IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather
all members of the security function.
Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.
One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.
Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.
Hour-long interactive discussions examining hot topics in information security.
Security teams face increased attacks against their security architecture and seek a better approach to stay ahead of the bad guys. The DIE Triad (distributed, immutable, and ephemeral) model of adversarial resilience is one such approach. This virtual symposium will outline the components and how to incorporate them.
Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer
and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency
Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into
Science: A Conference on Defense, and advises many security startups. His specialties
include leading innovation programs, intern programs, and a thriving startup culture to
meet emerging cybersecurity needs. He often serves as a challenge function and change
agent to drive unconventional thinking and alternative approaches to hard problems in
Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.
George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.
Security teams are concerned that their logging techniques are outdated, such as the practice of scouring Active Directory to find needles in haystacks. They seek guidance to identify more sophisticated tools they should use, and many of the answers lie in an approach based around Microsoft System Monitoring (Sysmon) and Elasticsearch (ELK stack) tools.
Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.
Rich is CEO and Analyst for Securosis, an information security
research and advisory firm, in addition to Founder and Vice President
of Product at DisruptOPS, a cloud environment monitoring platform. Prior
to founding Securosis, he was Research
Vice President for Gartner’s security team where he also served as
Research Co-Chair for the Gartner Security Summit. Additionally,Rich has
served as an independent consultant, web application developer,
software development manager, and a systems
and network administrator.
The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.
Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.
Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first. This virtual symposium helps security teams determine where they are going wrong and how to get on a better track.
Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business. Aaron also serves on the RSA Program Committee, helping select the educational content presented at the yearly RSA Conference.
Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.
The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.
Matt is the CSO of Public Cloud at Palo Alto Networks
where he works with organizations to develop and implement security
strategy for public cloud adoption and maturity. He has extensive
experience in information security leadership and blogging. Matt
currently leads the Cloud Threat team which is an elite group of
security researchers exclusively focused on public cloud concerns. He
also serves as an advisory board member for Rutgers University's
Cybersecurity Certificate program.
Chris is the Co-Founder and CEO of LARES Consulting, an information
security consulting firm that leverages a blend of assessment, testing,
and coaching. He also serves on the Board of Directors at CREST, an
international not-for-profit accreditation
and certification body that represents and supports the technical
information security market.
Manually verifying policy compliance is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for policy automation and tools to do it with.
Dave is the Founder and Principal Consultant with Voodoo Security, an
information security consulting firm with broad expertise. He is also a
Senior Instructor, Analyst, and Course Author for the SANS Institute and
a VMware vExpert with extensive experience designing and configuring
secure virtualized infrastructures. In addition, Dave has served as
Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group
and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of
organizations in the areas of security, regulatory compliance, network
architecture, and engineering. He has also worked as a security
architect, analyst, and manager for several Fortune 500 companies.
IAM teams are challenged with demands for more robust access governance, cloud migration and integration with other IT infrastructure. This virtual symposium helps security teams make smart choices.
Idan is the founder of M-Tech Innovations, Inc., (acquired in 2008 and renamed Hitachi) an angel investment firm specializing in Canadian B2B technology startups. Idan led the product development and roadmap strategy and was responsible for customer services at M-Tech and subsequently Hitachi ID for 28 years. During his tenure, the company released password management automation software in 1996, user provisioning/IAM in 2002 and PAM in 2007. Idan has worked with many corporate, government and higher education customers world-wide to implement process automation including IAM and PAM controls across their on-premises and cloud-hosted systems and applications.
Prior to founding Hitachi ID Systems in 1992, Idan provided network security consulting services to large organizations such as Shell, Amoco, BP Canada and Talisman Energy.
Wolf is an Advisory CISO of Duo Security, the leading provider of
unified access security and multi-factor authentication delivered
through the cloud. He has held senior management roles in IT and IT
security in the financial services and healthcare verticals.
In addition, Wolf has held senior leadership roles in consulting
firms specializing in identity and access management, governance risk
and compliance, and security programs. Wolf advises clients primarily in
risk management, incident response, business
continuity, and secure development.