Build Better Defenses
October 29–30, 2017: Training
October 30–November 1, 2017: Tutorials & Conference
New York, NY

Sunday, 10/29/2017

9:00am

Add to your personal schedule
9:00am–5:00pm Sunday, 10/29/2017
Location: Clinton Level: Non-technical
James Arlen (Securosis)
James Arlen leads a hands-on exploration of techniques for protecting the cloud, with extensive labs in Amazon Web Services. The first day focuses on root account security, virtual networking security, IAM, and logging/monitoring; the second day covers leveraging PaaS services, using immutable infrastructure, and automating security controls. Read more.
Add to your personal schedule
9:00am–5:00pm Sunday, 10/29/2017
Location: Madison Level: Intermediate
Charles Givre (Booz Allen Hamilton), Jay Jacobs (BitSight Technologies)
Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. In this course, you’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data. Read more.
Add to your personal schedule
9:00am–5:00pm Sunday, 10/29/2017
Tools and processes
Location: Gibson Level: Beginner
Steven Wierckx (Toreon)
Toreon proposes a 2 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops with real live Use Cases are provided by Toreon. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling. Read more.

Monday, 10/30/2017

9:00am

Add to your personal schedule
9:00am–12:30pm Monday, 10/30/2017
Security usability
Location: Beekman Level: Intermediate
Amanda Berlin (Hurricane Labs)
Everyone talks about the cyberkill chain(tm). Along with it comes abundant misinformation and scare tactics. Instead of scaring you we'll focus on the most effective steps you can take to protect your organization from the vast majority of threats by breaking down the actions along with defensive mitigation and monitoring. Read more.
Add to your personal schedule
9:00am–12:30pm Monday, 10/30/2017
Teachable moments
Location: Sutton North Level: Beginner
Bart Miller (University of Wisconsin-Madison), Elisa Heymann (University of Wisconsin-Madison)
This tutorial is relevant to anyone wanting to learn about minimizing security flaws in the software they develop or manage. We share our experiences gained from performing vulnerability assessments of critical middleware. You will learn skills critical for software developers and analysts concerned with security. Read more.
Add to your personal schedule
9:00am–12:30pm Monday, 10/30/2017
Tools and processes
Location: Sutton South Level: Beginner
Ben Hall (Katacoda | Ocelot Uproar)
Docker offers a lot of advantages, simplifying both development and production environments. But there is still uncertainty around the security of containers. During this hands-on tutorial, Ben will share his experiences and help you investigate Docker and container security. Read more.
Add to your personal schedule
9:00am–12:30pm Monday, 10/30/2017
Teachable moments
Location: Regent Level: Advanced
Kevin Poniatowski (Security Innovation)
This workshop is designed to instruct participants how to decrease the time it takes to find common web vulnerabilities while also decreasing the risk of an OWASP Top 10 vulnerability making it into the production server by collecting useful data that will help participants focus on where the vulnerabilities are hiding. Bring a laptop. This is a hands-on event! Read more.

10:30am

10:30am–11:00am Monday, 10/30/2017
Location: Foyer
Morning break (30m)

12:30pm

12:30pm–1:30pm Monday, 10/30/2017
Location: Rhinelander
Lunch (1h)

1:30pm

Add to your personal schedule
1:30pm–5:00pm Monday, 10/30/2017
Tools and processes
Location: Beekman Level: Intermediate
Bhaskar Karambelkar (Ernst And Young)
This talk will go over the options available in R for data analysis as it relates to Information Security. We will focus on three key areas a) general introduction to R, b) statistical and machine learning with R, and c) data visualization with in R. This tutorial will enable a security researcher to add R to his/her tool belt and also familiarize with statistical/machine learning techniques. Read more.
Add to your personal schedule
1:30pm–5:00pm Monday, 10/30/2017
Tools and processes
Location: Sutton North Level: Intermediate
John Studarus (JHL Consulting), Cynthia Thomas (Midokura)
Using virtualization and SDN, software defined networking, traffic can be service chained through multiple security functions (WAF, DDOS, IDS/IPS) without the overhead and complexity of layer 3 networking. Using open source cloud security tools, this functionality will be demonstrated. Read more.
Add to your personal schedule
1:30pm–5:00pm Monday, 10/30/2017
Security analytics
Location: Sutton South Level: Beginner
Ido Safruti (PerimeterX), Amir Shaked (PerimeterX)
In this tutorial we will cover data analysis tools that any web security analyst should be familiar with in his daily work. Tools like ELK, BigQuery, python and helpful online services. These tools can help you dive into and analyze incidents on your web application and network, and help you get alerted when an attack starts. Read more.
Add to your personal schedule
1:30pm–5:00pm Monday, 10/30/2017
Bridging business and security
Location: Regent Level: Intermediate
Venky Anant (McKinsey and Company), Joy Smith (McKinsey and Company)
The lack of transparency between executive decisions and those who implement them can muddle the response to a fast-moving cyber crisis. This tutorial will simulate a crisis and elicit a response from both board/executive members and front-line responders in isolation, giving participants an opportunity to question, challenge, and ultimately improve the harmony between the respective approaches. Read more.

3:00pm

3:00pm–3:30pm Monday, 10/30/2017
Location: Foyer
Afternoon break (30m)

Tuesday, 10/31/2017

9:00am

Add to your personal schedule
9:00am–10:40am Tuesday, 10/31/2017
Location: Grand Ballroom
Rachel Roumeliotis (O'Reilly Media), Allison Miller (Google)
Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the first day of keynotes. Read more.

10:45am

10:45am–11:20am Tuesday, 10/31/2017
Location: Grand Ballroom Foyer + Mezannine
Coffee break (35m)

11:20am

Add to your personal schedule
11:20am–12:00pm Tuesday, 10/31/2017
Security usability
Location: Beekman Level: Non-technical
Bobby Filar (Endgame), Rich Seymour (Endgame)
The security industry continues to struggle with alert fatigue as the talent shortage grows. Security has yet to fully embrace the power of UX to help security workers do more with less. In response to our UX research, we developed a chatbot, combining machine learning within an intuitive UI to expedite data search and discovery, enhancing detection and response to security threats. Read more.
Add to your personal schedule
11:20am–12:00pm Tuesday, 10/31/2017
Security analytics
Location: Sutton North Level: Beginner
Yinglian Xie (DataVisor)
Using research from more than one billion users, 500 billion events and 50 million malicious accounts collected from global online services, we will share some of the sophisticated attack techniques being used by modern day online criminals and demonstrate how these types of attacks can be detected and mitigated by leveraging artificial intelligence. Read more.
Add to your personal schedule
11:20am–12:00pm Tuesday, 10/31/2017
Teachable moments
Location: Sutton South Level: Intermediate
Christie Terrill (Bishop Fox)
How do you respond when your company's executives want you to go from an understaffed security team to a world-class security program in an unreasonably short timeframe? This case study describes exactly what I did well (and could have done better) at a prominent healthcare provider to meet the charge, manage expectations, and build a security program to be proud of in only 3 (read: 9) months. Read more.
Add to your personal schedule
11:20am–12:00pm Tuesday, 10/31/2017
Bridging business and security
Location: Regent Level: Non-technical
Yong-Gon Chon (Focal Point Data Risk), Wade Baker (Cyentia Institute)
Researchers interviewed board members and senior cybersecurity professionals to find the truth around a timely theme: The sound bite is “Cybersecurity is now a boardroom issue.” But what have security experts been telling boards to care about? Is the message being received? Are CISOs, security vendors and others flagging the right issues? What are the signs of progress or stubborn divides? Read more.

12:00pm

Add to your personal schedule
12:00pm–1:15pm Tuesday, 10/31/2017
Location: Americas Hall 1 & 2
Birds of a Feather (BoF) sessions provide face-to-face exposure to those interested in the same projects and concepts. BoFs can be organized for individual projects or broader topics (best practices, open data, standards, etc.). BoFs are entirely up to you. We post your topic and provide the space and time. You provide the engaging topic. Read more.

1:15pm

Add to your personal schedule
1:15pm–1:55pm Tuesday, 10/31/2017
Bridging business and security
Location: Beekman Level: Intermediate
Gwen Betts (Komand)
User experience is often a forgotten piece in the broader information security puzzle. Security is difficult, especially for the average user. Many users believe it’s already baked into the day-to-day software products they use, which isn’t always the case. In this session, I’ll cover how a design-driven approach to security products and measures can drive greater adoption and acceptance. Read more.
Add to your personal schedule
1:15pm–1:55pm Tuesday, 10/31/2017
Security analytics
Location: Sutton North Level: Beginner
Quiessence Phillips (Barclays)
In a daily fight to secure organizations, Security Analysts are inundated with a massive log set (if one is so fortunate), but with that comes a high signal to noise ratio. Increase your signal by adding context to your logs. Come hear about the type of context that could be added and the value of its addition. Read more.
Add to your personal schedule
1:15pm–1:55pm Tuesday, 10/31/2017
Teachable moments
Location: Sutton South Level: Non-technical
Nir Valtman (NCR Corporation)
This presentation takes you out of the comfort zone of the best practices and guides you through the day to day challenges to secure 100 products, while considering the procedural and technological challenges, as working with diverse software architectures, multiple development languages/platforms, variety of development lifecycles, injecting security into continuous integration/delivery etc. Read more.
Add to your personal schedule
1:15pm–1:55pm Tuesday, 10/31/2017
Bridging business and security
Location: Regent Level: Intermediate
Ruchi Shah (Google inc), Michael Sinno (Google inc)
From Alphabet to startup to established company - these are the top 15 things that Google Security worries about when we acquire or start a company. We will discuss how we address them in order to protect the entity as well as Google. Read more.

2:10pm

Add to your personal schedule
2:10pm–2:50pm Tuesday, 10/31/2017
Tools and processes
Location: Beekman Level: Non-technical
Danielle Leong (GitHub)
Online safety has become a huge problem in the world of oversharing. Real name policies, automatic geolocation tracking, and photo tagging increase user adoption rates, but these features can be quickly abused by bad actors. This talk will discuss how to apply a "consent filter" to product decisions to make a safer user experience and to help protect your most vulnerable users from harm. Read more.
Add to your personal schedule
2:10pm–2:50pm Tuesday, 10/31/2017
Security analytics
Location: Sutton North Level: Intermediate
Michael Roytman (Kenna Security)
Security is all about reacting, it's time to make some predictions. We use Amazon Web Services new Machine Learning platform to train a binary classifier for vulnerabilities, allowing us to predict whether or not a vulnerability will become exploitable. We'll generate over 20,000 predictions on the remainder of the vulnerabilities, issuing a weather forecast for VM teams. Read more.
Add to your personal schedule
2:10pm–2:50pm Tuesday, 10/31/2017
Teachable moments
Location: Sutton South Level: Beginner
Devina Dhawan (Etsy)
Learn how to improve your existing AWS infrastructure by bringing in external tooling, mastering aws-cli, and improving communication with the rest of your organization. Read more.
Add to your personal schedule
2:10pm–2:50pm Tuesday, 10/31/2017
Bridging business and security
Location: Regent Level: Beginner
Josiah Dykstra (Department of Defense)
Every day, people considering security solutions and products are misled, manipulated, or deceived by real and bogus science, wild claims, and marketing trickery. Using real examples, this talk will teach new techniques and questions to support healthy skepticism and help you spot and challenge these tactics before you buy or build another security product. Read more.

2:50pm

2:50pm–3:50pm Tuesday, 10/31/2017
Location: Grand Ballroom Foyer + Mezannine
Afternoon break (1h)

3:50pm

Add to your personal schedule
3:50pm–4:30pm Tuesday, 10/31/2017
Security usability
Location: Beekman Level: Non-technical
Michee Smith (Google)
Since the launch of the Email Encryption in Transit transparency report, Google has seen a 40%+ increase of encrypted e-mails going in and out of GMail. Can public accountability really be used to drive the adoption of security practices inside a company and the industry at large? Come learn about the successes and pitfalls of sharing this type of data and how to approach similar endeavors. Read more.
Add to your personal schedule
3:50pm–4:30pm Tuesday, 10/31/2017
Security analytics
Location: Sutton North Level: Intermediate
Alex Pinto (Niddel)
This session will propose an automation model by that elevating the quality of data available to automation processes we can efficiently simulate "analyst intuition" and significantly augment the human analysts. We will present a Hunting Automation Maturity Model (HAMM) that organizes these techniques around capability milestones, including internal and external context and analytical tooling. Read more.
Add to your personal schedule
3:50pm–4:30pm Tuesday, 10/31/2017
Teachable moments
Location: Sutton South Level: Non-technical
Pieter Ockers (Adobe)
Internal bug hunts, in which employees compete for prizes by finding and reporting security bugs, enable security teams to harness the creativity and problem-solving skills of the workforce while reducing security bugs in their applications. Bug hunts also promote a culture of security awareness by involving participants outside of the security team in a fun and challenging activity. Read more.
Add to your personal schedule
3:50pm–4:30pm Tuesday, 10/31/2017
Bridging business and security
Location: Regent Level: Intermediate
Jay Kelath (Dow Jones)
Legacy software in big companies is a security nightmare. This case study details how we successfully integrated security into the agile software development cycle, while dealing with problems in legacy architectures. Automation, Tools, Training, Reporting, Processes and the executive salespitch will be discussed as some of the key areas for a successful rollout of mature, self-sustaining program Read more.

4:45pm

Add to your personal schedule
4:45pm–5:25pm Tuesday, 10/31/2017
Security usability
Location: Beekman Level: Intermediate
Jason Hoenich (Sony Pictures Entertainment)
This presentation will discuss in-depth the risks related to delivering poor awareness programs versus adapting to changing needs and demands of the attack surface and learning behaviors of humans. Incorporating the key fundamental behavioral psychology nodes for establishing true culture change, and making the experience of the end user will move our programs to Security Awareness 2.0. Read more.
Add to your personal schedule
4:45pm–5:25pm Tuesday, 10/31/2017
Security analytics
Location: Sutton North Level: Intermediate
Thomas Mathew (Cisco Umbrella (OpenDNS)), Dhia Mahjoub (Cisco Umbrella (OpenDNS))
Open source datasets contain of wealth of information that can aid security practitioners. However, large public datasets are usually unstructured and noisy - posing difficulties for researchers trying to extract useful information. This talk will show how we took an SSL scan dataset and through the use of graph and clustering analytics identified domains associated with the ZBot botnet. Read more.
Add to your personal schedule
4:45pm–5:25pm Tuesday, 10/31/2017
Security usability
Location: Sutton South Level: Intermediate
Kelly Harrington (Google)
This talk will focus on how web security initiatives work with webmasters to clean up malware attacks and fix other security issues that affect the web ecosystem. In particular, we will cover challenges around the differing experience levels of webmasters from novices to experts, as well as striking the right balance between providing help to site owners and protecting data from bad actors. Read more.
Add to your personal schedule
4:45pm–5:25pm Tuesday, 10/31/2017
Teachable moments
Location: Regent Level: Non-technical
This session will discuss how, even through organizational shifts, divisions, and differences, how you can leverage the strength's of both security experts and privacy experts to constantly deliver what customers will expect from you. Read more.

Wednesday, 11/01/2017

9:00am

Add to your personal schedule
9:00am–10:40am Wednesday, 11/01/2017
Location: Grand Ballroom
Rachel Roumeliotis (O'Reilly Media), Allison Miller (Google)
Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the second day of keynotes. Read more.

10:45am

10:45am–11:20am Wednesday, 11/01/2017
Location: Grand Ballroom Foyer + Mezannine
Coffee Break (35m)

11:20am

Add to your personal schedule
11:20am–12:00pm Wednesday, 11/01/2017
Security analytics
Location: Beekman Level: Intermediate
brian candlish (telstra), Christian Teutenberg (Telstra)
the presentation details a security incident we (Telstra) suffered as part of an acquisition and the ongoing year of incident response that followed to evict the intruders Read more.
Add to your personal schedule
11:20am–12:00pm Wednesday, 11/01/2017
Tools and processes
Location: Sutton North Level: Beginner
At last, the first public bug bounty program run by a civilian agency has launched. This session covers that journey, including policy, authorization, solicitation, proposals, interviews, award, and launch. From concept to lessons learned, this session will give an overview of the procurement process, policy changes, lessons learned, and everything in between. Read more.
Add to your personal schedule
11:20am–12:00pm Wednesday, 11/01/2017
Tools and processes
Location: Sutton South Level: Intermediate
Alexandra Ulsh (Mapbox)
Launching a bug bounty program is hard. Running and maintaining a successful bug bounty program is even harder. Using real world stories of both failure and success, this session will share how our security team used tools, processes, automation, and empathy to decrease response time by 90%, reduce noise, and improve average report quality for our bug bounty program. Read more.
Add to your personal schedule
11:20am–12:00pm Wednesday, 11/01/2017
Bridging business and security
Location: Regent Level: Non-technical
Jen Ellis (Rapid7)
It’s widely held in security that most organizations will fall victim to some kind of breach or significant security incident at some point. This session will help attendees weather that storm by outlined the considerations for successful crisis communications. We will cover the key tenets of good communications strategies, from preparation to dealing with press, and everything in between. Read more.

12:00pm

Add to your personal schedule
12:00pm–1:15pm Wednesday, 11/01/2017
Location: Americas Hall 1 & 2
Birds of a Feather (BoF) sessions provide face-to-face exposure to those interested in the same projects and concepts. BoFs can be organized for individual projects or broader topics (best practices, open data, standards, etc.). BoFs are entirely up to you. We post your topic and provide the space and time. You provide the engaging topic. Read more.

1:15pm

Add to your personal schedule
1:15pm–1:55pm Wednesday, 11/01/2017
Security usability
Location: Beekman Level: Intermediate
Christoph Hartmann (Chef Software Inc), Dominik Richter (Chef Software Inc)
Best-practices for server hardening and patching have been in place for decades. Nevertheless, it is still very cumbersome to enforce those rules continuously and many servers are still unsecured in 2016. To cope with the increased pace, we need tools that enable is to to implement compliance automation. Read more.
Add to your personal schedule
1:15pm–1:55pm Wednesday, 11/01/2017
Security usability
Location: Sutton North Level: Non-technical
Jessy Irwin (Jessysaurusrex)
When a major security incident hits the news, security practitioners are quick to place the blame on users for being the weakest link in security. This talk will debunk the myth that users are the root of all failure, and explore how security teams can even the playing field to transform people into extra line of defense when we need them the most. Read more.
Add to your personal schedule
1:15pm–1:55pm Wednesday, 11/01/2017
Security usability
Location: Sutton South Level: Beginner
Neal Mueller (Google)
Most companies today use some variation of the firewall, or “fortress,” model for perimeter security. This model assumes everything on the outside is dangerous, and everything in the inside is safe. It worked well when employees worked at the HQ primarily did their work on desktop computers. Google’s BeyondCorp is a new model for our new reality of dispersed BYOD workforce. Read more.
Add to your personal schedule
1:15pm–1:55pm Wednesday, 11/01/2017
Bridging business and security
Location: Regent Level: Intermediate
Kyle Randolph (Optimizely)
It's a huge ask of trust for an established company to trust a startup and open up an integration with their data and infrastructure. This talk will share great learnings from building an enterprise SaaS startup where security went from zero to paramount as the company scaled- How to meet customers' needs, how to sell security to management, and how to build security into engineering. Read more.

2:10pm

Add to your personal schedule
2:10pm–2:50pm Wednesday, 11/01/2017
Bridging business and security
Location: Beekman Level: Non-technical
Sara Mitchell (Carnegie Mellon University)
This paper proposes a model that focusses on how the APTs allocate and utilize their resources. The assumption is that in this allocation there is an optimal way to operate to either attack or defend infrastructure. This model strives to explain the optimal resource allocation of APTs and targets based on the feedback loops present in SD. Read more.
Add to your personal schedule
2:10pm–2:50pm Wednesday, 11/01/2017
Bridging business and security
Location: Sutton North Level: Intermediate
Carole Fennelly (CFennelly Consulting)
The worst time to figure out how to respond to a security incident is when you’re in the middle of one. An effective Incident Response plan requires that policies, plans, people, technologies and processes be in place and tested *before* a security incident occurs. Read more.
Add to your personal schedule
2:10pm–2:50pm Wednesday, 11/01/2017
Tools and processes
Location: Sutton South Level: Beginner
Jack Naglieri (Airbnb), Austin Byers (Airbnb)
The advent of serverless technologies and infrastructure-as-code has changed how we build and deploy security services. Going serverless has empowered our team to create low-cost, scalable and secure services to protect our organization. Drawing from real-world experiences, we will share our tools and techniques for successfully building, deploying and debugging serverless security applications. Read more.
Add to your personal schedule
2:10pm–2:50pm Wednesday, 11/01/2017
Tools and processes
Location: Regent Level: Beginner
Ryan Lackey (ResetSecurity)
Travel computing security -- keeping your data and systems safe while traveling around the world, and keeping your home systems safe when you return -- has become a very timely topic, with laptop bans, border searches, and filtering popping up in countries around the world. However, this isn't an entirely new problem, just one we've never truly solved. Here's how to survive. Read more.

2:50pm

2:50pm–3:50pm Wednesday, 11/01/2017
Location: Grand Ballroom Foyer + Mezannine
Afternoon break (1h)

3:50pm

Add to your personal schedule
3:50pm–4:30pm Wednesday, 11/01/2017
Security usability
Location: Beekman Level: Non-technical
Kirstin Anderson (Warby Parker)
This talk will show how to dust-off your outdated incident response plan and turn it into an effective one, including how to create a cross-department response team and how to conduct actual game day exercises. You'll learn how to put the plan into practice and see how effective response ultimately serves to bring security closer with the rest of the business. Read more.
Add to your personal schedule
3:50pm–4:30pm Wednesday, 11/01/2017
Tools and processes
Location: Sutton North Level: Non-technical
Taylor Lobb (Adobe), Julia Knecht (Adobe)
Discover how a team of just two security analysts created a successful SPLC program by leveraging automation and establishing security ambassadors (champions) within the product engineering teams. This program has successfully scaled to support thousands of engineers due to the solid framework built on automation at its core. Read more.
Add to your personal schedule
3:50pm–4:30pm Wednesday, 11/01/2017
Teachable moments
Location: Sutton South Level: Beginner
Michael Horowitz (self employed)
Routers are a perfect target both because of the important role they play and the generally insecure way they are configured. This presentation will cover some interesting router bugs, configuring a router to be as secure as possible, testing a router and what to look for when buying a router. Read more.
Add to your personal schedule
3:50pm–4:30pm Wednesday, 11/01/2017
Bridging business and security
Location: Regent Level: Non-technical
Jim Gumbley (ThoughtWorks)
We want agile software delivery teams to “bake” security into the work they deliver every iteration. ‘Sensible Conversations’ is an open source, low-fi, visual, collaborative set of materials and workshops. We present the approach and some wider reflections about what does and doesn't work from our experiences working with a variety of public and private sector software delivery teams. Read more.

4:45pm

Add to your personal schedule
4:45pm–5:25pm Wednesday, 11/01/2017
Security analytics
Location: Beekman Level: Intermediate
Peleus Uhley (Adobe Systems, Incorporated)
An accurate understanding of your public network and application exposure is necessary for everything from scalable security automation to red team exercises. Although, it can be overwhelming trying to keep up with a large organization. This presentation discusses techniques for leveraging freely available data to create complete network graphs, track best practices, and identify security issues. Read more.
Add to your personal schedule
4:45pm–5:25pm Wednesday, 11/01/2017
Bridging business and security
Location: Sutton North Level: Non-technical
Users aren't just part of the problem, they are part of the solution. Creating a security culture takes more than security awareness training, it takes commitment from all parts of an organization. To improve security and better defend and respond to phishing attacks we not only need users to be vigilant, but to take an active part in helping manage security risk. Read more.
Add to your personal schedule
4:45pm–5:25pm Wednesday, 11/01/2017
Tools and processes
Location: Sutton South Level: Intermediate
Harry Sverdlove (Edgewise Networks)
In today's world of dynamic computing environments and advanced threats, the axiom "trust but verify" is not an effective strategy. The Zero Trust model forces you to rethink the way you secure your networks. In this session, we break down Zero Trust Networking into simple principles that can be applied to any organization to both improve your security posture and simplify its management. Read more.
Add to your personal schedule
4:45pm–5:25pm Wednesday, 11/01/2017
Bridging business and security
Location: Regent Level: Intermediate
Michele Iacovone (Intuit)
In this session, Michele Iacovone, SVP and CISO at Intuit will explore best practices to securely move customer data to the cloud through AWS, while also keeping the interest of your customers top of mind. Michele will also discuss how companies can successfully and securely harness the power of the cloud to ensure the speed of innovation. Read more.