Company: Arbor Networks
Company Description: Arbor Networks, the security division of NETSCOUT, deliver the most scalable and deployable network traffic security solutions to empower security teams to detect and confirm advanced threat campaigns faster and smarter than before. NETSCOUT SYSTEMS, INC. is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding networks.
Session Title:Why 2017 is the Year of the Toaster
Session Description: In the breakout session hosted by Arbor Networks, you will be provided insights into Arbor’s Worldwide Infrastructure Report. Attack motivations are changing, and the use of IoT devices are playing an every-growing role in corporate shakedown. Listen to what leading Enterprise and Service Providers are seeing in their environments today, and what they are doing to address these advancing threats to their business.
Product Categories:Cloud Protection, Incident Response, Threat Intelligence, Pen Testing / Red Teaming / Threat Hunting, Network Security, Enterprise Risk Management
Company Description: Bayshore’s breakthrough technologies enable safe and secure integration of IT and OT networks, systems, data, and infrastructure. They address the IT/OT Convergence Gap by securing the gateway between operational and business networks - offering visibility, control, and protection for Operational Technology, and transforming operational data for IT applications.
Session Title: Five Actions for Improving Operational Technology Security
Session Description: This interactive session focuses on protecting critical OT infrastructure against cyber threats. A live demonstration shows why OT uniquely requires visibility, control, and active protection to ensure safety and security when connecting physical assets to business networks. Case studies explore benefits, risks, and insightful best practices for successful IT/OT convergence.
Product Categories: Cloud Protection, Incident Response, Security Forensics, Threat Intelligence, Network Security, Endpoint Protection, SIEM, Vulnerability Assessment and Management, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Encryption, Enterprise and IT Compliance
Company Description: CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.
Session Title: Protect Your King: The Key to Maintaining Control of Your Business
Session Description: Cyber attacks targeting Domain Controllers (and Active Directory) are devastating. Once they are compromised, trust in the IT infrastructure is completely broken. Learn about increasingly common types of attacks, like Golden Ticket, and how privileged account security combining proactive protection and threat detection can thwart attackers before complete network takeover is accomplished.
Product Categories: Network Security, Endpoint Protection, Cloud Protection, Threat Intelligence, Threat Modeling
Company Description: SentinelOne was founded by a group of international defense and intelligence experts who saw the need for a dramatic new approach to endpoint protection. Today, our growing global team remains dedicated to constant innovation. SentinelOne’s breakthrough platform unifies prevention, detection, and response, driven by machine learning and intelligent automation. SentinelOne EPP is certified as an antivirus replacement, recognized by Gartner and NSS Labs for its disruption, and trusted by the world’s most forward-thinking companies to protect their business.
Session Title: Next Generation Endpoint Protection
Session Description: In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Product Categories: Incident Response, Security Forensics, Threat Intelligence, Network Security, Endpoint Protection, Vulnerability Assessment and Management, Security Awareness, Enterprise Risk Management, Threat Modeling
Company Description: WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. Through a combination of technology, over a decade of intelligence metrics, and the judgment of people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry.
Session Title: Building Vulnerability Management into your AppSec Program
Session Description:How to employ and combine technology, human intelligence, risk analysis, metrics, and prioritization into your vulnerability management program by embedding Application Security within your development lifecycle.
Product Categories: Mobile & Wireless Controls, Cloud Protection, Threat Intelligence, Pen Testing/Red Teaming/Threat Hunting, Endpoint Protection, Vulnerability Assessment & Management, Security Awareness, Enterprise Risk Management, Application Development & Testing, Data Loss Prevention, Enterprise & IT Compliance, Business Continuity
Company Description: Cisco Stealthwatch delivers in-depth visibility for detecting suspicious network behaviors. It collects and analyzes NetFlow to provide a complete view into your network traffic and users. This intelligence dramatically improves threat detection, incident response, network segmentation, and forensics. With Stealthwatch, you are better equipped to combat today’s most stealthy attackers.
Session Title: Network Behavior Anomalies and Visibility
Session Description: Monitor, detect, analyze, and respond to advanced threats. With comprehensive, scalable enterprise visibility, you can gain real-time awareness of traffic. From distant branches and remote users to the critical information in your data centers, Stealthwatch helps you monitor network activity continuously.
Session Product Categories: Incident Response, Security Forensics, Threat Intelligence, Pen Testing ? Red Teaming / Threat Hunting, Network Security, Data Loss Prevention
Company Description: Comodo is a global innovator and developer of cybersecurity solutions, founded on the belief that every digital transaction requires a layer of trust and security. Through Comodo’s digital certificate leadership, IT management solutions and advanced endpoint security technology, enterprises rely on Comodo to authenticate, validate and secure their IT environments.
Session Title: Endpoint Security Beyond Machine Learning: Default Allow vs Default Deny Postures
Session Description: Given the growing “undetectable” nature of targeted threats, “next gen” endpoint protection (EPP) using AI/machine learning along with endpoint detection and response (EDR) are all the rage. Most EPP solutions are simply innovations on detection using an antiquated “Default Allow” approach, while EDR solutions detect what’s not prevented. The result has higher security costs, more user experience interruptions, and ultimately more false positives masking breaches. This session compares “Default Allow” and “Default Deny” postures and explains how the legacy trade-off between endpoint security and usability are disappearing. The session provides the latest industry analyst data supporting the need to unify EPP and EDR strategies, and shares how a Default Deny posture can provide unified endpoint security with superior usability.
Product Categories:Mobile and Wireless Controls, Incident Response, Security Forensics, Pen Testing / Red Teaming / Threat Hunting, Endpoint Protection, Enterprise Risk Management
Company: Contrast Security
Company Description: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. More accurate and effective than out-moded legacy security measures, Contrast Security is a completely new approach to application security – the world's first comprehensive platform for protecting enterprise applications and APIs from within. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate analysis and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches and defeat hackers. Only Contrast secures the entire software lifecycle by exposing vulnerabilities during app development and blocking attacks during operation.
Session Title: Secure your Web Applications with IAST and RASP using Deep Security Instrumentation
Session Description: Applications are the number one attack surface for enterprises. However, traditional testing and protection tools such as SAST, DAST and WAFs fall short in today’s rapidly evolving world of Cloud, Containers, Agile, Devops, and Microservices. In this session, you will learn about the industry standard tools for the new software economy, Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP), and how Contrast Security can help provide automatic testing and protection that is highly accurate and continuous throughout the application lifecycle.
Session Product Categories:Vulnerability Assessment and Management, Application Development and Testing
Company Description: Cynet is a pioneer in advanced threat detection and response. The Cynet 360 platform simplifies security by providing one rapid, easily integrated solution for Endpoint Detection & Response, UBA, Network Analysis, File Analysis, Deception, Threat Intelligence, Forensics, Incident Response, 24/7 Monitoring and more.
Session Title: Simple Security is Effective Security
Session Description: Your team requires a comprehensive set of tools, capabilities and expertise to protect the organization from threats. Traditionally these are provided by disparate technologies and services from various providers which don’t integrate and make the job more complex. Cynet 360 is a comprehensive platform which provides, prevention, detection, forensics, response, UBA and deception all in one comprehensive integrated system. Engineered to simplify. Deployed for precise detection and response.
Product Categories: Incident Response, Security Forenics, Threat Intelligence, Threat Hunting, Deception, Endpoint Security, SIEM, Vulnerability Assessment and Management, Enterprise Risk Management, Data Loss Prevention, Business Continuity, Enterprise & IT Compliance
Company Description:Lumeta platforms provides critical cyber situational awareness that helps security and network teams prevent breaches by offering unmatched discovery of known, unknown and rogue network infrastructure, real-time network and endpoint monitoring and segmentation analytics for dynamic network elements, endpoints, virtual machines, and cloud-based infrastructure.
Session Title: Endpoint Vendor Blind spots and Network Visibility Gaps in Preventing Breaches.
Session Description: The vendor landscape is overly focused on KNOWN “network connected” endpoints, the perfect opportunity for attackers to exploit. Lumeta can show you how to find and monitor the large percentage of physical and virtual endpoints and networks in real-time that are often “in the shadows”...unknown, unmanaged and often unprotected.
Product Categories: Network Security, Vulnerability Assessment, Endpoint Protection, Security Forensics, Cloud Protection
Company Description: Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess™, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.
Session Title: Enhance Security While Reducing Cost and Complexity
Session Description: Vidder turns open networks into trusted systems by reducing complexity and cost while enhancing protection. Combing Software Defined Perimeter technology with deep trust assessment, visibility and control, the Company’s PrecisionAccess™ re-invents access control for uses cases which include network access control, remote/fieldworker access, segmentation and cloud isolation.
Product Categories: Cloud Protection, threat Intelligence, Network Security, Endpoint Protection, Identity and Access Management, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Encryption, enterprise and IT Compliance
Company Description: Headquartered in Sunnyvale, CA, SafeBreach is a pioneer in the emerging category of continuous security validation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture to quantify risks and validate security controls. SafeBreach is funded by Sequoia Capital, Deutsche Telekom Capital, HPE and investor Shlomo Kramer.
Session Title: Shall We Play a Hacker? Simulating the Adversary for Better Security
Session Description: The biggest problem of the security industry today is that despite $80B in annual cybersecurity spend, we still don’t know whether our defenses can stand up to a breach. How can we work smarter by putting ourselves in our adversary’s footsteps? How can we proactively identify critical gaps in security defenses? In this session, we will present a new technology that “simulates” hacker breach methods to continuously quantify risks, validate security controls and challenge your SOC teams. Join us to explore insights from real world deployments and the Hacker’s Playbook to better secure your organization.
Product Categories: Cloud Protection, Incident Response, Threat Intelligence, Pen Testin / Red Teaming / Threat Hunting, Network Security, Endpoint Protection, SIEM, Security Awareness, Enterprise Risk Management, Data Loss Prevention, Enterprise and IT Compliance, Threat Modeling
Company Description: SECDO is the first preemptive incident response solution, slashing incident response time to seconds. Gain unmatched historical thread-level endpoint visibility, automatically investigate any alert and visualize the forensic timeline and attack chain back to the root cause. Then, rapidly and surgically respond and remediate on any endpoint or server without impacting business productivity.
Session Title: Preemptive Incident Response – the End of Alert Triage
Session Description: Every day, thousands of alerts pour over cyber defense ramparts. False positives attract return fire, misdirecting the critical response-work of analysts. SOC teams must resort to inefficient triage just to cope with the alert volumes and cannot focus effective response on real threats. SECDO arms security teams with a new, effective methodology, Preemptive Incident Response, in the war against cyberattacks. It automatically validates alerts, accurately deflects false positives and empowers SOCs to address all real incidents, quickly resolving them with new, powerful investigation and response tools. In this session, you will learn how SECDO multiplies SOC effectiveness, enabling analysts to properly address every alert every day.
Product Categories: Incident Response, Security Forensics
Company Description: Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state, and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of efficiency in IT operations.
Session Title: Revolutionizing IT Security and Operations at Any Scale Through Instantaneous Visibility and Response
Session Description: New cutting-edge point products that can't operate instantly and at scale leaves enterprises vulnerable. As the world's only endpoint communication platform, Tanium provides instant capability to IT operations and security personnel to manage the enterprise and respond to attacks. This vastly different approach consolidates the endpoint footprint -- removing agents, rather than adding them -- each time an enterprise addresses a problem with Tanium.
Product Categories: Incident Response, Security Forensics, Pen Testing / Red Teaming / Threat Hunting, Endpoint Protection, Vulnerability Assessment and Management, Enterprise and IT Compliance
Two Center Plaza, Suite 500
Boston, MA 02108
© Copyright 2016 IANS.
All rights reserved.
Download our Mobile App for access to:
Build a Custom Agenda