Build Better Defenses
October 29–30, 2017: Training
October 30–November 1, 2017: Tutorials & Conference
New York, NY

Speakers

These leading defensive practitioners will share real-life successes (and failures), practical how-tos, and proven best practices that you can apply immediately. New speakers are added regularly. Please check back to see the latest updates to the agenda.

Filter

Search Speakers

Venky Anant joined McKinsey & Company’s Palo Alto office in 2011 and is a member of Digital McKinsey. His focus in the firm has been primarily around cyber-security, software/ startups and next generation infrastructure topics e.g., Cloud.

Venky also co-leads the healthcare CISO roundtable, a group of 50+ CISOs who meet regularly to discuss key security related topics.

Venky holds an M.B.A. from INSEAD, France, and a Masters in computer science.

Presentations

Cyber crises: Bridging the response gap between the board and the front line Tutorial

The lack of transparency between executive decisions and those who implement them can muddle the response to a fast-moving cyber crisis. This tutorial will simulate a crisis and elicit a response from both board/executive members and front-line responders in isolation, giving participants an opportunity to question, challenge, and ultimately improve the harmony between the respective approaches.

Kirstin Slevin is a Senior Technical Product Manager at Warby Parker, an affordable and socially-conscious eyewear company, where she works with the Network and Security team. She manages the roadmap for security and had led key initiatives and compliance efforts during her time at the company. She is passionate about bringing devops principles to security, balancing thoughtful security work with organizational agility.

Presentations

Creating an Incident Response Plan You Will Actually Use Session

This talk will show how to dust-off your outdated incident response plan and turn it into an effective one, including how to create a cross-department response team and how to conduct actual game day exercises. You'll learn how to put the plan into practice and see how effective response ultimately serves to bring security closer with the rest of the business.

James Arlen is Leviathan Security’s director of risk and advisory services. Over the past 20 years, James has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations and is currently involved in information security policy, process, and procedure improvements for internationally known manufacturing and financial organizations. James is a frequent speaker at industry conferences and a prolific contributor to standards bodies and media. James is also a contributing analyst with Securosis and has a recurring column on Liquidmatrix Security Digest. He is best described as an infosec geek, hacker, social activist, author, speaker, and parent.

Presentations

Pragmatic cloud security - AWS edition 2-Day Training

James Arlen leads a hands-on exploration of techniques for protecting the cloud, with extensive labs in Amazon Web Services. The first day focuses on root account security, virtual networking security, IAM, and logging/monitoring; the second day covers leveraging PaaS services, using immutable infrastructure, and automating security controls.

Wade Baker is a business leader and researcher with a deep-seated passion for using data to improve cybersecurity decisions, practice, and products. He is perhaps best known for creating and leading Verizon’s annual Data Breach Investigations Report series – widely regarded as a gold standard among technical and business professionals for understanding threats and prioritizing defenses. As co-founder of the Cyentia Institute, Wade leads custom research and analysis efforts for clients in security fields across different industries. Wade previously served as Vice President of Strategy and Risk Analytics at ThreatConnect, following many years at Verizon Enterprise Solutions, where he served as Managing Director and CTO of the company’s security solutions. He is a member of RSA Conference’s Advisory Board and member of the FAIR Institute’s Board of Directors. (https://www.linkedin.com/in/drwadebaker)

Presentations

Cyber Risk Decision-Making (and Disconnects): How Boardrooms View Digital Threats Session

Researchers interviewed board members and senior cybersecurity professionals to find the truth around a timely theme: The sound bite is “Cybersecurity is now a boardroom issue.” But what have security experts been telling boards to care about? Is the message being received? Are CISOs, security vendors and others flagging the right issues? What are the signs of progress or stubborn divides?

Amanda Berlin is an Information Security Architect for a consulting firm in Northern Ohio. She has spent over a decade in different areas of technology and sectors providing infrastructure support, triage, and design. Amanda has been involved in implementing a secure Payment Card Industries (PCI) process and Health Insurance Portability and Accountability Act (HIPAA) compliance as well as building a comprehensive phishing and awards-based user education program. She is the author for a Blue Team best practices book called “Defensive Security Handbook: Best Practices for Securing Infrastructure” through O’Reilly Media. She is a co-host on the Brakeing Down Security podcast and writes for several blogs.

Presentations

Reversing the Killchain - An Actionable Framework for Defending Against Common Threats Tutorial

Everyone talks about the cyberkill chain(tm). Along with it comes abundant misinformation and scare tactics. Instead of scaring you we'll focus on the most effective steps you can take to protect your organization from the vast majority of threats by breaking down the actions along with defensive mitigation and monitoring.

Gwen is a results-driven, user-centric designer that focuses on the end-to-end holistic picture. From agency to startup, she’s held design and creative management positions where her work has contributed to revenue and company growth. She is spirited about building brands and making them successful through the lens of experience design, via product, marketing, or services. Currently, as the Director of Customer Experience at Komand, she oversees both product design and marketing to achieve a compelling user experience across the brand. Gwen also values the role of UX in security measures and adoption, and is working to bridge the gap between UX and security products.

Presentations

Security and UX: Making the Digital World Safer, One Experience at a Time Session

User experience is often a forgotten piece in the broader information security puzzle. Security is difficult, especially for the average user. Many users believe it’s already baked into the day-to-day software products they use, which isn’t always the case. In this session, I’ll cover how a design-driven approach to security products and measures can drive greater adoption and acceptance.

Austin Byers joined Airbnb in 2016 as a software engineer on the security team. Since then, he has contributed to Airbnb’s encryption services and incident response tools, including Cipher and StreamAlert, respectively. Most recently, he designed and implemented YARA-as-a-Service (YaaS), a soon-to-be open-sourced serverless binary analysis pipeline.

Prior to his professional work, Austin was the first security graduate from the University of Chicago computer science program. His MS research focused on building a foundation for client-side web transparency by classifying JavaScript changes according to the scope of their impact.

Presentations

Going Serverless: Security Outside the Box Session

The advent of serverless technologies and infrastructure-as-code has changed how we build and deploy security services. Going serverless has empowered our team to create low-cost, scalable and secure services to protect our organization. Drawing from real-world experiences, we will share our tools and techniques for successfully building, deploying and debugging serverless security applications.

Brian Candlish is a Security Researcher for Australia’s largest telecommunications company, who spends his days and nights making the internet a safer place. His interests in information security include attack and detection techniques, intelligence and “active defence”. He enjoys hunting adversaries on large corporate networks.

Presentations

inside an active APT incident response Session

the presentation details a security incident we (Telstra) suffered as part of an acquisition and the ongoing year of incident response that followed to evict the intruders

Yong-Gon Chon has more than 20 years of experience building and leading global security and risk management teams. Prior to serving at Focal Point, he led the cyber security division of Kratos Defense and Security Solutions after the successful acquisition of SecureInfo Corporation, where he served as Chief Technology Officer. He has also held senior leadership positions across cybersecurity organizations, executing professional services for Fortune 1000 and government clients. As a member of Focal Point’s board, Yong-Gon is responsible for all aspects of business growth and execution for one of the largest pure-play cyber services companies. He has served as an adjunct professor at The George Washington and Georgetown universities and holds a Bachelor of Science in Management from The George Washington University. (https://www.linkedin.com/in/ychon)

Presentations

Cyber Risk Decision-Making (and Disconnects): How Boardrooms View Digital Threats Session

Researchers interviewed board members and senior cybersecurity professionals to find the truth around a timely theme: The sound bite is “Cybersecurity is now a boardroom issue.” But what have security experts been telling boards to care about? Is the message being received? Are CISOs, security vendors and others flagging the right issues? What are the signs of progress or stubborn divides?

Tom Cignarella is the Director of Security Coordination Center for Adobe. In this position, he is responsible for security monitoring, incident response and threat intelligence for all Adobe products and services, as well as the Adobe enterprise.
Tom sets the strategy and builds out the framework for day-to-day operations for how teams monitor environments, investigate incidents, and communicate with internal stakeholders and customers. He was formerly the Director of Product Operations for Adobe’s CloudOps group and technical operations for Adobe eSign (now part of Adobe Document Cloud). Tom brings more than 20 years of technology experience to this role. Prior to joining Adobe, Tom held Technical Operations leadership positions at Limelight Networks, Clickability, Symantec, BEA, Autodesk, Ariba and Excite.

Presentations

Security & Privacy: Together in Good Times & Bad Session

This session will discuss how, even through organizational shifts, divisions, and differences, how you can leverage the strength's of both security experts and privacy experts to constantly deliver what customers will expect from you.

Devina currently works as a security engineer at Etsy – the craftiest of marketplaces – in Brooklyn, NY. In her spare time she works with many organizations to grow young engineers such as Girls Who Code, and Built by Girls.

Presentations

Securing Existing AWS Infrastructure Session

Learn how to improve your existing AWS infrastructure by bringing in external tooling, mastering aws-cli, and improving communication with the rest of your organization.

Kimber Dowsett is the Security Architect for 18F, a digital services agency based within the US Government’s General Services Administration, who secures cloud infrastructure architecture while also serving as the Chief Incident Responder for the 18F platform. She is passionate about privacy, encryption, and building user-driven technology for the public.

Recently named one of the 2017 Top Women in Cybersecurity by CyberScoop, Kimber’s background is in Information Security, Incident Response, Security Policy, and Penetration Testing. She is an avid admirer of Chiroptera and is a connoisseur of comic books and video games.

Presentations

The First Civilian Agency Public Bug Bounty Program Session

At last, the first public bug bounty program run by a civilian agency has launched. This session covers that journey, including policy, authorization, solicitation, proposals, interviews, award, and launch. From concept to lessons learned, this session will give an overview of the procurement process, policy changes, lessons learned, and everything in between.

Dr. Josiah Dykstra is a Senior Researcher at the Department of Defense. He is known in the DoD and forensics communities for his work on network security, intrusion detection, malware analysis, digital forensics, and cloud computing. Dykstra received his PhD in Computer Science from the University of Maryland, Baltimore County, researching the technical and legal challenges of digital forensics for cloud computing. He is a winner of the 2017 Presidential Early Career Award for Scientists and Engineers for his work in cloud forensics. Dr. Dykstra is the author of the 2016 O’Reilly book, “Essential Cybersecurity Science.”

Presentations

She Blinded Me With Science: Understanding Misleading, Manipulative, and Deceptive Cybersecurity Session

Every day, people considering security solutions and products are misled, manipulated, or deceived by real and bogus science, wild claims, and marketing trickery. Using real examples, this talk will teach new techniques and questions to support healthy skepticism and help you spot and challenge these tactics before you buy or build another security product.

Jen Ellis is the vice president of community and public affairs at Rapid7, leading provider of analytics for security and IT operations. In this role, Jen’s primary focus is on building productive collaboration between those in the security community and those operating outside it. She works extensively with security researchers, technology providers and operators, and various government entities to help them understand and address cybersecurity challenges. She believes effective collaboration is our only path forward to reducing cybercrime and protecting consumers and businesses. She has testified before Congress and spoken at a number of security industry events including SXSW, RSA, Derbycon, Shmoocon, SOURCE, UNITED, and various BSides.

Presentations

Weathering the Storm: The Art of Crisis Communications Session

It’s widely held in security that most organizations will fall victim to some kind of breach or significant security incident at some point. This session will help attendees weather that storm by outlined the considerations for successful crisis communications. We will cover the key tenets of good communications strategies, from preparation to dealing with press, and everything in between.

Carole Fennelly is a freelance Information Security Management consultant in the Greater NYC area. Carole has over 35 years of hands-on experience in the Information Security and Technology fields and has authored several industry-standard security benchmarks based on her extensive experience in operating system platforms and security practices. As a consultant, Carole has defined security strategies and developed policies and procedures to implement strategies at numerous Fortune 500 clients in the NYC area.

Presentations

Incident Response: From IT to Business Session

The worst time to figure out how to respond to a security incident is when you’re in the middle of one. An effective Incident Response plan requires that policies, plans, people, technologies and processes be in place and tested *before* a security incident occurs.

Bobby Filar (@filar) is a Senior Data Scientist working on intelligent assistants and malware classification at Endgame.

Prior to joining Endgame, Bobby worked on various natural language understanding problems, including inference, conversational interfaces and topic modeling at a research nonprofit.

Bobby has given talks at several industry conferences, including AISec on Adversarial Machine Learning and PyData on conversational interfaces.

Presentations

Security + Design * Data Science: A Bot Story Session

The security industry continues to struggle with alert fatigue as the talent shortage grows. Security has yet to fully embrace the power of UX to help security workers do more with less. In response to our UX research, we developed a chatbot, combining machine learning within an intuitive UI to expedite data search and discovery, enhancing detection and response to security threats.

Charles Givre is an unapologetic data geek who is passionate about helping others learn about data science and become passionate about it themselves. For the last five years, Charles has worked as a data scientist at Booz Allen Hamilton for various government clients and has done some really neat data science work along the way, hopefully saving US taxpayers some money. Most of his work has been in developing meaningful metrics to assess how well the workforce is performing. For the last two years, Charles has been part of the management team for one of Booze Allen Hamilton’s largest analytic contracts, where he was tasked with increasing the amount of data science on the contract—both in terms of tasks and people.

Even more than the data science work, Charles loves learning about and teaching new technologies and techniques. He has been instrumental in bringing Python scripting to both his government clients and the analytic workforce and has developed a 40-hour Introduction to Analytic Scripting class for that purpose. Additionally, Charles has developed a 60-hour Fundamentals of Data Science class, which he has taught to Booz Allen staff, government civilians, and US military personnel around the world. Charles has a master’s degree from Brandeis University, two bachelor’s degrees from the University of Arizona, and various IT security certifications. In his nonexistent spare time, he plays trombone, spends time with his family, and works on restoring British sports cars.

Presentations

Data analysis and machine learning for cybersecurity 2-Day Training

Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. In this course, you’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data.

Jim is a software consultant with a range of experiences in finance, public sector and healthcare. For the last few years he’s been focussing on improving information security outcomes in agile and lean development projects for ThoughtWorks in London, UK.

Presentations

Sensible Conversations about Security Session

We want agile software delivery teams to “bake” security into the work they deliver every iteration. ‘Sensible Conversations’ is an open source, low-fi, visual, collaborative set of materials and workshops. We present the approach and some wider reflections about what does and doesn't work from our experiences working with a variety of public and private sector software delivery teams.

Ben Hall is the founder of Ocelot Uproar, a company focused on building products loved by users. Ben has worked as a systems administrator, tester, and software developer and launched several companies. He still finds the time to publish books and speak at conferences. Ben enjoys looking for the next challenges to solve, usually over an occasional beer. Ben recently launched Katacoda, an online learning environment for developers that helps break down the barriers to learning new technologies such as Docker and containers.

Presentations

Applying Container and Docker Security Tutorial

Docker offers a lot of advantages, simplifying both development and production environments. But there is still uncertainty around the security of containers. During this hands-on tutorial, Ben will share his experiences and help you investigate Docker and container security.

Kelly Hope Harrington is a senior software engineer on the Safe Browsing team at Google, where she focuses on detection of web-based threats and outreach to webmasters. Kelly holds a BS in computer science from Carnegie Mellon University, where she took a special interest in computer security and linguistics.

Presentations

Sharing is Caring: Empowering Webmasters for a Safer Web Session

This talk will focus on how web security initiatives work with webmasters to clean up malware attacks and fix other security issues that affect the web ecosystem. In particular, we will cover challenges around the differing experience levels of webmasters from novices to experts, as well as striking the right balance between providing help to site owners and protecting data from bad actors.

Christoph Hartmann is a lead engineer at Chef and a founder who spent the last decade building complex software and infrastructure systems. Previously, Christoph was responsible for automation at the innovation laboratory at Deutsche Telekom and created effective solutions managing the future their core networks. He is the cofounder of InSpec, Chef Compliance, and the dev-sec.io project.

Presentations

DevSec: Continuous Compliance and Security with InSpec Session

Best-practices for server hardening and patching have been in place for decades. Nevertheless, it is still very cumbersome to enforce those rules continuously and many servers are still unsecured in 2016. To cope with the increased pace, we need tools that enable is to to implement compliance automation.

Elisa Heymann is a senior scientist within the NSF Cybersecurity Center of Excellence at the University of Wisconsin and an associate professor at the Autonomous University of Barcelona, where she codirects the MIST software vulnerability assessment. Elisa was also in charge of the Grid/Cloud security group at the UAB and participated in two major European grid projects: EGI-InSPIRE and the European Middleware Initiative (EMI). Elisa’s research interests include security and resource management for grid and cloud environments. Her research is supported by the NSF, the Spanish government, the European Commission, and NATO.

Presentations

Secure Coding Practices and Automated Assessment Tools Tutorial

This tutorial is relevant to anyone wanting to learn about minimizing security flaws in the software they develop or manage. We share our experiences gained from performing vulnerability assessments of critical middleware. You will learn skills critical for software developers and analysts concerned with security.

For over 10 years Jason has been using normal words to help users understand risks on the internet. Jason spent 5 years in Pennsylvania working with Realtors, educating end users on how to be safer on the internet. For the last 5 years Jason has been in the entertainment industry in Los Angeles, working with very unique cultures from gaming (Activision) to The Walt Disney Company, to currently at Sony Pictures Entertainment. The core of everything is the ability to speak a common language with your audience, while telling engaging stories which connect with the listener.

Presentations

Shifting to Security Awareness 2.0 Session

This presentation will discuss in-depth the risks related to delivering poor awareness programs versus adapting to changing needs and demands of the attack surface and learning behaviors of humans. Incorporating the key fundamental behavioral psychology nodes for establishing true culture change, and making the experience of the end user will move our programs to Security Awareness 2.0.

Online at
www.michaelhorowitz.com/about.php

Presentations

Router Security Session

Routers are a perfect target both because of the important role they play and the generally insecure way they are configured. This presentation will cover some interesting router bugs, configuring a router to be as secure as possible, testing a router and what to look for when buying a router.

Jessy Irwin is a security expert who excels in translating complex cybersecurity issues into simple, relatable terms for non-technical audiences. In her work as an consultant, security executive, and former Security Empress at 1Password, she has taught consumers how to better protect themselves, their data and their identities online. Her current areas of interest include making security more accessible for the average person, advocating for strong privacy protections in education for students, building better models for digital security training, and building proactive security communications strategies for consumers, policymakers, small businesses and Fortune500 companies.

Irwin regularly writes and presents internationally on human-centric security, student privacy, and security communication at events including O’Reilly Security, RSA Conference, TechSummit Amsterdam, Infosec Southwest, and Shmoocon. Her work has appeared in CSO Online, VICE Broadly, Mashable, BuzzFeed, TechCrunch, and CNN.

Presentations

It's Us, Not Them: Exploring the Weakest Links in Security Session

When a major security incident hits the news, security practitioners are quick to place the blame on users for being the weakest link in security. This talk will debunk the myth that users are the root of all failure, and explore how security teams can even the playing field to transform people into extra line of defense when we need them the most.

Jay Jacobs is the senior data scientist at BitSight Technologies. Prior to joining BitSight, Jay spent four years as the lead data analyst for the Verizon Data Breach Investigations Report. Jay is the coauthor of Data-Driven Security, which covers data analysis and visualizations for information security, and hosts the Data-Driven Security and R World News podcast. Jay is also a cofounder of the Society of Information Risk Analysts and currently serves on its board of directors. Jay is also active in the R community; he coordinates his local R user group for the greater Minneapolis area and contributes to local events and functions supporting data analysis.

Presentations

Data analysis and machine learning for cybersecurity 2-Day Training

Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. In this course, you’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data.

I’m a information security data scientist with a passion for technology and all things data. I have over 18 years of IT experience of which more than 10 years in the information security (InfoSec) domain. Visual analytics as well as machine learning are paving the way for the next generation security tools and something I love working with on a day to day basis.
I have spoken at Washington DC tech meet-ups as well as tech conferences. I am a co-author of Verizon’s much revered Data Breaches Investigations Report (DBIR) 2015.

Presentations

R for Security Data Analytics Tutorial

This talk will go over the options available in R for data analysis as it relates to Information Security. We will focus on three key areas a) general introduction to R, b) statistical and machine learning with R, and c) data visualization with in R. This tutorial will enable a security researcher to add R to his/her tool belt and also familiarize with statistical/machine learning techniques.

Jay’s career as a security professional started 17 years ago with setting up honeypots to profile attackers. The many interesting challenges in the field led him to become a penetration tester to help businesses expose their security weaknesses, first in network security and then in application security. He found his stride in helping develop and mature Information Security programs. He is passionate about building cross functional teams between engineering and security, along with a focus on automation, tooling and processes to bring security into every aspect of a company culture. Currently he leads the Product Security program at one of the largest media companies.

Presentations

Strike Back Against Legacy Software Vulnerabilities Session

Legacy software in big companies is a security nightmare. This case study details how we successfully integrated security into the agile software development cycle, while dealing with problems in legacy architectures. Automation, Tools, Training, Reporting, Processes and the executive salespitch will be discussed as some of the key areas for a successful rollout of mature, self-sustaining program

Julia Knecht manages Product Security and Privacy Engineering at Adobe. She created and is responsible for the Secure Product Lifecycle of Adobe’s Digital Marketing Business. An integral and invaluable piece of the Secure Product Lifecycle is her Security Champions program, which has been running successfully for three years.

Presentations

Using Security Champions and Automation to Create an Effective SPLC Session

Discover how a team of just two security analysts created a successful SPLC program by leveraging automation and establishing security ambassadors (champions) within the product engineering teams. This program has successfully scaled to support thousands of engineers due to the solid framework built on automation at its core.

Since discovering the cypherpunks mailing list in the early 1990s, Ryan Lackey has been fascinated by how security technologies can enhance individual liberty for people around the world.

After dropping out of MIT to start an anonymous electronic cash company in Anguilla, he founded the world’s first offshore datahaven, HavenCo, on the self-declared Principality of Sealand in the North Sea in 1999. After a decade spent in conflict zones around the world establishing satellite, cellular, wireless, and other networks for governments, militaries, NGOs, and companies, he founded CryptoSeal in 2011, to bring tamper-responding secure computing to Internet servers. CryptoSeal was purchased by CloudFlare, the network edge performance and security company, in 2014.

In 2016, Ryan founded ResetSecurity, dedicated to using tamper-responding secure computing technology to protect client-side computing devices. ResetSecurity provides organizations with secure laptops, phones, and other devices, plus network services, to protect and empower their personnel when they travel to high-risk or austere environments.

Presentations

Travel Computing Security: Old and new problems Session

Travel computing security -- keeping your data and systems safe while traveling around the world, and keeping your home systems safe when you return -- has become a very timely topic, with laptop bans, border searches, and filtering popping up in countries around the world. However, this isn't an entirely new problem, just one we've never truly solved. Here's how to survive.

Danielle Leong is an engineer on GitHub’s Community & Safety team who loves building tools to help make open source a more welcome and inclusive environment. She is also the founder of Feerless, an app that provides trigger warnings for Netflix users with PTSD. She’s passionate about consensual software, inclusivity in tech, mental health awareness, and improving online good citizenship. In her spare time she climbs rocks, rides motorcycles, and dresses up as a T-rex – occasionally all at the same time.

Presentations

Consensual Software: Prioritizing user trust and safety Session

Online safety has become a huge problem in the world of oversharing. Real name policies, automatic geolocation tracking, and photo tagging increase user adoption rates, but these features can be quickly abused by bad actors. This talk will discuss how to apply a "consent filter" to product decisions to make a safer user experience and to help protect your most vulnerable users from harm.

Taylor Lobb is manager of security and privacy at Adobe where he focuses finding vulnerabilities within Adobe’s products. He leads a team of penetration testers and is responsible for centralization and automation of many key security initiatives.

Presentations

Using Security Champions and Automation to Create an Effective SPLC Session

Discover how a team of just two security analysts created a successful SPLC program by leveraging automation and establishing security ambassadors (champions) within the product engineering teams. This program has successfully scaled to support thousands of engineers due to the solid framework built on automation at its core.

Dr. Dhia Mahjoub is the Principal Engineer and Head of Research at Cisco Umbrella (OpenDNS). He leads the core research team focused on large scale threat detection and threat intelligence and advises on R&D strategy. Dhia has a background in networks and security, has co-authored patents with OpenDNS and holds a PhD in graph algorithms applied on Wireless Sensor Networks problems. He regularly works with prospects and customers and speaks at conferences worldwide including Black Hat, Defcon, Virus Bulletin, BotConf, ShmooCon, FloCon, Kaspersky SAS, Infosecurity Europe, RSA, Usenix Enigma, ACSC, NCSC One Conference and Les Assises de la sécurité.

Presentations

Malicious CDNs: Tracking Botnets Using Open Source SSL Data Session

Open source datasets contain of wealth of information that can aid security practitioners. However, large public datasets are usually unstructured and noisy - posing difficulties for researchers trying to extract useful information. This talk will show how we took an SSL scan dataset and through the use of graph and clustering analytics identified domains associated with the ZBot botnet.

Thomas Mathew is a Security Researcher at OpenDNS (now part of Cisco) where he works on implementing pattern recognition algorithms to classify malware and botnets. His main interest lies in using various time series techniques on network sensor data to identify malicious threats. Previously, Thomas was a researcher at UC Santa Cruz, the US Naval Postgraduate School, and as a Product and Test Engineer at handsfree streaming video camera company Looxcie, Inc. He presented at ISOI APT, BruCon, FloCon and Kaspersky SAS.

Presentations

Malicious CDNs: Tracking Botnets Using Open Source SSL Data Session

Open source datasets contain of wealth of information that can aid security practitioners. However, large public datasets are usually unstructured and noisy - posing difficulties for researchers trying to extract useful information. This talk will show how we took an SSL scan dataset and through the use of graph and clustering analytics identified domains associated with the ZBot botnet.

Allison Miller works in product management at Google, mitigating risks to Google and end users. Previously, Allison held technical and leadership roles in security, risk analytics, and payments/commerce at Electronic Arts, Tagged.com, PayPal/eBay, and Visa International. Allison is a proven innovator in the security industry and regularly presents research on risk analytics, cybersecurity, and economics. She is known for her expertise in designing and implementing real-time risk prevention and detection systems running at internet scale.

Presentations

Tuesday keynotes Keynote

Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the first day of keynotes.

Wednesday keynotes Keynote

Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the second day of keynotes.

Barton Miller is a professor of computer sciences at the University of Wisconsin, the chief scientist for the DHS Software Assurance Marketplace research facility, and software assurance lead on the NSF Cybersecurity Center of Excellence. Barton also codirects the MIST software vulnerability assessment project in collaboration with his colleagues at the Autonomous University of Barcelona and leads the Paradyn Parallel Performance Tool project, which is investigating performance and instrumentation technologies for parallel and distributed applications and systems. In 1988, Barton founded the field of fuzz random software testing—the foundation of many security and software engineering disciplines. In 1992, Barton (working with his then-student Jeffrey Hollingsworth), founded the field of dynamic binary code instrumentation and coined the term “dynamic instrumentation,” which forms the basis for his current efforts in malware analysis and instrumentation. His research interests include systems security, binary and malicious code analysis and instrumentation of extreme-scale systems, parallel and distributed program measurement and debugging, and mobile computing. Barton’s research is supported by the US Department of Homeland Security, the Department of Energy, the National Science Foundation, NATO, and various corporations.

Presentations

Secure Coding Practices and Automated Assessment Tools Tutorial

This tutorial is relevant to anyone wanting to learn about minimizing security flaws in the software they develop or manage. We share our experiences gained from performing vulnerability assessments of critical middleware. You will learn skills critical for software developers and analysts concerned with security.

I am from Arizona. I moved to Pittsburgh for college. I am currently a security student at Carnegie Mellon University. I am particularly interested in the role of modelling and simulation in threat intelligence.

Presentations

A System Dynamics Approach to CNO Modelling Session

This paper proposes a model that focusses on how the APTs allocate and utilize their resources. The assumption is that in this allocation there is an optimal way to operate to either attack or defend infrastructure. This model strives to explain the optimal resource allocation of APTs and targets based on the feedback loops present in SD.

Neal Mueller is the product lead for Google Cloud Platform, focused on security and Beyondcorp (http://research.google.com/pubs/pub43231.html). Outside of Google, Neal is an adventurer, including summiting Mount Everest unguided, sailing from Hawaii to San Francisco, swimming the English Channel, and the first-ever row across the Arctic Ocean, for which he was awarded a Guinness World Record. Neal has a B.A. from the University of Pennsylvania and an MBA from the University of Pennsylvania’s Wharton School of Business, both with honors.

Presentations

BeyondCorp: Beyond “fortress” security Session

Most companies today use some variation of the firewall, or “fortress,” model for perimeter security. This model assumes everything on the outside is dangerous, and everything in the inside is safe. It worked well when employees worked at the HQ primarily did their work on desktop computers. Google’s BeyondCorp is a new model for our new reality of dispersed BYOD workforce.

Jack Naglieri is a security engineer at Airbnb, with a passion for DevOps, Security, and Infrastructure. His exposure to information security began as an incident responder for Verisign. After graduation from George Mason University, he moved to the San Francisco Bay area and spent several years at Yahoo as an incident responder. He then transitioned into a security engineering role, with the challenge of deploying security monitoring tools at scale. In 2016, he joined Airbnb, and is the principal engineer on StreamAlert – a framework that enables serverless, real-time, data analysis at scale.

Presentations

Going Serverless: Security Outside the Box Session

The advent of serverless technologies and infrastructure-as-code has changed how we build and deploy security services. Going serverless has empowered our team to create low-cost, scalable and secure services to protect our organization. Drawing from real-world experiences, we will share our tools and techniques for successfully building, deploying and debugging serverless security applications.

Pieter Ockers is a Senior Security Program Manager and the lead of Adobe’s Product Security Incident Response Team.

In an effort to bend the growth curve of application vulnerabilities reported to Adobe’s PSIRT by 3rd party security researchers, Pieter launched an internal bug hunt contest at Adobe in the Fall of 2016 as a cost-effective method to reduce security vulnerabilities while increasing security awareness and building a community of internal pen-testers.

Based in San Francisco, Pieter is passionate about engaging with the security research community to build a stronger, more secure and resilient ecosystem.

Presentations

Internal Bug Hunts: Squashing Security Bugs on a Budget Session

Internal bug hunts, in which employees compete for prizes by finding and reporting security bugs, enable security teams to harness the creativity and problem-solving skills of the workforce while reducing security bugs in their applications. Bug hunts also promote a culture of security awareness by involving participants outside of the security team in a fun and challenging activity.

Alex Pinto is the Chief Data Scientist of Niddel and the lead of MLSec Project.
He has been pushing the boundaries of threat hunting automation with machine learning and data science techniques for the last four years and has been working in Information Security for 20 years. Alex is a CISSP-ISSAP, CISA, CISM, but knows better than to sign his name with all those acronyms.

Presentations

Towards a Threat Hunting Automation Maturity Model Session

This session will propose an automation model by that elevating the quality of data available to automation processes we can efficiently simulate "analyst intuition" and significantly augment the human analysts. We will present a Hunting Automation Maturity Model (HAMM) that organizes these techniques around capability milestones, including internal and external context and analytical tooling.

Kevin has spent the last 20 years teaching development organizations the intricacies of how to create hack-resistant applications. Kevin’s experience ranges from Department of Defense to major Fortune 500 companies such as HP, Amazon, VMware, Sophos, Intuit, SWIFT, Walgreens, TMX, and Liberty Mutual. Name a security problem and Kevin has seen it. Not only has he seen it, but he’s taught some of the best developers in the world how to prevent and defend against it. Traveling the world in the name of software security, Kevin has taught developers in 10 countries.

Presentations

Finding the Vulnerability First and Fast Tutorial

This workshop is designed to instruct participants how to decrease the time it takes to find common web vulnerabilities while also decreasing the risk of an OWASP Top 10 vulnerability making it into the production server by collecting useful data that will help participants focus on where the vulnerabilities are hiding. Bring a laptop. This is a hands-on event!

Kyle Randolph is the Senior Director for Security, Privacy, and Compliance at Optimizely. He has over 15 years of experience growing security teams from zero, building Twitter-scale defenses to protect millions of users, and scaling security programs at companies of all sizes.

Presentations

Enterprise SaaS Startups: The Business Case for Security Session

It's a huge ask of trust for an established company to trust a startup and open up an integration with their data and infrastructure. This talk will share great learnings from building an enterprise SaaS startup where security went from zero to paramount as the company scaled- How to meet customers' needs, how to sell security to management, and how to build security into engineering.

Dominik Richter is a product manager at Chef, an entrepreneur, and a leading expert in both security and automation. Dominik strengthened his abilities at Deutsche Telekom, where he headed the security of Telekom’s first OpenStack Cloud. He is cofounder of InSpec, Chef Compliance, and the dev-sec.io project.

Presentations

DevSec: Continuous Compliance and Security with InSpec Session

Best-practices for server hardening and patching have been in place for decades. Nevertheless, it is still very cumbersome to enforce those rules continuously and many servers are still unsecured in 2016. To cope with the increased pace, we need tools that enable is to to implement compliance automation.

Rachel Roumeliotis is a strategic content director at O’Reilly Media, where she leads an editorial team that covers a wide variety of programming topics ranging from full stack to open source in the enterprise to emerging programming languages. Rachel is a programming chair of OSCON and O’Reilly’s Software Architecture Conference. She has been working in technical publishing for 10 years, acquiring content in many areas including mobile programming, UX, computer security, and AI.

Presentations

Tuesday keynotes Keynote

Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the first day of keynotes.

Wednesday keynotes Keynote

Security Conference Program Chairs, Rachel Roumeliotis and Allison Miller, welcome you to the second day of keynotes.

Michael Roytman is the Chief Data Scientist at Kenna Security, and has been selected to speak at some of the top security conferences in the world, including RSA, SOURCE, Bsides, Metricon and SIRAcon. His work focuses on cybersecurity data science and Bayesian algorithms. He is also a technical advisor in the humanitarian space, having worked with Doctors Without Borders, The World Health Organization, and the UN. He is the cofounder and a board member of Dharma Platform, for which he landed on the 2017 Forbes 30 under 30 list. He holds an M.S. in Operations Research from Georgia Tech, and his home in Chicago houses an industrial-scale coffee roasting operation.

Presentations

Predicting Exploitability With Amazon Machine Learning Session

Security is all about reacting, it's time to make some predictions. We use Amazon Web Services new Machine Learning platform to train a binary classifier for vulnerabilities, allowing us to predict whether or not a vulnerability will become exploitable. We'll generate over 20,000 predictions on the remainder of the vulnerabilities, issuing a weather forecast for VM teams.

Jennifer Ruehr is Legal Counsel for Privacy and Security at Adobe. She works on global privacy issues related to vendor management (including cross-border data transfers and data processing agreements), employee information, customer escalations, and corporate marketing as well as managing projects related to data governance, HIPAA and privacy and security incident response. Ruehr is currently a Fellow with the Leadership Council on Legal Diversity. She holds a JD from the University of Akron School of Law, earning a certificate in Intellectual Property Law and Technology and BA in English from Washington State University. She is a member of the bar in Ohio.

Presentations

Security & Privacy: Together in Good Times & Bad Session

This session will discuss how, even through organizational shifts, divisions, and differences, how you can leverage the strength's of both security experts and privacy experts to constantly deliver what customers will expect from you.

Ido Safruti is the founder and CTO at PerimeterX, which is building a behavior-based web security service. Previously, Ido headed a product group in Akamai focusing on web performance and scalability. Ido joined Akamai through the acquisition of Cotendo, where he led product and strategy. His earlier roles include GM in charge of product engineering and operation, R&D manager, chief scientist, and head of engineering at various companies and the Israeli intelligence, where he focused on high-capacity, large-scale web and network services and cybersecurity systems.

Presentations

Web Security Analysis toolbox Tutorial

In this tutorial we will cover data analysis tools that any web security analyst should be familiar with in his daily work. Tools like ELK, BigQuery, python and helpful online services. These tools can help you dive into and analyze incidents on your web application and network, and help you get alerted when an attack starts.

Rich Seymour (@rseymour) is a Senior Data Scientist at Endgame working on integrating R&D successes into the platform and experimenting with new techniques to make security sensible. He has a PhD in Materials Science and a M.S. in Computer Science from the University of Southern California where he worked on high performance computing simulations of nanoscale materials under stress.

Presentations

Security + Design * Data Science: A Bot Story Session

The security industry continues to struggle with alert fatigue as the talent shortage grows. Security has yet to fully embrace the power of UX to help security workers do more with less. In response to our UX research, we developed a chatbot, combining machine learning within an intuitive UI to expedite data search and discovery, enhancing detection and response to security threats.

Ruchi is a Sr Technical Program Manager at Google in Security where she manages a team whose mission is to secure Acquisitions and Alphabets. Prior to joining Google, she spun up the Subsidiary Security Program at Amazon and managed the product roadmap for AWS Identity and Access Management and AWS Key Management services. Ruchi has worked at Deloitte and Touche LLP and Ernst and Young, where she helped clients implement security solutions ranging from Identity and Access Management (IAM), Security Information and Event Management (SIEM) to Network Security Products. She has over 12 years of experience in Security.

Presentations

Top 15 things we wish every company already did before acquisition Session

From Alphabet to startup to established company - these are the top 15 things that Google Security worries about when we acquire or start a company. We will discuss how we address them in order to protect the entity as well as Google.

Amir Shaked is a software engineer and security researcher. He has been writing code from the age of 14, and worked at various startups and enterprises ever since.

Today he is VP of research at PerimeterX, fending of automated attacks from websites.

Amir specializes in web and data technologies, IOT and telecom and he coaches team leaders and project managers.

Presentations

Web Security Analysis toolbox Tutorial

In this tutorial we will cover data analysis tools that any web security analyst should be familiar with in his daily work. Tools like ELK, BigQuery, python and helpful online services. These tools can help you dive into and analyze incidents on your web application and network, and help you get alerted when an attack starts.

Michael Sinno is an Site Reliability Manager on Google’s Merger and Acquisitions Technology Integrations team. His team is responsible for the onboarding and integration of all Google Acquisitions. He has been at Google for 10 years and worked on both security and non security related technologies within the Google Corporate infrastructure. He has previously worked for Microsoft as well as various financial services companies.

Presentations

Top 15 things we wish every company already did before acquisition Session

From Alphabet to startup to established company - these are the top 15 things that Google Security worries about when we acquire or start a company. We will discuss how we address them in order to protect the entity as well as Google.

Joy Smith comes to McKinsey with significant public sector and government experience in cybersecurity, and helps lead our efforts to bring our capabilities to more clients. She previously worked with Novetta and IBG, providing advanced analytics to conduct cybersecurity analysis, entity resolution, and multi-source investigations.

Joy holds an MBA from the Wharton School, University of Pennsylvania, and a BS in Biomedical Engineering from UNC-Chapel Hill.

Presentations

Cyber crises: Bridging the response gap between the board and the front line Tutorial

The lack of transparency between executive decisions and those who implement them can muddle the response to a fast-moving cyber crisis. This tutorial will simulate a crisis and elicit a response from both board/executive members and front-line responders in isolation, giving participants an opportunity to question, challenge, and ultimately improve the harmony between the respective approaches.

Michee Smith is a Product Manager for Security & Privacy at Google, where she is responsible for infrastructure products that provide transparency to users and internal data governance operations on the handling of personal data. She is passionate about ensuring privacy is embedded in every step of the product and data life cycle. Prior to joining Google, she spent 12 years in a variety of software development and program management roles at Microsoft.

Presentations

Security by the numbers: Improving the security of online content through transparency reporting Session

Since the launch of the Email Encryption in Transit transparency report, Google has seen a 40%+ increase of encrypted e-mails going in and out of GMail. Can public accountability really be used to drive the adoption of security practices inside a company and the industry at large? Come learn about the successes and pitfalls of sharing this type of data and how to approach similar endeavors.

Mr. Studarus has over twenty years of software product development across finance, high tech, government and healthcare industries. This includes responsibilities for the product direction of large scale cloud based solutions interface with internal and external technical teams, business partners, customer, internal compliance and legal. His background includes software development and product management of cloud and software security products as well operational security and technical risk management and audit responsibilities. For the US federal government, he’s lead development of security dashboards and portals for use within DISA and the US Department of State. In the cloud field, he’s lead software and product management for AT&T, Leidos and Akamai. He brings a rounded knowledge across software and product development, security best practices, compliance and cloud computing.

Presentations

Virtualized Service Chained Security Controls within a Layer 2 SDN - Hands On Workshop Tutorial

Using virtualization and SDN, software defined networking, traffic can be service chained through multiple security functions (WAF, DDOS, IDS/IPS) without the overhead and complexity of layer 3 networking. Using open source cloud security tools, this functionality will be demonstrated.

Harry Sverdlove has been building and leading technology solutions for 25 years. He is cofounder and Chief Technology Officer of Edgewise Networks, a new cyber security company focused on transforming the way we perform network security in an age of dynamic and inherently untrustworthy networks. Prior to Edgewise, Sverdlove was CTO for Carbon Black (formerly Bit9) where he led their technical and strategic vision, and helped establish Carbon Black as a major player in endpoint security. He was principal research scientist for McAfee, Inc., responsible for the architecture of their web safety rating engine. He joined McAfee through its 2006 acquisition of SiteAdvisor, where he was Chief Scientist. Sverdlove is frequently quoted in leading media outlets including The Wall Street Journal, The New York Times, CNN, CNBC and many trade and vertical market publications as an expert on cyber security. Sverdlove earned a bachelor’s degree in electrical engineering from the Massachusetts Institute of Technology.

Presentations

Zero Trust Networking: Never Trust, Always Verify [or "From Zero to Hero: Zero Trust Networking Distilled"] Session

In today's world of dynamic computing environments and advanced threats, the axiom "trust but verify" is not an effective strategy. The Zero Trust model forces you to rethink the way you secure your networks. In this session, we break down Zero Trust Networking into simple principles that can be applied to any organization to both improve your security posture and simplify its management.

Christie Terrill (CISSP) is a Partner at Bishop Fox, a security consulting firm providing services to the Fortune 500, global financial institutions, and high-tech startups. She has accumulated more than a decade of information security experience in providing security advisory services. Christie is based in New York City where she currently provides engagement oversight, thought leadership, and client relationship management to Bishop Fox’s New York clients.

Christie is a monthly contributor to Forbes, where her articles translate cybersecurity issues into business-relevant action. In 2017 and 2016, she spoke at several Dark Reading webinars on the topic of Preparing a Next-Generation IT Security Strategy. She also took part in a panel discussion on “Stories from the Battlefield – Cybersecurity Incident Response” at the Women in Cybersecurity Conference 2017 (WiCyS). Previously, Christie had appeared as a panelist at the first annual “Career Discovery in Cyber Security: A Women’s Symposium” in 2014. She was also a speaker at the BayThreat 2012 Conference, presenting Where to Start When Securing a Startup. Other accomplishments include working as a Technical Editor for the Legal, Regulatory, and Standards Compliance chapter in Information Security: The Complete Reference, published by McGraw-Hill in addition to being quoted in publications such as MarketWatch, eWeek, Infosecurity Magazine, and InfoWorld.

Prior to joining Bishop Fox, Christie spent several years in the security consulting practices at Accenture and Ernst & Young for clients in the Global 500. During this time, she lived and worked in the United States, the United Kingdom, and India. Christie holds a Bachelor of Arts with Honors from the University of California, Santa Cruz.

Presentations

"Build me a world class security program in three months" Session

How do you respond when your company's executives want you to go from an understaffed security team to a world-class security program in an unreasonably short timeframe? This case study describes exactly what I did well (and could have done better) at a prominent healthcare provider to meet the charge, manage expectations, and build a security program to be proud of in only 3 (read: 9) months.

Cynthia is a member of the Systems Engineering team at Midokura. She enjoys highlighting the emerging technologies in network virtualization as application needs evolve. Her background in networking hardware spans from Telecommunications to Data Center and Campus/Enterprise solutions. Cynthia has earned an M.Sc. (Eng) from Queen’s University and also a number of professional certifications, including: Alcatel-Lucent Network Routing Specialist II (NRS II) written certification exams, Brocade Certified Ethernet Fabric Professional (BCEFP), Brocade Certified IP Network Professional (BCNP), and VMware Technical Sales Professional (VTSP) 5 certifications.

Presentations

Virtualized Service Chained Security Controls within a Layer 2 SDN - Hands On Workshop Tutorial

Using virtualization and SDN, software defined networking, traffic can be service chained through multiple security functions (WAF, DDOS, IDS/IPS) without the overhead and complexity of layer 3 networking. Using open source cloud security tools, this functionality will be demonstrated.

Peleus Uhley has been a part of the security industry for more than 15 years. As the Lead Security Strategist at Adobe, he assists the company with proactive and reactive security. Prior to joining Adobe, Peleus was a senior developer at Anonymizer, and a security consultant for @stake and Symantec.

Presentations

Assessing your public security exposure without sending a single packet Session

An accurate understanding of your public network and application exposure is necessary for everything from scalable security automation to red team exercises. Although, it can be overwhelming trying to keep up with a large organization. This presentation discusses techniques for leveraging freely available data to create complete network graphs, track best practices, and identify security issues.

Alex is an Information Security Engineer at Mapbox, a mapping platform that supports more than a quarter billion end users worldwide, where she makes sure their cloud infrastructure is secure, stable, and able to perform under high demand in any part of the world. As a founding member of Mapbox’s security team, she launched their public bug bounty program on HackerOne in March 2015. She works on everything from application security to platform security on AWS to making sure every team member has password manager and knows how to use it.

Alex is also a Director of Women Who Code DC and an active organizer and participant in the larger DC Tech community, including DCFemTech and Code for DC. Before joining Mapbox, Alex built, configured, and secured large SharePoint based intranets for the Department of Defense with a specialization in automating the entire DIACAP STIG process via PowerShell scripts.

Presentations

Tools, APIs, and empathy: How to launch and run a successful bug bounty program - a security team perspective Session

Launching a bug bounty program is hard. Running and maintaining a successful bug bounty program is even harder. Using real world stories of both failure and success, this session will share how our security team used tools, processes, automation, and empathy to decrease response time by 90%, reduce noise, and improve average report quality for our bug bounty program.

Lindsey Wegrzyn Rush is the senior manager of security incident response at Adobe. She has also helped develop Adobe’s anti-abuse programs. Prior to joining Adobe, Wegrzyn was legal director, global security at Yahoo! Inc., where she drove Yahoo!’s worldwide legal security policy development and was responsible for the implementation of security and privacy processes and procedures. Previously, Wegrzyn held positions as chief operating officer at the National Cyber Forensics and Training Alliance, operations legal advisor at EarthLink, Inc., and as a corporate transactional and tax attorney with the Sanders Law Firm, LLC. Wegrzyn holds a JD from the Baylor School of Law and a BS in secondary education from Northwestern University. She is a member of the bar in Georgia and Florida.

Presentations

Security & Privacy: Together in Good Times & Bad Session

This session will discuss how, even through organizational shifts, divisions, and differences, how you can leverage the strength's of both security experts and privacy experts to constantly deliver what customers will expect from you.

Steven Wierckx is a Software and Security Tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development and database design. He has a passion for web application security and he writes articles for several professional magazines with regards to that topic. He has created several courses on testing software for security problems and teaches courses on secure coding, security awareness, security testing and threat modelling. He is the OWASP project leader for the threat modeling project. He organizes (since 2016) the BruCON student CTF. This year, he spoke on Hack In The Box Amsterdam on the topic of ‘magic mirrors’ and he will host a workshop at the BruCON conference.

Presentations

Whiteboard Hacking aka Hands-on Threat Modeling 2-Day Training

Toreon proposes a 2 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops with real live Use Cases are provided by Toreon. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling.

Chester Wisniewski has been involved in the information security space since the late 1980s. He is currently a Principal Research Scientist in the Office of the CTO. Chet divides his time between research, public speaking, writing and attempting to communicate the complexities of security to the press and public in a way they can understand.

Chester has spoken at RSA, InfoSec Europe, LISA, USENIX, Virus Bulletin and many Security BSides events around the world in addition to regularly consulting with NPR, CNN, CBC, The New York Times and other media outlets.

Presentations

Embracing security as a culture: Users aren't the problem, they're remotely deployed sensors Session

Users aren't just part of the problem, they are part of the solution. Creating a security culture takes more than security awareness training, it takes commitment from all parts of an organization. To improve security and better defend and respond to phishing attacks we not only need users to be vigilant, but to take an active part in helping manage security risk.

Yinglian Xie is the CEO and cofounder of DataVisor, a startup in the area of big data analytics for security. Yinglian has been working in the area of internet security and privacy for over 10 years and has helped improve the security of billions of online users. Her work combines parallel-computing techniques, algorithms for mining large datasets, and security-domain knowledge into new solutions that prevent and combat a wide variety of attacks targeting consumer-facing online services. Prior to DataVisor, Yinglian was a senior researcher at Microsoft Research Silicon Valley, where she shipped a series of new techniques in production. She has been widely published in top conferences and served on the committees of many of them. Yinglian holds a PhD in computer science from Carnegie Mellon University.

Presentations

Inside a Bad Actor's Studio Session

Using research from more than one billion users, 500 billion events and 50 million malicious accounts collected from global online services, we will share some of the sophisticated attack techniques being used by modern day online criminals and demonstrate how these types of attacks can be detected and mitigated by leveraging artificial intelligence.