NY Forum with Shamla Naidoo

Events

Join The IANS Peer Community

IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather all members of the security function.

*Receive 1 CPE credit for every hour of attendance at our events.
Video Thumbnail
Paul Hypki, Children's Hospital and Clinics of Minnesota

Forums

Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.

CISO Roundtables

One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.

Symposiums

Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.

Webinars

Hour-long interactive discussions examining hot topics in information security.

Filter Events By:

November 18

Security teams need help identifying what’s needed to better prepare and defend against the phishing and ransomware in 2021 and beyond.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

December 2

When seeking cyber insurance or negotiating renewals, orgs are paying more for… less coverage, higher deductibles, and very specific sub-limits. What’s going on here? Join IANS’ Founder & CEO Phil Gardner, IANS’ Faculty Member Summer Fowler, and Munich Re’s Bob Parisi for an interactive discussion to explore the following. What’s driving the market’s turmoil – When will some measure of equilibrium return? How to develop a cyber insurance strategy now, including foregoing coverages and/or self-insuring. What four actions must you take prior to initiating any discussions with a cyber insurer.

Speakers:
  • Phil Gardner

    Phil Gardner

    IANS Founder & Chief Executive Officer

    Having built IANS’ end-user research offering, Phil now oversees all strategic and operational decisions at IANS. Phil began his career in security with seven years with the U.S. Navy as a Strike Fighter Pilot & Ordnance Requirements Officer. After receiving a Masters in Business Administration from Harvard Business School, he joined Goldman, Sachs & Co. in Mergers & Acquisitions and later became an associate with McKinsey & Company in Boston, MA. In 1996, Phil became one of the founders of Provant, Inc., a publicly traded training company serving the Fortune 1000 and Federal Government. He left Provant in 2000 to launch IANS. He graduated at the top of his class in US Navy Flight School.

  • Summer Fowler

    Summer Fowler

    IANS Faculty

    Summer Craze Fowler is the Chief Information Officer and Chief Information Security Officer for Argo AI, an artificial intelligence company focused on self-driving vehicle technology. In this role, she develops and leads the strategy and execution of both the IT and cybersecurity teams. Fowler also leads Facilities, Logistics, and Physical Security at Argo. She led the technical activities of the successful international acquisition of a 300+ person company in the EU. She is an expert in business continuity and cyber crisis management. Fowler currently serves as a cybersecurity expert on the audit committee of a healthcare organization with over $1B in annual revenue. She also advises the board of an international fintech company as the cybersecurity expert. Summer was recently named one of the Top 25 Women Leaders in Cyber Security in 2021 by The Software Report. 

    Fowler is an accomplished C-Suite executive and cybersecurity expert with 20 years of experience developing technical strategies and leading engineering teams to achieve aggressive technical goals while also in hyper-growth mode. Prior to joining Argo, she was the technical director for cybersecurity risk & resilience at Carnegie Mellon University’s Software Engineering Institute (SEI) and was responsible for a $30M+ program portfolio. She was also a technical member at the Johns Hopkins University Applied Physics Laboratory where she designed and prioritized the Department of Defense’s $2B cybersecurity budget. Her career began as a software engineer at Northrop Grumman Corporation where she developed software for special operations forces. Fowler holds a Bachelor of Science degree in computer science and a Master of Science degree in information science and telecommunications from the University of Pittsburgh.

  • Robert Parisi

    Robert Parisi

    Managing Director and National Cyber Product Leader, Marsh

    CURRENT RESPONSIBILITIES

    Robert Parisi is a managing director and National Cyber Product Leader in Marsh’s New York City headquarters. His current responsibilities include advising clients on issues related to intellectual property, technology, privacy, and cyber related risks as well as negotiating with the carriers on terms and conditions. Robert is also responsible for coordinating Marsh’s Global Cyber Network.

    EXPERIENCE

    Prior to joining Marsh, Robert was the Senior Vice President and Chief Underwriting Officer (CUO) of eBusiness Risk Solutions at AIG. Robert joined AIG in 1998 as counsel for Professional Liability and held several executive positions, including CUO for Professional Liability & Technology. While at AIG, Robert oversaw the creation and drafting of underwriting guidelines and policies for all lines of Professional Liability. Robert was instrumental in the development of specialty reinsurance to address risk aggregation issues in cyber, privacy, intellectual property and technology insurance. Robert led the team at AIG that created the first coordinated cyber insurance offerings. In addition to working with AIG, Robert has also been in private practice, principally as legal counsel to various Lloyds of London syndicates.

    While at Marsh, Robert has worked extensively with Marsh clients in all industries, assisting them in analysis of their risk as well as in the placement of coverage for cyber risks.

December 7

Security teams are concerned that their logging techniques are outdated, such as the practice of scouring Active Directory to find needles in haystacks. They seek guidance to identify more sophisticated tools they should use, and many of the answers lie in an approach based around Microsoft System Monitoring (Sysmon) and Elasticsearch (ELK stack) tools.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

December 8

Security teams need help identifying what’s needed to better prepare and defend against the phishing and ransomware in 2021 and beyond.

Speakers:
  • Anand Singh

    Anand Singh

    IANS Faculty

    Anand is a seasoned Information Security practitioner with domain expertise of healthcare, retail, ecommerce, and finance. His CISO roles span the spectrum of Fortune 100 to early stage companies. Anand’s personal mission is to drive solutioning of complexities and challenges in the Information Security space such as Cloud security, board oversight of cybersecurity programs, cybersecurity talent grooming and advancement, and emerging threats. Anand also serves as an adjunct faculty at Mitchell Hamline School of Law teaching Incident Management and Response.

December 8

Which threats and opportunities will consume our attention in the coming year? This webinar recaps the biggest changes of the past year and looks ahead to what IANS sees emerging in 2022.

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

  • Gal Shpantzer

    Gal Shpantzer

    IANS Faculty

    Gal Shpantzer has been a full-time security consultant since the year 2000, providing (mostly good) advice to early-stage tech startups, security vendors, Ivy League universities, non-profits, and Fortune 50 clients. Gal owns and operates a boutique consultancy focused on vCISO and Observability Pipeline services that enable modern, scalable, user-friendly, auditable, and forensically ready security programs. Gal leads security programs and projects that empower business and technical leadership to prevent, detect and respond to security incidents, including threats to confidentiality (sophisticated IP theft) and availability (DDoS, ransomware).

December 14

Security teams need help identifying what’s needed to better prepare and defend against the phishing and ransomware in 2021 and beyond.

Speakers:
  • Anand Singh

    Anand Singh

    IANS Faculty

    Anand is a seasoned Information Security practitioner with domain expertise of healthcare, retail, ecommerce, and finance. His CISO roles span the spectrum of Fortune 100 to early stage companies. Anand’s personal mission is to drive solutioning of complexities and challenges in the Information Security space such as Cloud security, board oversight of cybersecurity programs, cybersecurity talent grooming and advancement, and emerging threats. Anand also serves as an adjunct faculty at Mitchell Hamline School of Law teaching Incident Management and Response.

December 15

In the wake of SolarWinds, companies are looking at how to minimize threats to their software supply chains – specifically, how to more effectively coordinate efforts with third- and fourth-party suppliers.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

December 16

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

January 11

Most organizations don't find a vulnerability until an attacker has exploited it. It's impossible to become resilient until you get ahead of the attackers. This symposium will cover how to use the concept of chaos engineering to deliberately break systems and identify security weak points, and how to create processes and rules to define how and when to use chaos engineering.

Speakers:
  • Tanya Janca

    Tanya Janca

    IANS Faculty

    Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

January 12

More than 70% of IANS customers use Exchange Online, but few know the best configurations, settings and tools to use to keep cloud-based email secure. This symposium explains how to set policies and get beyond base configurations of tools like secure web gateways, Microsoft Safe Links and ATP and how to monitor Exchange Online settings to ensure it remains secure over time.

Speakers:
  • Mick Douglas

    Mick Douglas

    IANS Faculty

    Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.

January 13

After SolarWinds and Kaseya, it’s clear attackers are targeting the supply chain, but how can teams defend what they can't control? This symposium explains the factors complicating supply chain visibility (CI/CD, cloud, APIs), and offers concrete steps for performing threat assessment, using models to uncover risks, and adopting a secure software development framework.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

January 25

Zero trust is a buzzword today, but in reality, the concept is sound. At a high level, it aims to ensure: (1) users are who they say they are, (2) users/devices can only access the resources they are entitled to and (3) any user compromise is limited/mitigated. It won’t happen all at once, but this symposium explains, real-world practical steps to take today to migrate to a strong zero trust architecture, ways to measure progress, set realistic milestones and ensure goals are obtainable, and tactical guidance on selecting solutions that move the needle (across SASE, NAC, CASB, SWG, etc.)

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

January 26

With the wealth of information on attacks from models like MITRE ATT&CK, organizations know they need to shore up their defenses, but are unsure of where to focus lean resources to make the most impact. This symposium explains what MITRE D3FEND is, how it relates to MITRE ATT&CK, and how to use it to programmatically to deploy the best set of defensive controls tailored to your environment.

Speakers:
  • Mick Douglas

    Mick Douglas

    IANS Faculty

    Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.

January 27

After SolarWinds and Kaseya, it’s clear attackers are targeting the supply chain, but how can teams defend what they can't control? This symposium explains the factors complicating supply chain visibility (CI/CD, cloud, APIs), and offers concrete steps for performing threat assessment, using models to uncover risks, and adopting a secure software development framework.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake Williams, the CTO and Co-Founder of BreachQuest and Rendition Infosec, has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding BreachQuest and Rendition Infosec, Williams worked with various government agencies in information security. Williams is an IANS Faculty Member and works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

January 27

Security teams adjusting to a DevOps environment tend to layer on too many security tools in the pipeline, resulting in environments awash in false positives, slowed schedules and angry developers. This symposium goes beyond specific tools and outlines some key techniques and processes organizations can use to foster secure DevOps pipelines and reduce security-developer friction and demos several strategies to show what's possible.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

February 1

After SolarWinds and Kaseya, it’s clear attackers are targeting the supply chain, but how can teams defend what they can't control? This symposium explains the factors complicating supply chain visibility (CI/CD, cloud, APIs), and offers concrete steps for performing threat assessment, using models to uncover risks, and adopting a secure software development framework.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

April 20

This roundtable at the Minneapolis Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

April 28

This roundtable at the Columbus Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

May 5

This roundtable at the West Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

 
 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation

* Required Fields