IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather
all members of the security function.
Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.
One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.
Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.
Hour-long interactive discussions examining hot topics in information security.
Security teams seek fresh MITRE ATT&CK use cases to help them navigate threats and vulnerabilities in 2021. This virtual symposium will outline those use cases and how to apply them.
Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.
Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.
Nation states have increasingly targeted organizations managing critical infrastructure (utilities, for example) knowing that industrial control systems continue to run on antiquated technology. Security teams seek guidance to better determine their weaknesses and how to fix them.
Jake is the Founder, President, and Principal Analyst of Rendition
Infosec, an information security consultancy. He also sits on the
Vulnerability Review Board at Peerlyst, a startup social networking
platform exclusively for security professionals. Jake
is a prolific speaker and instructor on a variety of information
security topics such as reverse engineering malware, memory forensics,
threat intelligence, and advanced exploit development.
Manually conducting assessment and enforcement in the cloud is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for automation of these tasks and tools to do it with.
Dave is the Founder and Principal Consultant with Voodoo Security, an
information security consulting firm with broad expertise. He is also a
Senior Instructor, Analyst, and Course Author for the SANS Institute and
a VMware vExpert with extensive experience designing and configuring
secure virtualized infrastructures. In addition, Dave has served as
Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group
and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of
organizations in the areas of security, regulatory compliance, network
architecture, and engineering. He has also worked as a security
architect, analyst, and manager for several Fortune 500 companies.
Attacks against hospitals and companies in the medical space have skyrocketed during the pandemic. As bad actors target long-standing vulnerabilities in these organizations, security teams seek guidance to close those security holes. This virtual symposium will outline ways to find and fix them.
Justine is the CEO of MedSec, a company focused on medical device
security management and the delivery of security solutions to healthcare
delivery organizations and medical device manufacturing companies. She
also serves as a member of HP’s Security
Advisory Board, a member of BlackHat’s USA Guest Review Board, and
as an advisor to technology startups.
Kevin is a Healthcare Cybersecurity Consultant working with companies such as MedSec,
LogRhythm and individual healthcare providers. Kevin has over 40 years’ experience in
healthcare in roles from direct patient care as a registered nurse to a Director of
Information Security at Mayo Clinic. He assisted in developing the cybersecurity program
at the Mayo Clinic and designed their medical device cybersecurity program.
Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.
Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.
Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.
Chris is the Co-Founder and CEO of LARES Consulting, an information
security consulting firm that leverages a blend of assessment, testing,
and coaching. He also serves on the Board of Directors at CREST, an
international not-for-profit accreditation
and certification body that represents and supports the technical
information security market.
Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.
George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.
The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.
Matt is the CSO of Public Cloud at Palo Alto Networks
where he works with organizations to develop and implement security
strategy for public cloud adoption and maturity. He has extensive
experience in information security leadership and blogging. Matt
currently leads the Cloud Threat team which is an elite group of
security researchers exclusively focused on public cloud concerns. He
also serves as an advisory board member for Rutgers University's
Cybersecurity Certificate program.
Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.
The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.
Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer
and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency
Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into
Science: A Conference on Defense, and advises many security startups. His specialties
include leading innovation programs, intern programs, and a thriving startup culture to
meet emerging cybersecurity needs. He often serves as a challenge function and change
agent to drive unconventional thinking and alternative approaches to hard problems in
Security teams face increased attacks against their security architecture and seek a better approach to stay ahead of the bad guys. The DIE Triad (distributed, immutable, and ephemeral) model of adversarial resilience is one such approach. This virtual symposium will outline the components and how to incorporate them.