Solutions & Demonstrations Track
The Solutions and Demonstrations Track provides attendees with an opportunity to learn about sponsor solutions, products or case studies in deeper detail. Take these opportunities to meet with them in a presentation setting; as well as visiting them at their tables throughout the event.
S1 – GreyCastle Security | Putting the “Pro” in Proactive: Building A Next-Gen Cybersecurity Program
Dan Didier | MSIA, CCSP, TSS
Can your organization barely stay afloat when it comes to cybersecurity? The answer to this question may be simpler than you think.
Cybersecurity exists for one reason: to protect the (assets of your) organization. Period. To do this effectively, you need relevant and actionable information about the risks you have to manage. The industry is good at providing point solutions that give you visibility into a specific area, but the big picture is often lost among the layers and layers of technology and overly complicated processes. CEOs, board members and other stakeholders need clear, concise, accurate and timely information that allows them to make effective decisions that balance cost with risk. With the ever-increasing number of regulations, exposures and breaches; it’s clear that organizations aren’t keeping up. They are getting bogged down in complexity and cannot make informed decisions in a timely fashion. This is your chance to learn about the simplest solution you’ve never seen.
Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.
Attendees will be provided with:
- The six key steps to building your own Next-Gen Cybersecurity Program
- Tips for helping your CEO, Board and all stakeholders make relevant, practical and effective cybersecurity decisions
- Examples of the key processes and how to avoid common pitfalls
Dan Didier is an entrepreneur, speaker and Vice President of Services for GreyCastle
Security. With nearly 20 years of security experience in a wide range of industries including critical infrastructure, finance, healthcare, manufacturing and other prominent industries, Dan brings extensive expertise as a Technical security engineer and business-focused risk manager.
Dan’s unique background allows him to bridge the gap between people, process and technology and adapt to the unique cybersecurity challenges that organizations face today.
S2 – Fortinet | Cyber Resilience
Rick Basile | Senior Director of Systems Engineering
How well would your organization remain operational during a cyber event? Human interaction during an attack likely means you’re too late in your response. Implementing a level of automation can help identify critical assets and best control the porous nature of information technology today (mobile, cloud, IoT, etc.). Security controls need to be able to be measured to determine level of efficacy. Focus on protecting that which is protectable.
Join us in order to better understand the challenges facing today’s networks, the difference between Cyber Resilience versus Cyber Security, and how a framework for Cyber Resilience look.
Rick Basile is the Senior Director of Systems Engineering at Fortinet, Inc. focusing on the Northeast region of the United States. He also sits as a member in the Office of the CTO. Rick has over 25 years of industry experience coupled with extensive networking and telecommunications expertise in the Commercial, Enterprise, Service Provider, Federal and Financial Services markets.
Rick began his career as a security specialist and a computer and switching systems Specialist in the United States Air Force. Upon leaving active duty in 1997, he spent four years in the networking and security integration space with SBC Data Communications and later joined a Service Provider focused vendor of virtualized security services.
Joining Fortinet in 2003 he has held multiple positions including leading the Financial Services vertical, Senior Engineering responsibilities for the pre-sales field resources, as well as the post-sales support organization throughout North America, South America and Australia.
S3 – Vandis | IntroSpect User and Entity Behavior Analytics (UEBA)
Matt Kagan | Northeast Security Sales at Aruba, a Hewlett Packard Enterprise company
IntroSpect User and Entity Behavior Analytics (UEBA) uses AI-based machine learning to spot changes in user behavior that often indicate inside attacks that have evaded perimeter defenses. Security teams are armed with insights into malicious, compromised or negligent users, systems and devices – cutting off the threat before it does damage. Join Matthew Kagan, Security Director, as he leads a discussion on how to use these solutions to protect your organization before damage is done.
Matt Kagan is a proven sales leader with more than 20 years of experience building high-performing teams, implementing and transforming sales cultures, and consistently exceeding targets. He has specialized knowledge of complex technology sales; including software, virtualization, cloud computing, network infrastructure, security, and managed hosting.
S4 – Carbon Black | Beyond AV
Eric Ayotte | Senior Sales Engineer
Cyberattacks are opportunistic, diverse, and constantly evolving. Research indicates only 30% of breaches are caused by malware. The other 70% use non-malware techniques, which are harder to spot and more dangerous. Learn how to stop the non-malware threats that Machine Learning and Traditional AV are not designed to prevent using Carbon Black’s Award-winning NGAV + EDR product: Cb Defense.
Eric Ayotte has more than 20 years of IT and Cybersecurity experience with a strong focus on financial services and fraud prevention. Having held many different roles during his career, from analyst to manager to advisor, he has a passion for helping others to understand the risks and threats around Cybersecurity. Eric is currently a Senior Sales Engineer with Carbon Black supporting customers in New York and Connecticut.
S5 – ServiceNow | Security Automation and Orchestration: The Secret Weapon for Excelling at Ordinary Security Operations
Stuart Werman | ServiceNow’s Security Operations and Risk Sales Director
While it’s important to explore the latest network and end-point cutting-edge detection and protection technologies, the breaches of the last several years have shown us that security teams are still overwhelmed trying to operationalize ordinary security work. It seems keeping up with basic hygiene, such as patching vulnerabilities, is still too cumbersome. Concurrently, the trajectory for events and alerts from best-of-breed security products are increasing and requires more effective triage and containment coordination between security, IT and enterprise responders. Automation and orchestration is necessary and inevitable to help security teams excel at the ordinary. This can help teams find the most important things to work on first, eliminate mundane work, and retain top security talent. During the Rochester Security Summit, we will discuss how organizations can use automation and orchestration in a risk-free way to dramatically reduce risk exposure to vulnerabilities and improve security incident and threat response processes.
Stuart Werman has been with ServiceNow since 2010 and served as a Client Director in New England and Upstate NY, helping companies transform and automate their service management delivery to their internal and external customers. The SecOps business unit formed in 2016 with the mission of reducing corporations’ cyber risk exposure by orchestrating and automating Enterprise Security Response. Prior to ServiceNow, Stuart worked with Internet Security Systems (ISS) bringing their Intrusion Detection and Vulnerability scanning solutions to the cyber security market. He then worked with Vontu who pioneered Data Loss Prevention and was acquired by Symantec.
Stuart earned his Masters in Business Administration from Rutgers University and BA from the Whittemore School of Business and Economics at the University of New Hampshire.
S6 – Brite Computers | Complete Device Visibility Across Your Organization
Adam Kohler | Senior Consulting Engineer
Everyday, devices are connecting to your network at a rapid pace. These devices significantly expand your attack surface, yet are invisible to most security products. Device visibility is foundational to any security practice. In this session, you’ll learn how to gain complete visibility so you can control and continuously monitor device behavior and more.
Adam Kohler is a Senior Consulting Engineer from ForeScout specializing in Global Financial Services. With over 12 years of industry experience, Kohler has gained exposure to a wide variety of environments across industries.
S7 – IntSights | Creating the Cyber Kill Chain – How Threat Actors Gather Intel on You and Your Organization
Benjamin Molnar | Security Strategist
Threat actors rely on intelligence to see, identify, and create attacks. Historically, they have used a variety of individual tools to gather data from intelligence sources including open-source intelligence (OSINT), Machine Intelligence (SIGINT) and Social Media Intelligence (SOCMINT) but now, they can automate almost all of it. Understanding how threat actors gather intelligence will help better align your security infrastructure with external threats as well as respond with automation to build a stronger perimeter.
In this session, we’ll demonstrate some of the tools that threat actors use to gather intelligence about your company, provide uses cases for using this intelligence, and discuss how you can use threat intelligence and automated remediation to get ahead of an adversary.
Benjamin Molnar has spent over 10 years in security and networking covering Healthcare, Energy, Telecom, and Banking. He also spent four years in the Army where he served in the infantry and in recruiting. When he’s not in the Dark Web he’s spending time with his wife, renovating their home, or traveling.
S8 – SMP | Employing Digital Workers for Security Automation
Jonathan Borgesen | Principal Security Consultant
Over the past five years the Cyber Security landscape has changed drastically. Since 2013 there has been 9,727,967,988 records lost or stolen. There are currently around 7.6 billion people on the planet. 2 billion more breaches than there are people in the world!
Based on this explosion of malicious activity both organizations and manufacturers are looking for ways to decrease the amount of time bad processes are running on the network. Typically, this is attempted by sharing information between tools while leveraging automation through API’s. However, this tends to be a very time extensive and complex method which can leave organizations unable to take full advantage of the investment they made.
There is a better way. A growing methodology to remove the time and complexity of enabling automation is RPA or Robotic Process Automation. With RPA, organizations are creating an agnostic approach to automation that doesn’t require hours / days of coding or scripting as API’s tend to need. Instead an integration can be programmed within hours. Depending on the integration, an organization can shorten their threat window from years, months, or weeks, to mere minutes. This inevitably provides greater value to current legacy tools. Additionally, it allows understaffed security teams to focus on strategy rather than spending cycles reviewing logs and manual investigations.
Jonathan Borgesen is the Principal Security Consultant for SMP. Jonathan has a decade of experience in the Cyber Security Industry. During that time Jonathan has focused on educating organizations on modern threats as well as the best course of action to protect against those threats. Through this methodology, Jonathan has assisted many organization’s in meeting their security goals whether it be on the Endpoint, Network, or Cloud. Jonathan is passionate about leveraging automation to assist organizations ability to address skills shortages and an increasing threat landscape.
S9 – Digital Guardian & Netskope | The Real World of Threat Hunting: Tools, Tips and Recipes
Ben McGraw | Cybersecurity Manager
Despite the plethora of new security tools on the market, attacks continue to increase at an alarming rate, both in sophistication and quantity. Cybersecurity teams are under constant pressure to reduce dwell time and detect the threat before it causes serious damage to their organizations.
Ben McGraw, Manager of Cybersecurity at Digital Guardian, will conduct an in-depth tutorial on the latest Threat Hunting techniques including how to use behavioral analytics, forensics and open source tools to quickly identify both malicious insiders as well as external adversaries. Ben will walk you through the newest scenarios and Threat Hunting use-cases to give you a deeper understanding of what to look for and what to focus on. This actionable advice has been developed over years of experience by Ben and his security teams to ultimately minimize dwell time for adversaries in your network.
Attend this session to learn:
- Advanced threat hunting tactics, techniques and procedures
- Incorporating behavioral analytics into your regular Threat Hunting activities
- New ways to incorporate forensic analysis into your security program
- How to leverage attributes & metadata of system-related activity to hunt for anomalous behavior
- Take advantage of open-source tools for maximizing threat hunting engagements
S10 – Rolta AdvizeX & Thales | The Changing Security Landscape
Sam Cattle | National Security Practice Director
As are many industries, Cybersecurity today is in a state of constant disruption. The threats are changing, the technologies are changing, what we need to protect is changing. In this presentation, Sam Cattle, Security Practice Director at Rolta AdvizeX, walks us through these macro-level changes to the landscape of security, what security means to our 21st -century businesses and organizations, and how to go about closing the gap between the security we have today and the security our organizations really need.
As a security leader, Sam Cattle provides over 20 years of Security professional, consulting, and management expertise. He has held roles as CISO and as director of national Security/Splunk practices. His expertise allows him to manage highly technical projects with the knowledge to translate security concepts into business language at the boardroom level. He focuses on Security Governance and Compliance Management advisory engagements specializing in the Security/Compliance challenges inherent in converging technologies and business models.
Leading the Rolta AdvizeX Security Practice, Sam is defining an expanding Security service and product portfolio, spearheading Security go-to-market efforts, and also supporting global Rolta International Security initiatives.
S11 – GuidePoint Security | Lessons Learned in Maturing Security Operations Centers
Robert Vaile | Director of vSOC Product Development
Cybersecurity threats are constantly evolving. Are your security operations? This presentation will discuss the rapidly evolving threat landscape facing organizations today while focusing on the people, processes, and technologies required to defeat them. Attendees will gain a greater understanding of how to improve their security operations to better defend against today’s threats.
Robert Vaile has worked in information security for over 22 years. Robert grew up through the security engineering ranks and provided security & privacy consulting services to financial services, power & utilities and state government. Robert has held security and IT risk management leadership positions in several organizations where he had the opportunity to build and maintain security operations organizations. Robert was CISO at Kansas State University and a CISO advisor with Gartner. Robert is currently the CISO and Evangelist for GuidePoint Security’s vSOC managed services where he is focused on product development, partnerships, and sales enablement.
S12 – Splunk | Discovering the Unknown: Demystifying User Behavior Analytics (UBA)
Emily Henriksen | Senior Sales Engineer
A SIEM leveraging threat intelligence only catches many of the known threats but insider threats and threats unknown cannot be identified by traditional detection methods. Unknown threats require unsupervised machine learning to baseline user and device behavior and singe out anomalous events. These anomalies can then be aggregated into actionable threats for the security team to review.
Emily Henriksen currently works at Splunk as a Senior Sales Engineer covering the Northeastern United States. Splunk is one of the top SIEM and Data Analysis tools on the market. Her career has been focused entirely on Security with previous Sales Engineering experience at Carbon Black and LogRhythm. She holds a Bachelor’s degree in Computer Science from University of Massachusetts Amherst.
S13 – Sophos
S14 – Qadium | Knowing your Network: Tracking your Assets in the Age of Machine-speed Attacks
Dr. Marshall Kuypers | Head of Cyber Risk
In this talk, we’ll discuss how attackers have begun conducting Internet-scale attacks at machine speed by leveraging new scanning technologies. Qadium will present examples of how new classes of perimeter exposures are creating new risks, and show data on global Internet trends.
Dr. Marshall Kuypers is the Director of Cyber Risk at Qadium, an SF-based startup. He received his doctorate from Stanford, focusing on data-driven methods for quantifying cyber risk. Marshall was a fellow at the Center for International Security and Cooperation (CISAC) from 2014-2016 where he worked on projects ranging from policy to technical matters in computer security. Marshall has also modeled cyber risk for the Jet Propulsion Lab, and assessed supply chain risk in cyber systems with Sandia National Labs. He was also the Co-President of the Stanford Complexity Group while at Stanford.
S15 – CyberArk & Proofpoint | Detect, Prioritize and Block Attack Breach Escalation
Francis Yom | Senior Security Engineer, CyberArk
Tony DiMeo | Senior Systems Engineer, Proofpoint
Rapidly disrupt the most critical in-progress attacks; those involving privileged accounts.
Security professionals are overwhelmed with alerts that require manual analysis to validate and prioritize, opening a window of opportunity for attackers to exploit a system and gain access to one of the most effective tools an attacker can add to their arsenal, privileged access. Join CyberArk and Proofpoint for a joint session to demonstrate how Threat Response from Proofpoint, combined with CyberArk Privileged Access Security, provides real-time operational insights and policy-based response capabilities for rapid risk mitigation and remediation:
- Gain real-time threat insights using rich evidence collection for quick and effective investigation
- Preconfigure policies and controls to reduce risks related to privileged users and sensitive assets
- Isolate critical systems and quarantine user sessions to help prevent the spread of malware from vulnerable end-user devices
Francis Yom is a Senior Sales Engineer at Cyberark. He brings over 14 years of security software experience, and is responsible for driving sales and evangelizing Cyberark in New York. Francis joined Cyberark in 2018. Prior to joining Cyberark, Francis was a sales engineer at Malwarebytes, Novell, and e-Security. He is certified on both IT management and security, holding both ITIL and CISSP certifications as well as being an MCSE and a GSEC incident handler.
Tony DiMeo is a Senior Systems Engineer at Proofpoint, Inc., with over 15 years in the security industry. He has spent time as an IT professional at two local Rochester enterprise organizations, as well as being a technical sales professional over the last 10 years, providing consultative sales support and guidance to large enterprise customers.
S16 – Palo Alto Networks | Advanced & Frictionless Security in a Multi-Cloud Environment
Dave Iannacone | Senior Systems Engineer, Palo Alto Networks
For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help organizations gain a competitive edge.
As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service. This complexity can result in poor visibility and an increase in vulnerabilities without the appropriate security and compliance strategy in place. Join us to learn how to secure your cloud applications with advanced protections delivered with a frictionless approach.
Dave Iannacone is a Senior Systems Engineer with Palo Alto Networks where he designs, supports and educates clients about cybersecurity.
Dave has over 15 years of IT industry experience. He currently supports State, Local Government and Education throughout New York State. When not traveling around New York meeting with clients, Dave enjoys spending time with his family, and pursuing his hobby of homebrewing.