IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather
all members of the security function.
Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.
One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.
Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.
Hour-long interactive discussions examining hot topics in information security.
Security teams seek fresh MITRE ATT&CK use cases to help them navigate threats and vulnerabilities in 2021. This virtual symposium will outline those use cases and how to apply them.
Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.
Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.
Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.
George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.
Nation states have increasingly targeted organizations managing critical infrastructure (utilities, for example) knowing that industrial control systems continue to run on antiquated technology. Security teams seek guidance to better determine their weaknesses and how to fix them.
Jake is the Founder, President, and Principal Analyst of Rendition
Infosec, an information security consultancy. He also sits on the
Vulnerability Review Board at Peerlyst, a startup social networking
platform exclusively for security professionals. Jake
is a prolific speaker and instructor on a variety of information
security topics such as reverse engineering malware, memory forensics,
threat intelligence, and advanced exploit development.
Manually conducting assessment and enforcement in the cloud is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for automation of these tasks and tools to do it with.
Tanya Janca, also
known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application
Security’. She is also the founder of We Hack Purple, an online learning
academy, community and podcast that revolves around teaching everyone to
create secure software. Tanya has been coding and working in IT for over twenty
years, won numerous awards, and has been everywhere from startups to public
service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats;
startup founder, pentester, CISO, AppSec Engineer, and software developer. She
is an award-winning public speaker, active blogger & streamer and has
delivered hundreds of talks and trainings on 6 continents. She values
diversity, inclusion and kindness, which shines through in her countless
Dave is the Founder and Principal Consultant with Voodoo Security, an
information security consulting firm with broad expertise. He is also a
Senior Instructor, Analyst, and Course Author for the SANS Institute and
a VMware vExpert with extensive experience designing and configuring
secure virtualized infrastructures. In addition, Dave has served as
Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group
and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of
organizations in the areas of security, regulatory compliance, network
architecture, and engineering. He has also worked as a security
architect, analyst, and manager for several Fortune 500 companies.
Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.
Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.
Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.