Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Blog Feed Post

What To Do At The Gartner Security and Risk Management Summit 13-16 June

Bob Gourley

Gartner's biggest security and risk management event starts Monday 13 June at National Harbor MD. The Gartner Security and Risk Management Summit is always widely attended, with over 3,000 people expected to attend.

This years agenda is very broad, since the planners wanted to be able to accommodate a wide range of security and risk management topics. This is good since you can find just about any topic associated with cyber risk reduction being covered. But it is bad because it can be incredibly hard to find the optimal sessions to attend.

You will get much more value from the event if you plan out the sessions you will visit and the vendors you will drop in on.  As you do, here are a few sessions to keep in mind:

First I would appreciate it if you all come by the Verisign Security booth (number 119) and pick up a copy of my book, The Cyber Threat. Please come by and say hello and grab your copy.

On Tuesday at 1130am Alan Boehme will be speaking. If you already know of Alan you are very likely planning to be here already, he is an awesome speaker and always provides great context. His experience as a CTO and IT professional and his knowledge of the business impact of security is absolutely second to none. His topic Tuesday is on Re-Thinking Security. It will discuss, among other things, the concept of a Software-Defined Perimeter.

On Wednesday at 10:45pm a panel of Elias Manousos (RiskIQ), Matthew Devost (FusionX) and Thomas Hofmann (PNC) will examine ways to access the hacker vantage point to prevent threats. These are three of the most highly regarded cybersecurity and risk mitigation professionals I have met and I most strongly recommend anyone looking for new approaches attend this session. I have spoken with all three of these people separately and can only imagine that the dynamic between them will be fascinating and very enlightening.

From the event description:

Is your security team always one step behind the hackers trying to break in? Do you feel like your IT security team is always the mouse is a cat-and-mouse game? Join us at a panel discussion to hear real-world examples and expert opinions on  how you can leverage an enterprise digital footprint and the attacker's digital footprint to finally gain an advantage over the bad guys by mapping out all the assets and avenues they can see from outside the firewall.

On Wednesday at 12:45pm Recorded Future will be providing an update on ways to reveal ransomware secrets through threat intelligence. From the event description:

Threat intelligence can help you defend against the two key attack vectors used by ransomware — malicious emails and malvertising. Attend this session and learn how threat intelligence enables faster verdicts on key technical indicators associated with malicious emails with ransomware, the rising popularity of ransomware over the past four years and top ransomware families as shown by trend analysis, and best practices on applying threat intelligence to help prevent ransomware infections.

On Wednesday at 3:15pm Two of the most highly regarded technologists in the nation, Junaid Islam of Vidder and Bob Flores of Cognitio, will provide insights in a special session titled "How to Stop Catastrophic Cyber Failure in Your Organization." From the event description:

Catastrophic cyber failure occurs when a single vulnerability leads to the breach of an entire organization. These failures are seen in organizations with large security teams, multi-million dollar budgets and well defined processes: even organizations implementing a “by the book” security strategy cannot escape this fate. But, you can stop catastrophic cyber failures. Join CIOs, CISOs and leading security experts to discuss how a threat-based approach combined with zero-trust architecture can make a difference.



Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com