KEYNOTE SPEAKERS

  • Rick Howard
    Chief Security Officer
    Palo Alto Networks
    Date: 21 September 2017
    Time: 0900 – 0930 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Rick is the Palo Alto Networks Chief Security Officer (CSO) where he has overall responsibility of the company’s internal security program, leads the Palo Alto Networks Threat Intelligence Team (Unit 42), directs the company’s efforts on the Cyber Threat Alliance Information Sharing non-profit, hosts the Cybersecurity Canon Project, and provides thought leadership for the company and the Cybersecurity community at large. His prior jobs include TASC CISO, iDefense General Manager, Counterpane SOC Director, and Commander of the U.S. Army’s Computer Emergency Response Team where he coordinated network defence, network intelligence and network attack operations for the Army's global network. Rick holds a Master of Computer Science degree from the Naval Postgraduate School and an engineering degree from the US Military Academy. He also taught computer science at the Academy from 1993 to 1999. He has published many academic papers on technology and security and has contributed as an executive editor to two books: “Cyber Fraud: Tactics, Techniques and Procedures” and “Cyber Security Essentials.”

    Track

    Keynote

    Abstract

    This presentation describes Defence-in-Depth and why it is a failed network defender model. It describes how security practitioners have tried to transition to the attack life cycle model as a replacement but have not had much success due to four unforeseen reasons: too Many Tools to Manage, too much complexity, too much wasted time, too inefficient in crossing the last mile with threat intelligence. Finally, it talks about the emerging solution: Automatic Orchestration. But, in order to take advantage of the new idea, network defenders will have to abandon two old best practices, vendor- in-depth and best-in-breed, for a new best practice: seeking vendors who integrate with each other.

  • Robert F.Lentz
    President and CEO
    Cyber Security Strategies
    Date: 20 September 2017
    Time: 1000 – 1030 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Robert Lentz is currently president of Cyber Security Strategies.  He recently was on the prestigious Cyber Security Hall of Fame and Presidential Cyber Commission. He was the first Deputy Assistant Secretary of Defense for cyber security. He wrote groundbreaking policies that set the pathway for operating in cyberspace, He spent 26 years at the National Security Agency, where he served in the historic National Computer Security Center with many of the Internet pioneers and ultimately became NSA's Chief of Network Security. In November 2000, he was appointed CISO for the Secretary of Defense, culminating in 2009 assisting President Obama to approve the DOD Cyber Command. He stimulated unprecedented venture capital investment in cyber technology and numerous international agreements of vital strategic importance. He is recognized for creating the centers of academic excellence with now nearly 200 certified colleges and universities.

    Track

    Keynote

    Abstract

    Evolution of the threat

    1. Era of Signatures
    2. Epoch of Heuristics
    3. We are now in current times – Age of Response and Remediation

    The threat is pivoting toward a new target – From the Desktop to the Infrastructure. 

    1. Commercial Retail – Target
    2. Commercial Media – Sony
    3. Government – OPM
    4. Healthcare – Ransom Ware/WannaCry

    Response and Remediation Strategies and Takeaways

    1. Corporate leadership processes
    2. Role of the CIO/CISO
    3. Establishment of a Security Operations Center – in source or out source
    4. Security of legacy critical infrastructure
    5. New deployments of critical infrastructure
  • Kevin Mandia
    CEO & Board Director
    FireEye Inc
    Date: 20 September 2017
    Time: 0900 – 0930 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Kevin has served as FireEye Chief Executive Officer since June 2016 and was appointed to the company’s Board of Directors in February 2016. He was previously President of FireEye from February 2015 until June 2016. Kevin joined FireEye as Senior Vice President and Chief Operating Officer in December 2013, when FireEye acquired Mandiant, the company he founded in 2004. Before Mandiant, Kevin was the Director of Computer Forensics at Foundstone (acquired by McAfee Corporation) from 2000 to 2003, and the Director of Information Security for Sytex (later acquired by Lockheed Martin) from 1998 to 2000.

    Track

    Keynote

    Presentation Title

    State of Cybersecurity

    Abstract

    Cybersecurity threats change and evolve daily. In today’s world, understanding the latest tactics and knowing more about threat actors make the difference in keeping your organization safe. Join FireEye CEO Kevin Mandia as he discusses the latest threats and trends and offers insights into ways to stay ahead of cyber-attacks.

  • Mike McConnell
    Senior Executive Advisor
    Booz Allen Hamilton
    Date: 21 September 2017
    Time: 0930 - 1000 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Senior Executive Advisor Mike McConnell is Booz Allen’s former vice chairman, where his primary roles included serving on the firm’s Leadership Team and leading firm’s rapidly expanding cyber business. After retiring from the Navy as vice admiral, Mike joined Booz Allen and led the development of the firm’s Information Assurance business, Intelligence business which focused on policy, transformation, homeland security, and intelligence analytics.

    Mike’s career has spanned more than 40 years focusing on international development and foreign intelligence issues. His 29-year distinguished career as a U.S. Navy intelligence officer included significant assignments that impacted national security issues. In 2007, he was the second director of national intelligence (DNI), he left Booz Allen and served for 2 years under Presidents Bush and Obama. He also served as a member of the director of central intelligence’s senior national intelligence leadership team, which addressed major programmatic and substantive foreign intelligence issues.

    Track

    Keynote

    Abstract

    Cyber Security has not just shifted from the server room to the board room, but its political impact has also become increasingly evident in the last year. In many instances, whether in the US, Europe or Africa, the use of well-timed cyber-attacks to intervene in the political process has generated deep concerns over the tools of cyber security deployed in the political arena. This has raised questions of how nations should (a) interact with each other, (b) providing adequate security to protect the legitimacy of the democratic process, (c) and whether professions have adequately assessed future impact of cyber security.

    Mike McConnell has served four US presidents which included briefing the President of the United States on a daily basis as the Director for National Intelligence. He will provide his personal insight into the questions and share about how nation states and businesses will need to think about the growing risk of cyber security.

  • John Mills
    Director of Cybersecurity Policy, Strategy, and International
    DoD Chief Information Officer, Department of Defense
    Date: 20 September 2017
    Time: 1000 - 1030 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    John has worked in various capacities since 1983 for the national defence and security community. He has 30 years of service as a civilian and 32 years as a member of the uniformed military. John has worked cyber matters since 2004 at the Department of Defence in the DoD CIO. He has had extensive experience and role in developing the current cyber innovation outreach efforts of the Department.

    He established and led the regular engagements with Silicon Valley and also the intra-DoD and inter-agency efforts to re-establish a presence and influence in Silicon Valley and other locations. John has led and directed several successful Rapid Innovation Cybersecurity Pilot efforts. John’s team has also produced and delivered the Cybersecurity Scorecards for the Department that have established a clear baseline of the cybersecurity status of the DoD and these have also been introduced as a model effort in the inter-agency.

    Track

    Keynote

    Abstract

    Evolution of the threat

    1. Era of Signatures
    2. Epoch of Heuristics
    3. We are now in current times – Age of Response and Remediation

    The threat is pivoting toward a new target – From the Desktop to the Infrastructure. 

    1. Commercial Retail – Target
    2. Commercial Media – Sony
    3. Government – OPM
    4. Healthcare – Ransom Ware/WannaCry

    Response and Remediation Strategies and Takeaways

    1. Corporate leadership processes
    2. Role of the CIO/CISO
    3. Establishment of a Security Operations Center – in source or out source
    4. Security of legacy critical infrastructure
    5. New deployments of critical infrastructure
  • Ravinder Singh
    President
    ST Electronics
    Date: 20 September 2017
    Time: 0930 - 1000 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Mr Ravinder Singh was appointed President of Singapore Technologies Electronics Limited (ST Electronics) on 1 January 2017 to drive the company’s growth in the three major business segments namely Intelligent Transportation, Satellite Communications and Information Communication Technologies. Mr Singh is also President, Defence Business, Singapore Technologies Engineering Limited and works across the group to enhance the strategic relationship with the Group’s core defence customers.

    Mr Singh first joined ST Electronics in 2015 as Deputy President, Corporate & Market Development, overseeing the Local Business and corporate divisions. Prior to his current role, Mr Singh served as President of Singapore Technologies Kinetics Limited, leading the development of innovative solutions for its customers and creating a diversified revenue stream despite challenging market environments. Mr Singh started his career in the Singapore Armed Forces in 1982, chalking up significant milestones over the years, such as his role as Chief of Army.

    Track

    Keynote

    Abstract

    The world is getting increasingly connected. More devices and sensors are being networked and connected to the internet. Enterprises are also becoming more interlinked, with many enterprise migrating to the cloud creating large networks. However, networks are inherently vulnerable – they are only as strong as their weakness point. As networks become larger, more complex and more connected, they become more vulnerable. Unfortunately, cyber threats have risen in frequency, sophistication and reach. In tandem with the growing threat, cyber security technologies are evolving extremely quickly driven by numerous cyber start-ups around the world. New advances in cyber security technology have tried to plug the known gaps, only to be counteracted by new threats and exploits. This endless cycle benefits only the attackers. They don’t need to be successful all the time. The defenders, however, need to be able to stop attacks all the time. The solution cannot lie in relying on implementing the latest technology solution. A new cyber security architecture is required that recognises the dynamic and complex nature of IT networks, providing a flexible yet stable structure that is able to build on cyber security tools and processes to eliminate a significant proportion of cyber-attacks allowing the cyber security experts to focus on the most advance threats.

  • DR HUGH THOMPSON
    Chief Technology Officer
    Symantec
    Date: 21 September 2017
    Time: 1000 – 1030 hrs
    Venue: Auditorium, Hall 406, Level 4
    Biography

    Dr Hugh Thompson is a leading force in the information security industry. He has co-authored four books, written more than 80 academic and industrial publications on security, has been a contributor to The New York Times, and has been interviewed by top news organizations including the BBC, CNN, NPR, Financial Times, Washington Post, Forbes, The Wall Street Journal, and others. He has more than a decade of experience creating methodologies that help organizations build demonstrably more secure systems. He joined Blue Coat in 2012 and served as CTO & CMO until the acquisition of Blue Coat by Symantec in August 2016. Dr Thompson is now CTO of Symantec and leads the researchers and architects in the Office of the CTO and is also responsible for additional areas such as analyst relations. In 2006, Dr Thompson was named one of the “Top 5 Most Influential Thinkers in IT Security” by SC Magazine and has, for the past several years, served as the program committee chairman for RSA Conference, guiding the technical content for the world’s largest information security gathering. He previously sat on the Editorial Board of IEEE Security and Privacy Magazine, and served as an adjunct professor at Columbia University in New York for many years. Dr Thompson holds a B.S., M.S. and Ph.D. in applied mathematics from the Florida Institute of Technology.

    Track

    Keynote

    Abstract

    If you are in any way involved with the field of information security, you are no doubt familiar with the concept of “defence-in-depth”. It is a model of security that has existed long before the invention of electricity and has a few basic principles. Massive changes in the was that people work, consume data and use cloud applications coupled with the rise of non-traditional attackers is reshaping what defence in depth means to enterprises and people in the modern era. In this talk, Dr Hugh Thompson will re-examine defence in depth in the wake of mobility, cloud, IoT and a constantly evolving threat environment.