▶ Easily identifying devices on the network posing the most risk to enterprise ▶ Identifying devices across the enterprise that have network access and exploit exploitable vulnerabilities ▶ Quickly visualizing where aggressors can pivot following system compromise Sponsor: RedSeal Moderator: Wayne Lloyd, Federal CTO & Technical Director at RedSeal
  6. 6. Pg. 3 Panelist: Nikola Zlatarev, Vice President, Chief Information Security Officer at Castleton Commodities International, LLC Panelist: Andrew Maychruk, Executive Vice President and Chief Technology Officer at Old Second Bank Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy Panelist: Stephen Fridakis, CISO at HBO Panelist: John Cavanaugh, CTO - Security Practice Lead at NetCraftsmen 12:50-1:40PM - Moretti Ballroom E/F Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done. As a fundamentally unique approach to security, cyber AI systems need not predict tomorrow’s attacks based on yesterday’s threats. Powered by recent advances in artificial intelligence, the latest cyber AI security systems instead continuously refine their defenses by learning ‘on the job’ to differentiate between normal and abnormal behaviour in an enterprise, enabling them to flag even subtly malicious activity. Thus, whereas traditional cyber security technologies are blind to unknown threats, self-learning cyber AI systems detect such novel attacks by spontaneously drawing connections that human programmers can’t see. And as ready-to-deploy exploit kits and advanced malware packages spawn new cyber-threats around the world, the challenge of securing the digital realm can only be met with AI security systems that can learn, evolve, and fight back. In this session, you will learn: ▶ Where cyber-criminals have found weaknesses in legacy approaches to security ▶ Why only self-learning AI can detect and stop never-before-seen attacks ▶ How to protect your network from machine-speed attacks ▶ What gaining 100% network visibility of your entire digital estate — including cloud environments and IoT devices — can reveal the latent vulnerabilities that advanced attackers are targeting today Sponsor: Darktrace Moderator: Rebekah Ent 1:40-2:00PM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 2:00-2:50PM - Moretti Ballroom C/D Cyber Security Policies and Procedures: What is “Reasonable” in Today’s Landscape? Most states now mandate the implementation of “reasonable” data security systems, but only one – California – has issued any guidance on what “reasonable” means within that context. Join us in a review and analysis of the CA AG advisory opinion that identified the CIS Critical Security Controls as providing the benchmark for reasonableness in the context of data security implementation/protocols. See https://www.cis- ecurity.org/controls/. We will dissect the CIS standards (all 20 of them) from the perspective of small, medium and large organizations, and discuss what “reasonable” means in those varying circumstances. Sponsor: Drinker Biddle & Reath LLP Moderator: Kenneth Dort, Parter at Drinker Biddle & Reath LLP Panelist: Dana Bessey, Sr. Information Security Compliance Analyst at Kelley Drye & Warren LLP
  7. 7. Pg. 4 Panelist: Gary Patterson, Senior Director of Security Architecture at Home Partners of America Panelist: Mitze Amoroso, Senior Vice President, Chief Information Officer at ArchCare Panelist: Cory Missimore, Manager at Baker Tilly Virchow Krause, LLP 2:00-2:50PM - Moretti Ballroom E/F Incident Response and Crisis Communications - What happened, happened already. Its what do and say about it that impacts the reputation and value of a company. The incident response business is booming today, with the costs of a cyber breach having never been higher. Conversely corporate reputations of those suffering a breach or attack have never been lower, with the exception of a few companies that have done well following the breach. What is the difference? Good crisis communications. Sponsor: FTI Consulting Moderator: Jordan Kelly, Senior Managing Director at FTI Consulting Panelist: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP Panelist: Anthony Ferrante, Global Head of Cybersecurity & Senior Managing Director at FTI Consulting Panelist: Brian Kennedy, Senior Managing Director & Head of the Americas at FTI Consulting Panelist: Richard Levick, Founder & CEO at LEVICK 2:50-3:10PM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 3:10-4:00PM - Moretti Ballroom C/D Consumer Privacy - Survival in the Electronic Marketplace Finding common ground in preserving consumer privacy while supporting internet marketers in selling good and services. Consumers in today’s web-based marketplace want the “freedom to consume”. Marketers of products and services want the “freedom to sell”. Both want to maximize the power of the internet, but one wants to protect personal information while the other wants to access it. Their goals seem at odds with one another in terms of personal data ownership, privacy, and utilization for business success. Is there common ground where each can function successfully and in an ethical manner? We will discuss the challenges for consumers in protecting their personal data, and for marketers in being able to utilize the power of collected customer data. Sponsor: GreenLight Discovery Moderator: Aaron Taylor, Owner & Executive Officer at GreenLight Discovery Panelist: Kamran Salour, Attorney at Callahan & Blaine Panelist: Hector Del Castillo, Chief Product Officer at BoldPM Panelist: Richard Young, CIO at USDA/FAS Panelist: Beth Burgin Waller, Principal at Woods Rogers PLC Panelist: Mathew Ellis, Founder at Matthew Ellis LLC 3:10-4:00PM - Moretti Ballroom E/F Security and Privacy - Why are we so bad at it? Global spending on cybersecurity will surpass $124 billion in 2019, while damages caused from cybercrime is projected to cost over $6 trillion globally by 2021. Despite the latest advancements and innovations in the cybersecurity industry and our collective efforts, we are facing more breaches than ever before, with more people’s data compromised, and the cost of data breaches increasing at an alarming rate. This panel will discuss some of the reasons of why we are so bad at cybersecurity and privacy, why our efforts aren't working, and what can we do to change it. Sponsor: Berkeley Research Group LLC Moderator: Amit Garg, Director at Berkeley Research Group LLC Panelist: Charlie Germano, Senior Director, IT Security and Operations at Save the Children US Panelist: Azunna Anyanwu, Director of Information Technology at Aronson LLC Panelist: Nnake Nweke, Chief Risk Officer at United States Agency for Global Media
  8. 8. Please email Chris@thinkbigexit.com Would you like to speak at an IG3? event next year in 2020? Let us know.
  9. 9. Pg. 6 Thursday - June 27, 2019 8:15-9:00AM - Exhibit Hall Registration 8:15-9:00AM - Exhibit Hall Continental Breakfast 50-Minute Concurrent Panel Discussions 9:00-9:50AM - Moretti Ballroom C/D Grappling with International Data Protection Regulations in U.S. Litigation and Government Investigations This panel will discuss the conflict between various privacy regulations (e.g. GDPR) and the demands of the U.S. litigation and government investigations. How can the two be reconciled? Sponsor: Axinn, Veltrop & Harkrider LLP Moderator: Brooke Oppenheimer, eDiscovery Attorney at Axinn, Veltrop & HarkRider LLP Panelist: Paul Simonoff, Lead Associate, Privacy and Incident Response at Booz | Allen | Hamilton Panelist: Thomas Rohback, Partner at Axinn, Veltrop & HarkRider LLP Panelist: Allison Bender, Of Counsel, Privacy and Data Protection at Wilson Sonsini Goodrich & Rosati 9:00-9:50AM - Moretti Ballroom E/F The Meaning of “Consent” in Data Privacy: Tracking a Moving Target Europe introduced the requirement of acquiring consent for the use of people’s personal information. The concept has gone viral across the globe, and many companies are finding it difficult to comply. This panel will consider the varying requirements in jurisdictions around the world and, now, in California. Sponsor: NAFS Consulting Moderator: Sanaz Jaraiedi, CEO and Founder at NAFS, LLC Panelist: Jason Scheiderer, Partner at Dentons Panelist: Julia Jacobson, Partner at K&L Gates LLP Panelist: Ambler Jackson 9:50-10:30AM - Exhibit Hall Exhibit Teardown See you next year! Exhibitors: Exhibit #1 - RedSeal Exhibit #2 - Acalvio Exhibit #3 - Darktrace Exhibit #4 - Infogressive Exhibit #5 - Illumio Panelist: Cory Rutten, Security Account Manager at Infogressive Panelist: Michael Irwin, Director, Technology Operations and Cyberse- curity at Politico 4:00-5:00PM - Exhibit Hall Closing Cocktail Reception and Prize Drawing 6:00-9:00PM - TBD Private Dinner Events
  10. 10. Sponsor Descriptions RedSeal RedSeal is the essential network modeling and risk scoring platform that puts decision-making power right in your hands. JEM JEM provides valuable insights, information and expertise to accelerate business in the digital age through consulting and advisory services, research and publications. Tempered Networks Tempered Networks was founded to solve the pervasive problem of TCP/IP and the security vulnerabilities imbued within it. Our innovative approach of using Host Identity Protocol creates a Zero Trust Network within minutes, without a change to the existing infrastructure. A powerful but simple point-and-click management interface enables customers to deploy and manage extensive environments at a fraction of the cost, and time to traditional methods. CyFIR CyFIR was built on two key principles – see more to know more, and then respond instantly. We give organizations the power to digitally investigate and triage thousands of endpoints on demand, minimizing business risk and operational cost. To effectively manage the myriad of today’s cyber perils, you need CyFIR™ – we Think Forensics First™. Nisos We are a team of operational experts with a depth of experience ranging between the public and private sectors. Since forming Nisos in 2015, we have grown into an enterprise of over 50 full-time operators in Alexandria, VA(HQ); New York, NY; Atlanta, GA; and San Francisco & Los Angeles CA. Our mission: to defend society from active and persistent threat. Over the last decade, we observed threat actors shift their focus from government to commercial targets, and yet saw little indication that the private sector was prepared to handle these threats. Moreover, we believe the low signal-to-noise ratio in the product and services market Pg. 9 does a disservice to the global community. We are dedicated to cutting through the noise to provide genuine security to our clients and answers to their intractable problems. Acalvio Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. Darktrace Darktrace’s pioneering technology, the Enterprise Immune System, applies AI to the cyber defense challenge for the first time, and has proven itself successful in detecting cyber-threats that existing, legacy systems cannot. It quickly became clear that the technology was powerful enough to identify a diverse range of threats at their earliest stages – including insider attacks, latent vulnerabilities, cloud-based threats and even state-sponsored espionage. Infogressive We're a Managed Security Services Provider (MSSP) that takes pride in securing organizations of all sizes by combining the best technology available with passionate cybersecurity experts. We know the ins and outs of what your network needs to stay secure from the bad guys which is proven by our history of zero data breaches since 2006. Illumino Illumio has developed adaptive micro-segmentation technology that prevents the spread of breaches inside any data center and cloud.
  11. 11. Pg. 12 Thank You Sponsors!

×