Borderless Cyber 2019 Wrap-up Information

Below are a few conference wrap-up items including a link to our short post conference survey. Your feedback is important to us. If you haven't completed the survey, please take a few moments today to submit your feedback.

Questions may be directed to us at any time.

Tuesday, October 08, 2019
08:30-09:00 Welcome Coffee & Networking
08:30-17:00 Check-in & Registration
09:00-09:15 Joint Welcome by KuppingerCole & OASIS
Gershon Janssen, Chairman, OASIS Board of Directors
Harley Parkes, IACD Lead, Johns Hopkins University Applied Physics Laboratory
John Tolbert, Lead Analyst, KuppingerCole
(no slides)
09:15-09:45 The Future of Cyber Operations
David P. Luber, Executive Director, United States Cyber Command
(no slides)
09:45-10:15 A Random Walk Through Cyber Security
Dr. Ed Amoroso, CEO, TAG Cyber LLC
(view slides)
10:15-10:45 Coffee & Networking
10:45-11:45 Panel - Fight Smarter, not Just Faster
John Felker, Assistant Director, the Integrated Operations Division (IOD), Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)
Geoff Hancock, Principal & CISO, Advanced Cybersecurity Group
Harley Parkes, IACD Lead, Johns Hopkins University Applied Physics Laboratory
(no slides)
11:45-12:15 Breaking News: Launch of a Global, Multi-Vendor Cybersecurity Ecosystem
Jason Keirstead, Chief Architect, Threat Management, IBM Security CTO Office
Darren Thomas, Senior Product Manager, Open Data Exchange Layer, McAfee
(view slides)
12:15-13:15 Lunch Break
  CYBERNEXT SUMMIT TRACK BORDERLESS CYBER TRACK
  Artificial Intelligence & Machine Learning for Cybersecurity
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Cybersecurity Decision-Making Strategies
Moderators:
Matthew Elder, Johns Hopkins University
Charlie Frick, Johns Hopkins University
13:15-14:15 AI in Cybersecurity: Between Hype and Reality

 

Alexei Balaganski, KuppingerCole
(CyberNext Track Slide Presentations)

 

 



 





Machine Learning & the SOC

 

Cory Missimore, Baker Tilly
(CyberNext Track Slide Presentations)
Opening Pandora's Box with FAIR + ATT&CK + SOAR = An Improved Cyber Security Response Strategy

 

Tyler Rorabaugh, Palo Alto Networks
(view slides)

 

 

DODCAR Overview: Standardizing and Automating Cyber Threat Understanding for Threat-based, Cybersecurity Assessments

 

Karin Breitinger, Tensley Consulting Inc.
Owen Sutter, DOD Cybersecurity Analysis & Review
(view slides) (view video)
14:15-15:15 Evaluating Our Defenses with a Data Science Approach

 

Brennan Lodge, Goldman Sachs
(CyberNext Track Slide Presentations)

 

 

Panel - Artificial Intelligence in Cybersecurity: Recent Advances

 

Peter Guerra, Accenture AI
Al Lewis, Doctoral Candidate & Independent Researcher
Brennan Lodge, Goldman Sachs
(CyberNext Track Slide Presentations)
Improving IoT Safety Using Standards to Improve IoT Security

 

Duncan Sparrell, sFractal Consulting LLC
(view slides)

 

 

Making CTI Actionable: Closing the Feedback Gap

 

Michael Pepin, Celerium
(view slides)

 

15:15-15:45 Coffee & Networking
  Risk Management & Cyber Intelligence
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Cybersecurity Automation Strategies
Moderator:
Charlie Frick, Johns Hopkins University
15:45-16:45 Pragmatic CyberSecurity and Risk Reduction

 

Bruce Hafner, ClearArmor Corporation
(CyberNext Track Slide Presentations)

 

 



Real and Perceived Threats to the Energy Sector - 2019 and 2020

 

John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)
(CyberNext Track Slide Presentations)

 

 

Operationalizing the MITRE ATT&CK Framework

 

Stephan Chenette, AttackIQ
(CyberNext Track Slide Presentations)

 

Rethinking the Future of Identity with Zero Trust

 

Corey Williams, Idaptive
(view slides)












 

Security Automation and Adaptive Cyber Defense Strategies for Success - Experiences from the Financial Sector

 

Donnie Wendt, MasterCard
(view slides)

 

16:45-17:15 Protect the Homeland and Stay in Business: Why Privately-Owned Companies Need a Cyber Intelligence Program

 

Al Lewis, Doctoral Candidate & Independent Researcher
(CyberNext Track Slide Presentations)

 

Is the Damage Already Done? Automating Vulnerability Investigation, and the Use of STIX-based Data Models for Both TI and IR Use Cases

 

John Moran, DFLabs
(view slides)

 

17:15-19:00 Informal Happy Hour at Astro Beer Hall (formerly Mackey's)

 

Wednesday, October 09, 2019
08:30-09:00 Welcome Coffee & Networking
09:00-09:30 The Information Protection Lifecycle
John Tolbert, Lead Analyst, KuppingerCole
(view slides)
09:30-10:00 The Questions a Judge Will Ask You After a Data Breach
Chris Cronin, Board Chair, The DoCRA Council
(view slides)
10:00-10:30 Innovation Talks

Cybersecurity Threats in the Private Sector
Karl Wagner, Founder and CEO, Eastern Sky Technologies
(view slides)

Breaking Down Threat Intel Barriers (and Taking Action!)
Todd Weller, Chief Strategy Officer, Bandura Cyber
(view slides)
10:30-11:00 Coffee & Networking
11:00-11:30 Innovation Talks

Detect Personal Information in Hybrid Cloud Environments Using AI
Yaniv Avidan, CEO & Co-Founder, MinerEye
(view slides)

Innovating Access to the Critical IT Infrastructure
Markku Rossi, Chief Technology Officer, SSH.COM
(view slides)
11:30-12:00 Panel - Critical Infrastructure, IoT, and Security
David Batz, Senior Director, Cyber & Infrastructure Security, Edison Electric Institute
Christopher Magnan, Senior Manager, General Dynamics Information Technology
Tom Stockmeyer, Account Executive, Unbound Tech
(view slides)
12:00-13:00 Lunch Break
  CYBERNEXT SUMMIT TRACK BORDERLESS CYBER
  Endpoint Security, Detection & Response
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Automated Cybersecurity Operations
Moderator:
Charlie Frick, Johns Hopkins University
13:00-14:30 Endpoint Protection/Anti-Malware and Endpoint Detection & Response

 

John Tolbert, KuppingerCole
(CyberNext Track Slide Presentations)



Digital Pickpockets: Analyzing Mobile Malware

 

Marita Fowler, Capital One
(CyberNext Track Slide Presentations)

 

Real Time Endpoint Operations at the Enterprise.

 

 

The (r)Evolution of Cyber Threat Information Sharing: Past, Present, and Future

 

Dan Harkness, Argonne National Laboratory
(view slides)


Save the Threat Intelligence-based Workflow, Save the Cyber Analyst

 

Katie Kusjanovic, EclecticIQ
(view slides)


What Really Means Actionable Threat Intelligence Today?

 

David Bizeul, SEKOIA
(view slides)
14:30-15:00 Coffee & Networking
  IoT & Industrial IoT Security
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Threat-Driven Network Defense
Moderators:
Mark Davidson, NC4
Charlie Frick, Johns Hopkins University
15:00-16:00 IoT & Cybersecurity

 

Christopher Magnan, General Dynamics Information Technology
(CyberNext Track Slide Presentations)

 

Secure Code Signing for IoT with Multi-Party Computation

 

 

Allan Konar, Unbound Tech
Tom Stockmeyer, Unbound Tech
(CyberNext Track Slide Presentations)
Automating Open-Source Zeek (Bro) for Threat Mitigation and Response

 

Allan Thomson, LookingGlass Cyber Solutions

 
(view slides)


CACAO: Insights on Cybersecurity Orchestration Cooperative Collaboration

 

Bret Jordan, Symantec
Allan Thomson, LookingGlass Cyber Solutions
(view slides)
16:00-17:00 Cyber Mutual Assistance – A New Model for Electric and Gas Companies Preparing and Responding to Cyber Security Emergencies

 

David Batz, Edison Electric Institute

 (CyberNext Track Slide Presentations)


 

The Importance of Security Operations

 

Tom Utley, Arctic Wolf Networks
(CyberNext Track Slide Presentations)
Decision Automation: Teaching Machines to Hunt


 

Kumar Saurabh, LogicHub
(view slides)
 
 
Making Threat Intelligence a Shared Resource for Network Defense

 

Jason Mok, IACD, Johns Hopkins Applied Physics Laboratory
Todd Weller, Bandura Cyber
(view slides)
Thursday, October 10, 2019
08:30-09:00 Welcome Coffee & Networking
09:00-09:30 Managing the Space-Time Continuum of Cyberdefense
Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security
(view slides)
09:30-10:30 Panel - Quantum Science Meets Cyber Reality
Duncan Earl, President and CTO, Qubitekk
Dr. Tommy Gardner, CTO, HP Federal
Dr. Arthur Herman, Senior Fellow, Hudson Institute
Corey McClelland, VP of Business Development, Qubitekk
Daniel Riedel, CEO, New Context
(view slides)
10:30-11:00 Coffee & Networking
11:00-12:00 Panel - Global State of Privacy and Why Secure Identity Solutions are Needed
Lisa A. Hayes, Vice President, Strategy & General Counsel, Center for Democracy & Technology (CDT)
Philipp Schneidenbach, Principal, Ventum Consulting
Kimberly Sutherland, VP of Fraud & Identity Market Planning, LexisNexis
Denise G. Tayloe, Co-founder and CEO, PRIVO
(no slides)
12:00-13:00 Lunch Break
  Identity Management & Cloud Security
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Security and Trust
Moderator:
Charlie Frick, Johns Hopkins University
13:00-14:00 The Journey Towards a Passwordless Enterprise

 

 
Alexei Balaganski, KuppingerCole
(CyberNext Track Slide Presentations)

 

 

How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk

 

Morey J. Haber, BeyondTrust
(CyberNext Track Slide Presentations)
Insights for Secure API Usage in Conjunction with Security Automation and Orchestration

 

Cody Bramlette, JHUAPL
Nam Le, Johns Hopkins University APL
(view slides)

 

 

Signed Control System Firmware, Parts, and Documents—Opportunity or Pain?

 

Ronald Brash, Verve Industrial
(no slides)

 

14:00-14:30 Happy Hour & Networking
  Privacy, Governance & Security
Moderators:
Alexei Balaganski, KuppingerCole
John Tolbert, KuppingerCole
Threat Intelligence Ecosystem
Moderators:
Charlie Frick, Johns Hopkins University
Duncan Sparrell, sFractal Consulting LLC
14:30-15:30 Identity in Local Government - Case Study of How Fairfax County Bridges Enterprise and Resident Identity

 

Robert Barr, Fairfax County, VA
(CyberNext Track Slide Presentations)

 

Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?

 

Peter Dougherty, Mantis Networks
Matthew Gardiner, Mimecast
Morey J. Haber, BeyondTrust
(CyberNext Track Slide Presentations)
Lessons Learned from Almost a Decade of SCAP

 

Charles Schmidt, The MITRE Corporation
(view slides)

 

Baby Steps: An Organic Formula for Maturing Your SOC with SOAR and Threat Intelligence

 

Sam Hays, Splunk
Philip Royer, Splunk
(view slides)

 

15:30-16:00 The Reverse Engineering of Trust - Why More Tech Is Not the Answer

 

Philipp Schneidenbach, Ventum Consulting
(CyberNext Track Slide Presentations)
From Band Practice to SOC Symphony

 

Michael Lyons, IBM
(view slides)