Hi [[ session.user.profile.firstName ]]

The Future of Application Security: Assisted-Intelligence

Through their win in the 2016 DARPA Cyber Grand Challenge, ForAllSecure challenged the way application security testing is thought and approached.

Join Dr. David Brumley, CEO and Co-Founder of ForAllSecure, as he shares his observations on shifts in software security trends before and after the DARPA CGC. He'll dissect how these trends came to be and share his predictions how they will impact the software security industry.

Speakers:
Frank Downs, Director/SME Cybersecurity Practices, ISACA
Dr. David Brumley, CEO & Co-Founder, ForAllSecure
Recorded Aug 8 2019 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. David Brumley (ForAllSecure) & Frank Downs (ISACA)
Presentation preview: The Future of Application Security:  Assisted-Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Delivering DevSecOps and Achieving Resilience Recorded: Aug 8 2019 47 mins
    Dr. David Brumley (ForAllSecure) | Connor Gilbert (StackRox) | Rick Moy (Acalvio) | Jay Beale (InGuardians)
    Organizations are realizing the necessity to treat security as a first-class citizen instead of an after-thought. When it comes to DevOps, organizations are now including security at every step of the development and deployment lifecycle.

    Join experts from the industry to learn more about:
    - Security challenges and vulnerabilities
    - DevOps vs DevSecOps: What's the difference?
    - How to make disjointed security and DevOps teams work effectively
    - DevOps security scans
    - Steps to better application security

    Speakers:
    - Rick Moy, CMO, Acalvio Technologies
    - Dr. David Brumley, CEO & Co-Founder, ForAllSecure
    - Connor Gilbert, Product Manager, StackRox
    - Jay Beale, CTO & COO, InGuardians
  • Securing the Multi-Cloud in the Age of Threats Recorded: Aug 8 2019 55 mins
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams)
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • The Future of Application Security: Assisted-Intelligence Recorded: Aug 8 2019 22 mins
    Dr. David Brumley (ForAllSecure) & Frank Downs (ISACA)
    Through their win in the 2016 DARPA Cyber Grand Challenge, ForAllSecure challenged the way application security testing is thought and approached.

    Join Dr. David Brumley, CEO and Co-Founder of ForAllSecure, as he shares his observations on shifts in software security trends before and after the DARPA CGC. He'll dissect how these trends came to be and share his predictions how they will impact the software security industry.

    Speakers:
    Frank Downs, Director/SME Cybersecurity Practices, ISACA
    Dr. David Brumley, CEO & Co-Founder, ForAllSecure
  • How To Build a People-Centric Cybersecurity Strategy Recorded: Aug 8 2019 23 mins
    Tim Choi, VP, Product Marketing, Proofpoint & Roselle Safran, President, Rosint Labs
    Abstract: More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the center when building a robust cybersecurity approach in the era of highly sophisticated attacks.

    Join BrightTalk for a live interview with Tim Choi, the VP of Product Marketing at Proofpoint, as we discuss the key findings of the threat landscape for 2019 and share practical tips on how CISOs can build a truly people-centric cybersecurity strategy.
  • The Least Talked About Cybersecurity Threat Recorded: Aug 7 2019 24 mins
    Chris Schueler (Trustwave) & Frank Downs (ISACA)
    Most IT roles tend to involve long hours and high stress levels, but with breaks between projects. The reality of a cybersecurity professional, however, is that their job is never fully complete. Much like an air traffic controller or a law officer, just one oversight can result in detrimental consequences. The constant pressure of identifying new threats, contending with persistent adversaries around the clock, and assessing how third parties and introduction of new technologies may impact risk is psychologically taxing. Furthermore, it may weaken the enterprise cyber resiliency.

    Join this Q&A interview live from Black Hat to learn more about:

    - Burnout in cybersecurity
    - The effect of AI and behavioral analytics on burnout
    - Industry shortage of security expertise and how to address it
    - How to alleviate day-to-day cybersecurity stress

    Speakers:
    Frank Downs, Director/SME Cybersecurity Practices, ISACA
    Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
  • The Future of Privacy and Security Recorded: Aug 7 2019 60 mins
    Joseph Carson, (Thycotic), Debra Farber, Nathan Wenzler (Moss Adams), James Chappell, (Digital Shadows)
    Organizations are evolving beyond the traditional, reactive approach to privacy and data security to thinking proactively. Are we closer to a Privacy-and-Security-by-Design reality?

    Join this panel of experts to get the answer to all of your privacy, security and compliance questions. Viewers can learn more about:
    - Effects of GDPR: One year later
    - How businesses are preparing for CCPA
    - Best practices for achieving and maintaining compliance
    - How to bake privacy and security into your processes
    - What to expect in the next 12 months

    Speakers:
    Joseph Carson, Chief Security Scientist, Thycotic (Moderator)
    Debra Farber, Independent Privacy & Security Advisor
    Nathan Wenzler, Senior Director, Cybersecurity, Moss Adams
    James Chappell, Co-Founder & Chief Innovation Officer, Digital Shadows
  • IoT Security in 2019: Risks and Cyber Resilience Recorded: Aug 7 2019 48 mins
    Chris Morales (Vectra) | Jason Soroko (Sectigo) | Todd Weber (Optiv) | Rudolph Araujo (Awake Security)
    As the Internet of Things continues to grow, so do the security and privacy risks and vulnerabilities associated with IoT devices on enterprise networks. Organizations worldwide are looking to assess and manage their risk, implement basic cyber hygiene, and improve their security posture. Discover the best strategies for achieving security at every level, including IoT.
    Join this interactive panel with industry experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Speakers:
    - Chris Morales, Head of Security Analytics, Vectra (Moderator)
    - Jason Soroko, CTO of IoT, Sectigo
    - Todd Weber, Chief Technology Officer, Optiv
    - Rudolph Araujo, VP Marketing, Awake Security
  • Ask the IoT Security Expert: Securing a World of Inter-Connected Devices Recorded: Aug 7 2019 25 mins
    Jason Soroko, CTO of IoT, Sectigo & Diana Kelley, Cybersecurity CTO, Microsoft
    Today's digitally connected businesses require multi-layer defense against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

    Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

    Join us, live from Las Vegas as we learn about:
    - How identity plays a role in IoT security
    - The role of trust models to enable third party device interoperability
    - If three is a way to secure a digital identity for devices that do not have a hardware
    secure element such as a TPM
    - The latest IoT device security legislations
    - Determining if IoT connected devices in your operations infrastructure are secure
  • Ask the IoT Security Expert: Identifying Risks and Addressing Challenges Recorded: Aug 7 2019 30 mins
    Marty Sells, Principal Security Consultant, Optiv & Mark Aiello, President, CyberSN
    IoT security has become a critical priority for enterprise information technology security teams. Devices with sensors and the automated processes that connect them are prime targets for attackers seeking to take advantage of insecure code and low-level vulnerabilities.

    Join us for an exclusive interview LIVE from Las Vegas during Black Hat to learn more about the current state and challenges for IoT security, the areas for automation, and how regulations are affecting the future of IoT and IoT security.

    Viewers will also learn about:
    - How is security different for industrial control systems and IoT
    - How traditional IT security principles differ in the IoT space
    - IoT security certifications consumers/enterprises should be aware of
    - How important is continuous penetration testing
    - Is encrypting IoT data important and how

    Broadcast LIVE from Las Vegas during Black Hat 2019
  • Cybercrime’s Innovation Machine Recorded: Aug 6 2019 25 mins
    Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT & Jessica Gulick, CEO, Katzcy & VP, Women's Society of Cyberjutsu
    It’s hard to express the scale of today’s cyber threat landscape, let alone its global impact. We can tell you that there were nearly four million DDoS attacks around the world in the last six months, and that attack frequency grew by 39 percent. Or that the NETSCOUT ASERT team saw 20,000 unique samples per month from just one family of IoT malware. Or even that it can take only five days from the discovery of a new attack vector to the availability of tools for the script-kiddie designed to exploit that vulnerability.

    These numbers, while startling, don’t fully convey the impact of that steady drumbeat of new threats. Cybercrime has entered the mainstream of our culture to an unprecedented extent, and it is here to stay.

    Join this video interview live from Las Vegas during Black Hat to learn more about:
    - The big trends in DDoS
    - New attack vectors found in the past six months and what this means for device and software security
    - What enterprises can do to protect themselves
  • Ground Truth about the Cyber Skills Shortage Recorded: Aug 6 2019 25 mins
    Daniel Slack, Senior Manager, FireEye Managed Defense, FireEye & James Robinson, Deputy CISO, Netskope
    Cybersecurity executives and leaders are not the only cybersecurity experts feeling the pressure to do more with less in the age of the widening cyber skills gap. Cyber security practitioners, already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks, have much to teach the rest of us about how organizations can overcome the shortfall.

    Join Danny Slack, Senior Manager for FireEye Managed Defense, as he talks about stories and strategies from the cyber defender’s perspective.
  • Security Without Borders In the Multi-Cloud Recorded: Aug 6 2019 59 mins
    Rick McElroy (Carbon Black) | Neil Thacker, (Netskope) | Hardik Modi (NETSCOUT) | Shahrokh Shahidzadeh (Acceptto)
    Digital Transformation, 5G and the Internet of Things are creating wider and deeper opportunities and risks for technology and business organizations to pioneer and navigate. These new boundaries are difficult for organizations to get visibility into and contain threats across them. In a the new world of micro services, serverless computing, software defined infrastructure and Multi-Cloud, old enterprise threat and vulnerability models must transform.

    Learn how to achieve consistent and continuous monitoring across your entire infrastructure, as well as within the services and providers you rely on. Getting early, accurate warning into the risks that threaten applications and infrastructure is critical.

    Learn why Security and DevOps / Infrastructure teams need to lean into and how to do it at scale.

    Speakers:
    - Rick McElroy, Principal Security Strategist, Carbon Black (Moderator)
    - Neil Thacker, CISO, Netskope
    - Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT
    - Shahrokh Shahidzadeh, CEO, Acceptto
  • CISO's Toolbox: Strategies for Success Recorded: Aug 6 2019 51 mins
    Deidre Diamond (CyberSN), Alyssa Miller (CDW) | Martin Holste (FireEye) | Mike Weber (CoalFire)
    What do CISOs need to be successful at their job? Discover the challenges CISOs are facing and the ways they are solving them.

    Join security experts as they discuss the strategies, processes and technologies CISOs use to protect their organizations in the age of breaches:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Speakers:
    - Deidre Diamond, CEO & Founder, CyberSN
    - Alyssa Miller, Manager, Information Security Solutions Practice, CDW
    - Martin Holste, Cloud CTO, FireEye
    - Mike Weber, Vice President, Coalfire
  • Earning a Place at the Table, Bringing Security to the Board Room Recorded: Aug 6 2019 25 mins
    Alyssa Miller, Manager, Information Security Solutions Practice, CDW & Diana Kelley, Cybersecurity CTO, Microsoft
    As cyber security continues to evolve into a business priority, having conversations at the highest levels about how to address security threats becomes crucial. Hear from CDW’s Alyssa Miller as we discuss why it is so important for the CISO to have a place in the board room and ways the CISO can encourage this interaction and improve their effectiveness in working with the Board of Directors.

    We’ll discuss common challenges and new ways to address those challenges ensuring the CISO is positioned to become that trusted advisor for the organization.

    Join us as we discuss:
    - The importance of discussing cyber security strategies at a board level
    - What challenges prevent cyber security from being a regular topic for the board
    - Approaches that CISOs may employ to help gain visibility with the board and more!
BrightTALK @ Black Hat USA 2019
BrightTALK @ Black Hat USA 2019

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Application Security: Assisted-Intelligence
  • Live at: Aug 8 2019 4:30 pm
  • Presented by: Dr. David Brumley (ForAllSecure) & Frank Downs (ISACA)
  • From:
Your email has been sent.
or close