Day Three | November 12, 2020, Thursday

9:00 am - 10:00 am Attaining Manageable Cyber Security Despite Increasing Complexity

Ramy Houssaini - Chief Cyber & Technology Risk Officer, BNP Paribas

Rationalizing the tooling that you use for security

  • 60ish different tools in one environment creates significant expense and ensures dilution of talent attention
  • Engaging in a 'less is more' mindset

Reducing complexity by looking for platforms that actually speak to your specific enterprise issues

Ensuring your workforce is orchestrated in the optimal way

Reducing your attack surface

  • Optimizing (or shrinking) the IT architecture and third-party infrastructure 

Building controls that address ‘local’ regulations to ensure no custom controls need to be built

Making your cyber security reality more sustainable 

img

Ramy Houssaini

Chief Cyber & Technology Risk Officer
BNP Paribas

10:00 am - 11:00 am Cloud Evolution: Harnessing A Present & Preparing For A Future Which Is Fraught With Danger

Mike Stacy - Director, Advanced Technology Group, Proofpoint

Data loss, data exfiltration, data privacy, user error, credential leakage, lack of compliance are just some of the outcomes that are simply easier in the cloud. Having a coherent cyber security cloud strategy is essential as global corporate enterprise makes it’s way to 100% cloud.

  • The past: How did your cloud migration begin and subsequently change?
  • The present: Where are you now in your cloud evolution?
  • The future: What are you taking into account as you move forward?
img

Mike Stacy

Director, Advanced Technology Group
Proofpoint

11:00 am - 12:00 pm Building an Effective API Security Strategy

Keith Casey - API Problem Solver, Okta

In the last decade, APIs have become fundamental to our teams, partners, and customers. While we’d like to believe it all happened as a carefully executed plan, let’s be honest… there’s as much luck as foresight in the mix. Luckily, success drives success so we’ve seen things explode in great ways. Unfortunately, that very success has cost us too.

APIs are becoming a consistent and devastating attack vector for applications that store everything from financial records to passport information to what you’re looking for in a date. In this session, we’ll reconsider some of our earliest assumptions and lay out some strategies for bringing our APIs out of the shadows and protecting ourselves, our partners, and our customers.

Attend this session to know more on how: 

  • Teams will see the progression of how APIs grow in their organization
  • Teams will understand these are normal growing pains
  • Teams will get concrete steps to examine their API security
  • Teams will see that security is a team sport
img

Keith Casey

API Problem Solver
Okta

12:00 pm - 1:00 pm Ransomware Use Case: How A Past Thwarted Informs Action Today

Parag Deodhar - CISO APAC, VF
  • Realizing a ransomware incident in real time
  • Keeping the adversary "on the hook" to learn more
  • Ensuring minimal cost and disruption enterprise-wide
  • Engaging in a root-cause analysis through a discovery of the adversary modus operendi
  • Infusing awareness campaigns with new information to ensure the front lines are up-to-date with the latest enterprise threats
img

Parag Deodhar

CISO APAC
VF