Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Informa
Key Sessions

Kevin Walker

Finding the right IoT security strategy and methodology to secure the IoT network infrastructure - Title Sponsor Presentation - Juniper Networks

Juniper Networks

Thien La

Journey to the Secure Cloud

Wellmark Blue Cross Blue Shield

Arjmand Samuel

Building Trustworthy IoT Systems

Microsoft

David Hahn

Panel: Learning from Infamous Security Breaches

Hearst

8:00am - 8:50am 50 mins
Main agenda
Breakfast
8:50am - 9:00am 10 mins
Main agenda
Opening Remarks
9:00am - 9:20am 20 mins
Main agenda
Finding the right IoT security strategy and methodology to secure the IoT network infrastructure - Title Sponsor Presentation - Juniper Networks
  • Kevin Walker - Security CTSO (Chief Technology and Strategy Officer), Juniper Networks
more
9:20am - 9:40am 20 mins
Main agenda
Journey to the Secure Cloud
  • Thien La - CISO, Wellmark Blue Cross Blue Shield
more

Join Wellmark Blue Cross and Blue Shield’s CISO Thien La as he shares Wellmark’s two-year journey designing the healthcare leader’s cloud architecture and migration plan. La will discuss specific concerns for highly regulated industries, along with their experience working with leading cloud providers.

9:40am - 10:00am 20 mins
Main agenda
Building Trustworthy IoT Systems
  • Arjmand Samuel - Security lead for Microsoft Azure Internet of Things, Microsoft
more
10:00am - 10:40am 40 mins
Main agenda
Panel: Learning from Infamous Security Breaches
  • David Hahn - CISO, Hearst
  • Arun Hegde - Principal Security Architect, Fortune 500 Media Company
  • Moderator Katherine Fithen - Chief Privacy Officer, SecureWorks
  • Weifeng Li - Information Security Director, PricewaterhouseCoopers
more
  • Reviewing some of the most recent and large scale enterprise breaches across industries
  • What were the vulnerabilities that malicious actors could exploit
  • How can we better prepare and how can enterprises influence security vendor collaboration
  • How can we better prepare and how can enterprises influence security vendor collaboration
10:40am - 11:30am 50 mins
Main agenda
Coffee Break & Expo Hall Visit
11:30am - 11:50am 20 mins
Main agenda
Evolving Threats from IoT Botnets : A Closer Look at Defending IoT Devices Against Attacks
  • Loren Shade - VP Marketing, Allegro Software
more
  • The “Unsecure” Perfect Storm
  • See how IoT devices are weaponized
  • Markets for “renting” IoT Botnets
  • IoT Defense – Reducing risk
11:50am - 12:30pm 40 mins
Main agenda
Panel: Use cases: How are data and devices secured across industries- Payment, Transportation, Media
  • Vijay Vedanabhatla - Principal Security Architect, UPS
  • Mandar Kawle - Sr. Director, MasterCard
  • Arun Hegde - Principal Security Architect, Fortune 500 Media Company
  • Abel Sussman - Director, Cyber Risk Advisory, Coalfire
  • Moderator Shriram Ramanathan - Sr. Analyst, Lux Research
  • Seth Jeacopello - Chief Architect, Great Bay Software
more
  • How to create an evolutionary plan to securing IoT initiatives at every maturity level
  • The importance of building secure mobile payment infrastructure
  • What are the major vulnerabilities in the Shipping industry and how leaders are handling them
12:30pm - 1:30pm 60 mins
Interactive Sessions
Security Workshops for Basic to Advanced
  • Marvin Stein - Sr. Advisory Systems Engineer/ Security, Virtustream
more
  • What makes an effective information security program for an organization? This educational presentation is intended to promote:
  • Awareness of the importance of need for IT security
  • Understanding of Cyber security vulnerabilities and corrective measures
  • The interactive discussion will focus on those information security risks facing all small organizations and how those risks can be identified and managed. Topics will include:
  • How your data is vulnerable
  • What you can lose through an information security breach
  • Practical steps to protect your operations
  • How to use information security vendors and consultants
  • How to evaluate tools and techniques based on your needs
  • This free educational program is intended for individuals and businesses with limited in-house resources to understand and implement IT security. City, county and state government entities, as well as small/medium/large c business owners & managers are encouraged to attend.
12:30pm - 1:30pm 60 mins
Main agenda
Networking Lunch Break - Main Stage: Security Workshops for Basic to Advanced
  • Marvin Stein - Sr. Advisory Systems Engineer/ Security, Virtustream
more
1:30pm - 1:50pm 20 mins
Main agenda
Securing Smart Buildings of the Future
  • William Fitzgerald - Director of Global Product Security Technical Services, Johnson Controls
more
1:50pm - 2:20pm 30 mins
Main agenda
An Immune System Approach: AI Cyber Defense for IoT Devices
  • Justin Fier - Director for Cyber Intelligence and Analysis, Darktrace
more

In this session, learn how threat-actors target IoT devices to get inside the network, and how corporations use ‘immune system’ defenses to identify threats before they escalate into a crisis.

In this session, learn:

  • How new machine learning and mathematics are automating advanced threat detection in the cloud and beyond
  • Why 100% network visibility of both physical and virtual environments is critical
  • How smart prioritization and visualization of threats allows for better resource allocation and fast threat mitigation
  • Real-world examples of threats detected by Enterprise Immune System technology
2:10pm - 2:50pm 40 mins
Main agenda
Panel All jobs are security jobs: Preparing the workforce to prevent and handle IT security challenges before they happen
  • Marvin Stein - Sr. Advisory Systems Engineer/ Security, Virtustream
  • Paul Jauregui - VP Marketing and IoT Business Lead, Praetorian
  • Nikhil Kumar - CTO, Applied Technology Solutions
  • Moderator Shriram Ramanathan - Sr. Analyst, Lux Research
more
  • Why security must be an essential component of all tech training
  • How C-level must strategically think of governance, risk, and compliance
  • Proving the value of penetration testing
3:20pm - 4:10pm 50 mins
Main agenda
Coffee Break & VIP Networking
3:50pm - 4:10pm 20 mins
Main agenda
Instilling and Assessing Trust in Resource Constrained IoT
  • Paul Philip - Information Assurance Research, Team Lead- Internet of Things, Department of Defense
more
  • This discussion will center on key areas where researchers in the DoD believe that security improvements will result in the greatest payoff for our customers in the resource-constrained Internet of Things space. This includes mitigation of classes of vulnerabilities by instilling trust and assurance at the chip, edge device, and system levels. A few examples of the Information Assurance Research IoT Team’s trust and security efforts will be presented along with the projected payoffs, to spur similar work and identify potential partners. 
4:10pm - 4:30pm 20 mins
Main agenda
Security and Trustworthiness in IoT and Smart Cities/Communities
  • Scott Tousley - Deputy Director of the Cyber Security Division, DHS Science & Technology
more
4:30pm - 5:10pm 40 mins
Main agenda
Panel Seeking collaboration and interoperability among security vendors across the IoT stack
  • Raoul Wijgergangs - Vice President Z-Wave Business Unit, Sigma Designs
  • Srini Nimmagadda - Director, Product Management – Secure Networks, Juniper Networks
  • Nick Yuran - President, Vaxxin
  • Brady Brim-DeForest - CEO, Citrusbyte
  • Moderator Shriram Ramanathan - Sr. Analyst, Lux Research
more
  • Becoming the standard in IoT to solve interoperability challenges
  • Keeping the requirements of industrial and consumer IoT companies at the forefront
  • How investment banks and the security M&A space should structure the most powerful security vendors of the future
5:30pm - 8:30pm 180 mins
Main agenda
Cocktail Hour - Mark.Stevens@knect365.com