Speaking opportunities: Infosecurity Autumn 2016 Virtual Conference

Once again, Infosecurity Magazine is running its Autumn Virtual Conference in September. It’s held over two days, Tuesday 27th (EMEA focused) and Wednesday, 28th (for a US audience – although of course anyone is free to attend on either day).

I’m looking for speakers for the sessions below. Please note that the session on SOC 2020 will run on both days, and so will be pre-recorded. The recording date can be agreed to suit the speakers, but is likely to be the last week in August or the first week in September.

 

27th Sept: 13.15-14.05 BST: Best Practice Vulnerability Management and Remediation

With new vulnerabilities exposed every day, security professionals are racing to protect their organization from the latest exploits and malware attacks. With the adoption of cloud and mobile technologies, IoT and new working practices, the landscape is increasingly complex. Vulnerability management and remediation are seen as key tools in the information security arsenal to reduce risk and improve an organization’s security posture. Yet organizations continue to struggle to assess and remediate risk to their business.

During this session, the panel will discuss how organizations can manage vulnerability risk and protect their critical assets by implementing a best practice vulnerability management and remediation program.

  • Evaluate the role of vulnerability management in defending against advanced threats
  • Understand how to identify and prioritise vulnerabilities
  • Identify the key steps to developing an effective remediation plan
  • Assess the role of automation in vulnerability management and remediation

 

28th Sept, 1220-1310 Eastern time (1720-1810 BST): Cyber Threat Hunting: How to Halt a Hacker 

It has long been accepted that it’s not if but when an organization will be breached, and that often threats have been hidden on networks for a long period of time, waiting to strike before a breach occurs. Hyper-connected enterprises with extended perimeters mean that prevention is not enough, as the sophisticated adversary evades network defenses. In order to minimise damage to an organization, proactive detection strategies are needed to hunt out threats that have by-passed security and monitoring tools.

During this session, the panel will share their expertise into how to develop and implement a cyber-threat hunting capability and position your organization to effectively combat the cyber adversary.

    • Understand the pros and cons of threat hunting
    • Discover how to integrate threat hunting into an information security strategy
    • Gain practical advice on how to set-up a threat hunting capability within your organization
    • Evaluate the role of automation in cyber threat hunting

 

27th and 28th Sept (pre-recorded): SOC 2020: Building a Next-Gen Cyber Security Operations Centre

As hyper-connected organizations face increasingly complex risks and threats, and security becomes more closely aligned to the business, the need to develop a robust security operations capability has never been greater. The SOC needs to be agile and adaptive to respond to threats, contain incidents, and manage the incident across the organization, whilst prioritizing investment and activities

So what are the key steps to building an effective next-generation cybersecurity operations centre? This session will share practical insight and provide you with a checklist of the factors to consider.

• Understand the role of a SOC in effective cybersecurity
• Identify the key elements to consider when planning a SOC
• Discover how to overcome the obstacles to building a SOC
• Evaluate the roles of automation and intelligence in next-generation security operations
• Analyse the business case for in-house versus an outsourced SOC

 

For each session, there will be three or four speakers and ideally each speaker will have a few slides or visual aids, though a formal presentation is not always necessary. The sessions are all recorded remotely, and run for 50 minutes.

Speaking slots are open to academics, security researchers, security and IT consultants, CISOs and other IT professionals, and analysts. There may be some restrictions on vendor speakers on some sessions, but please contact me to discuss this, as there is some room for negotiation.

Please submit any initial expressions of interest via email,  by 1700, BST, on Monday 15 August. Many thanks.