Loading…
Venue: 202 clear filter
arrow_back View All Dates
Thursday, April 10
 

11:00am ADT

Modern IT disaster recovery: ensuring continuity in the age of cyber-attacks
Thursday April 10, 2025 11:00am - 11:45am ADT
202
As the digital landscape continues to evolve, so do the threats and challenges that businesses face. IT disaster recovery (DR) has traditionally focused on scenarios such as fires and loss of network connectivity, yet the majority of disruptions are happening as a result of cyber-attacks that deliberately target your backups and secondary hosting sites to cause maximum damage. Further compounding this challenge is the fact that most organizations have a mix of systems hosted on-premise, systems managed by third parties and SaaS solutions that need different recovery approaches.
This presentation will explore modern approaches to IT DR using both cloud and no-cloud options, with automation where possible. We will also discuss the typical causes of delays during recovery from cyber-attacks, and solutions for speeding up recovery in situations where incident response teams need time to do their forensics work but business operations need to resume.
Speakers
avatar for Tarek Habib

Tarek Habib

Sr. Manager, KPMG LLP
Tarek is a Senior Manager in KPMG’s Advisory practice and specializes in business resilience and information security. Supporting business leaders and CISOs in various organizations and industries, including manufacturing, financial services, consumer goods, law enforcement, government... Read More →
Thursday April 10, 2025 11:00am - 11:45am ADT
202

1:00pm ADT

2025: The year of Right of Boom
Thursday April 10, 2025 1:00pm - 1:45pm ADT
202
Join Nick Scozzaro, Founder and CEO of ShadowHQ and former Head of Enterprise Mobility Engineering at BlackBerry, and George Plytas, Head of Information Security at Canadian Automobile Club (CAA ) as they explore emerging trends and best practices that enhance how organizations respond after a breach. Discover how Business Continuity, Cyber Response, Disaster Recovery, Crisis Management, and Executive Leadership are converging around the CISO and how they can better support all efforts of a response.

Attendees will gain critical insights to emerging trends, see where traditional IR plans are failing and learn best practices to help improve their security program, enabling a faster, cohesive and effective recovery plan
Speakers
avatar for George Plytas

George Plytas

Head of Information Security, Canadian Automobile Club, CAA Club Group
George Plytas is a seasoned cybersecurity leader with 25 years of experience in Security Operations and Regulatory Compliance. As the Head of Information Security at Canadian Automobile Club, CAA Club Group, he is responsible for safeguarding critical assets and ensuring the organization's... Read More →
avatar for Nick Scozzaro

Nick Scozzaro

Founder & CEO, ShadowHQ
Nick Scozzaro is the Founder and CEO of ShadowHQ, specializing in cybersecurity response and recovery. Previously, he served as Head of Enterprise Mobility Engineering at BlackBerry, where he spent 15 years supporting major technical projects for government and private sector across... Read More →
Thursday April 10, 2025 1:00pm - 1:45pm ADT
202

2:00pm ADT

Solving Secrets Sprawl Takes More Than Security: Why Machine Identity Is Everyone's Problem
Thursday April 10, 2025 2:00pm - 2:45pm ADT
202
When a security event occurs, most teams tend to jump into a circle of blame. Everyone takes their turn saying, "It can't be my fault. If only that user had not clicked on that link," or "If that developer had not hardcoded that credential, then none of this would have happened." Unfortunately, for many companies, the Security team is ultimately seen as at fault when a breach happens; after all, it is a security incident. 

Long-lived credential leaks, aka secrets sprawl, are possibly the single largest security risk every organization is currently facing. The reality is that no security team can solve this growing issue on its own. This is going to take a full team effort and rethinking some of the relationships and silos we have become accustomed to in the tech world. There has never been a better time to rethink how we build complex applications and how they interact with the world. 

In this talk, you will:
- Get an update on the latest secrets security research 
- Ask who really owns security and identity
- Map possible routes for a secrets-free future
- Rethink git and pull requests workflows and see why that is more involved than you think
Speakers
avatar for Dwayne McDaniel

Dwayne McDaniel

Senior Developer Advocate, GitGuardian
Dwayne has been working as a Developer Advocate since 2014 and has been involved in tech communities since 2005. His entire mission is to “help people figure stuff out.” He loves sharing his knowledge, and he has done so by giving talks at hundreds of events worldwide. He has... Read More →
Thursday April 10, 2025 2:00pm - 2:45pm ADT
202
  Track 6
  • global Y

3:00pm ADT

The Horrors of the Modern Software Supply Chain
Thursday April 10, 2025 3:00pm - 3:45pm ADT
202
Modern software is complex and developers heavily rely upon third party code. Securing the software supply chain gained a lot of attention following the Solar Winds compromise. However in the years following this compromise, very little has effectively moved the needle to reduce risk related to third party code and the software supply chain.

This talk will walk through the following problems with securing the software supply chain and propose some solutions to help companies:
  1. Walk through example tech stack
  2. Break down each of the compoennts of the stack
  3. Highlight the scope of third party software and services used
  4. Discuss the academic vs reality in approching securing the supply chain
  5. Talk about how companies are approaching the problem
  6. Understanding software composition analysis and problems with these tools
  7. Vulnerability reporting is broken and the state of NVD
  8. Problems with software bill of materials (SBOMs)
  9. Walk through of ecosystems for third party code - Homebrew, Operating systems package managers, PyPI, NPM, etc
  10. Examples of attackers abusing these ecosystems to compromise organizations
  11. Walk through containers and Kubernetes
  12. Walk through AI supply chain and new Chinese AI models
  13. Examples of how security professionals are being targetted
  14. Approaches for securing the software supply chain that are working
  15. Descriptions of the challenges
  16. Open source options - OpenSSF Scorecard
  17. Startups and commercial solutions with unique solutions
  18. Options to cache or proxy third party code
  19. How ecosystem maintainers are trying to protect against attackers
  20. Options to secure the CI/CD and developer endpoints
Speakers
avatar for Jared Perry

Jared Perry

Cloud Security Practice Lead, Stratum Security
Jared Perry is the Cloud Security Practice Lead at Stratum Security where he focuses on helping improve cloud security and security programs for start-ups to Fortune 500 companies. Prior to joining Stratum Security, Jared was an IT Security Administrator at Memorial University where... Read More →
Thursday April 10, 2025 3:00pm - 3:45pm ADT
202

4:00pm ADT

Detection Engineering 101 for OT/ICS Environment
Thursday April 10, 2025 4:00pm - 4:45pm ADT
202
In the complex world of OT/ICS environments, traditional approaches to threat hunting often fall short when handling vast datasets and detecting sophisticated threats. This talk introduces practical Jupyter Notebooks designed for large-scale threat hunting, with a focus on graph-based visualizations to uncover anomalies. Using APT Volt Typhoon’s tactics, techniques, and procedures (TTPs) as a case study, attendees will explore scalable methods for anomaly detection and detection engineering. The session emphasizes actionable strategies to build alerts for OT protocols like DNP3, BACnet, and Modbus, arming SOC teams to proactively safeguard critical infrastructure.
Speakers
avatar for Kai Iyer

Kai Iyer

Security Engineer II, Amazon
Security Engineer at Amazon's Enterprise Protection Program and a GIAC Certified Security Professional with expertise in web application development, devsecops, applied machine learning, threat hunting, purple teaming, and incident response. Passionate about leveraging advanced technologies... Read More →
Thursday April 10, 2025 4:00pm - 4:45pm ADT
202
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -