Black Hat is pleased to announce the new Executive Summit at Black Hat Europe in London. As 2017 begins to wind down, businesses are facing a promising – but uncharted – future in how they protect their valuable data. Cybersecurity executives are entering a new era of business influence that requires a next-generation approach to how they plan, purchase, implement, and manage data-protection technology. And they are facing some important introspection of their own value to the organization.
At the Black Hat Executive Summit, CISOs and other cybersecurity executives will gather to hear from a variety of industry experts who are helping to shape this next generation of information security strategy. We'll be dissecting the latest technologies designed to keep ahead of sophisticated adversaries and provide a peek into future platforms; we'll outline the next-level skills and strategies CISOs need to bolster their relevance and wow the board; and, of course, we'll discuss the latest techniques for maintaining a proactive approach to data protection.
For CISOs and executives looking to transform from a mere manager of information into a corporate champion of business growth, it's imperative to stay on top of the latest insight. That journey begins at the Black Hat Executive Summit.
*Please note: In order to create an open and candid environment that promotes the sharing of ideas, thoughts, and discussion, the Executive Summit will follow Chatham House Rule; neither media nor event coverage is permitted. This program was designed for executive security practitioners; solution providers and vendor attendees are limited to event sponsors.
09:00-09:15 | Opening Remarks
|
09:15-10:00 | Keynote - Thinking and Acting Outside the Box on Cyber Security – Both Internationally and Nationally
|
10:00-10:30 | Addressing the Board – What They Really Want to Know
|
10:30-10:50 | Networking Break |
10:50-11:20 | Are Criminals Really Profiting From Your Stolen Data?
This session examines both the victim's and criminal's point of view. From the victim's perspective, an expert will analyze how many breaches are performed by criminals for profit, how much data is actually abused, as well as how the breach affects those individuals. From the attacker's side, we'll look at how the downloaded database converts into profit, how these criminals are evolving, and the emerging challenges they are facing. |
11:20-12:20 | The Security Breach Fallout: How Will the Next-Generation CISO Respond
|
12:20-13:40 | Networking Lunch |
13:40-14:10 | The Cyber Landscape: A Security Pro's Point of View
|
14:10-15:10 | Cutting Through the GDPR Confusion: A Reality Check at T-Minus Six Months
|
15:10-15:30 | Networking Break |
15:30-16:00 | The Role of AI in Cybersecurity: What's Real, What's Hype?
|
16:00-16:30 | Greatest Technology Hits of 2017 and What to Expect in 2018 MODERATOR:
|
16:30-16:50 | Black Hat Briefings Preview
|
16:50-17:00 | Closing Remarks |
17:00-18:30 | Networking Reception, The Bridge at The ExCeL |
Qualys, is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance.
Darron Gibbard CISM, CISSP, Managing Director, Northern Europe
Before joining Qualys as CTSO, I have spent the last 25+ years working for a variety of payment services, media and telco organisations providing Cyber, IT and Information security thought leadership and subject matter expertise. My early career was spent working in the vendor marketplace for startups and major security vendors in both a pre and post sales capacity.
Kevin Ware-Lane, Director of Technical Account Management
Kevin has for the last 20+ years been engaged across networking, security and cloud arenas, helping organisations to gain IT and security visibility, plan for and deploy key infrastructure solutions, and to implement effective security capabilities and programmes, all with a keen eye on ensuring agility for evolving customer needs.
Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threats. IBM Security, with 7,500 security professionals worldwide, helps more than 12,000 clients address their most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information.
Over the past decade, IBM has invested more than $2 billion in security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to grow its portfolio. Today, IBM Security delivers next-generation security technology and services, including cognitive and Watson analytics, automated incident response, cloud-based solutions and state-of-the-art security operations centers.
SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary SaaS platform helps enterprises gain operational command of the security posture for themselves and across all of their partners and vendors. It provides continuous, non-intrusive monitoring for any organization including third and fourth parties.
Sam Kassoumeh, COO and Co–founder
Sam Kassoumeh is cofounder and chief operating officer and is responsible for driving the company's product portfolio. With extensive experience as both a cybersecurity practitioner and leader, Kassoumeh's experience has been pivotal in the growth and development of the company as well as establishing the ecosystem risk management space. Kassoumeh's passion for internet security started in his teens and propelled him into key cybersecuity roles including as head of security and compliance at Gilt Groupe and worldwide InfoSec lead at Federal-Mogul. Sam holds a BBA in Management Information Systems from the University of Michigan-Dearborn.
Tom Wells, Vice President, Global Sales
Tom Wells joined SecurityScorecard in February 2016 and leads the company's global sales organization driving sales development efforts with commercial and public sector accounts across the Americas, EMEA, and APAC. With over 20 years of experience, Wells has built an agile and consultative sales culture that has helped some of the best known brands in the world improve their ability to manage risk against their business. Wells has a strong track record of success having held leadership positions at Agari, Symantec, Clearwell, Mimosa Systems, FileX, ION Networks, StorageNetworks, Interliant, and Lucent Technologies. He hold a BA in international affairs from the University of Colorado - Boulder and an MBA from New York University.
Your enterprise needs to move faster, but lack of process and legacy tools hold you back. The ServiceNow System of ActionTM replaces unstructured work patterns of the past with intelligent workflows of the future. ServiceNow's Security solutions are part of the System of Action. ServiceNow Security Operations bring incident data from security tools into a structured enterprise security response engine. Workflows, automation, and a deep connection with IT help prioritize and resolve real threats fast. ServiceNow Governance, Risk, and Compliance (GRC) drives unified GRC programs. It transforms processes by continuously monitoring, prioritizing, and automatically responding to real risks in real-time. Learn more: www.servicenow.com/sec-ops.
Cyxtera Technologies combines a worldwide footprint of best-in-class data centers with a portfolio of modern, cloud- and hybrid-ready security and analytics offerings - providing more than 3,500 enterprises, government agencies and service providers an integrated, secure and resilient infrastructure platform for critical applications and systems. For more info, visit: www.cyxtera.com
Cybrary is an open-source cyber security and IT learning and certification preparation platform. Its ecosystem of people, companies, content, and technologies converge to create an ever-growing catalog of online courses and experiential tools that provide cyber security and IT learning opportunities to anyone, anywhere, anytime. Cybrary levels the playing field for those who want to advance in or start a cyber security or IT career by providing anyone with access to the tools they need to be competent and confident. Through its open-source model, Cybrary is actively working to fill the gap between open cyber security and IT positions and experienced practitioners. Cybrary has thousands of hours of free content for beginners, all the way through advanced and leadership-level courses, that is developed and delivered by industry subject matter experts. The platform offers skill assessments, learning, and certification preparation on popular topics such as Ethical Hacking, CompTIA A+, Security+, and CISSP, Web Application Penetration Testing, Secure Coding, NIST 800, Metasploit, while staying current with changes in the industry. Visit www.cybrary.it to learn more.
Please direct inquiries to executivesummit@blackhat.com.