PLANNED TALKS

Learn how to automate your systems, how to build chat bots and the future of deep learning. Explore the applications of machine learning, NLP, and computer vision transferring Neural Network know-how from academia to architects

WORLD'S BIGGEST CYBERSECURITY ONLINE
CONFERENCE FOR DEVELOPERS

CYBERSECURITY WITH THE BEST

50+ SPEAKERS - 2 DAYS - 2 TRACKS
14-15 October 2017
Location: Online
Access platform

4 TRACKS

Machine Learning AI Online With The Best Conference

1

MACHINE LEARNING RESEARCH
Machine and Deep Learning Fundamentals, implementation and new modelling strategies for your frameworks straight from the labs.
Chatbot online developer AI conference

2

DEEP LEARNING,
NLP & CHATBOTS
Detection, tracking & integration tips for robots, drones & autonomous vehicles. Leverage conversational architecture with bot-builders and a slick UX.
Computer Vision online developer AI conference

3

APPLIED AI: STARTUPS, INDUSTRY & SOCIETY
Discover the applications of AI from startups and industry, what it takes to manage an AI company and the impacts on society with this technology.
Platform and Programme Demos online developer AI conference

4

DEMOS & TUTORIALS
Be the first to discover the algorithms, APIs, platforms and tools enabling AI tech with these hands-on sessions, demos and workshops.

FEATURED SPEAKERS

SPEAKERS

Yanick Fratantonio
Yanick Fratantonio
PhD Candidate, UCSB
Yanick Fratantonio is a Ph.D. candidate in Computer Science at the University of California, Santa Barbara, and he is soon going to join EURECOM as an Assistant Professor. His research focuses on the security and privacy of mobile systems, such as Android. His work spans different areas, such as malware detection, vulnerability analysis, characterization of emerging threats, and the development of novel practical protection mechanisms. Recent projects I was involved with include Cloak & Dagger (Android UI attacks), ultrasound cross-device tracking, and Drammer. In his free time, he enjoys playing and organizing Capture The Flag competitions with the Shellphish hacking team. On twitter, he is @reyammer.
Umut Demirezen
Umut Demirezen
STM, Cyber Security & Big Data Research & Development Group Manager
Patrick McDaniel
Patrick McDaniel
Distinguished Professor, Penn State
Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science and Director of the Institute for Networking and Security Research at the Pennsylvania State University. Professor McDaniel is a Fellow of the IEEE and ACM and program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick’s research centrally focuses on a wide range of topics in security and technical public policy. Prior to joining Penn State in 2004, he was a senior research staff member at AT&T Labs-Research.
David Freeman
David Freeman
Anti-Abuse Engineer, Facebook
David Freeman is a research scientist/engineer at Facebook working on spam and abuse problems. He previously led anti-abuse engineering and data science teams at LinkedIn, where he built statistical models to detect fraud and abuse and worked with the larger machine learning community at LinkedIn to build scalable modeling and scoring infrastructure. He is an author, presenter, and organizer at international conferences on machine learning and security, such as NDSS, WWW and AISec, and is currently writing (with Clarence Chio) a book on Machine Learning and Security to be published by O'Reilly. He holds a Ph.D. in mathematics from UC Berkeley and did postdoctoral research in cryptography and security at CWI and Stanford University.
Joseph Bonneau
Joseph Bonneau
Technology Fellow, Stanford
Joseph is a researcher at the Applied Crypto Group at Stanford University and a Technology Fellow at the Electronic Frontier Foundation. His research has spanned a variety of topics in cryptography and security including HTTPS and web security, passwords and authentication, cryptocurrencies, end-to-end encrypted communication tools, and side-channel cryptanalysis. He holds a PhD from the University of Cambridge and BS and MS degrees in computer science and cryptography from Stanford University. He has previously worked as a researcher at Princeton University and as engineer at Google, Yahoo! and Cryptography Research, Inc.
Jinan Jaber
Jinan Jaber
Director Biz Dev, AppGuard
Jinan Jaber is the EVP of Cybersecurity and Strategy of Telo Consulting. Mrs. Jaber has over 16 years of progressive cybersecurity and leadership experience. She is a frequent participant at national conferences, as a cyber thought leader and subject-matter expert. Jinan has extensive knowledge of advanced cyber attacks and threat actors’ techniques, tactics and procedures (TTPs). She has broad experience across security disciplines, including cybersecurity and emerging threats, mobile application security, fraud protection and behavioral analysis, deep and dark web intelligence, phishing, reputation management and brand protection, and insider threat protection. The spectrum of her experience and her applied focus give her a unique insight into the issues that can plague the operationalization of cybersecurity and threat intelligence initiatives. Jinan holds a Masters of Business Administration degree from George Mason University.
Nicolas Papernot
Nicolas Papernot
Google PhD Fellow in Security, Penn State
Nicolas Papernot is a PhD student in Computer Science and Engineering advised by Dr. Patrick McDaniel at the Pennsylvania State University. His research interests lie at the intersection of computer security and deep learning. He is supported by a Google PhD Fellowship in Security. In 2016, he received his MS in Computer Science and Engineering from the Pennsylvania State University and his MS in Engineering Sciences from the École Centrale de Lyon.
Robert M. Lee
Robert M. Lee
Founder & CEO, Dragos Inc.
Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into Forbes’ 30 under 30 for Enterprise Technology (2016). A passionate educator, Robert is the course author of SANS ICS515 – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification. Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. He may be found on Twitter @RobertMLee
Michael Davis
Michael Davis
CTO, CounterTack Inc
Michael A. Davis has been privileged to help shape and educate the global community on the evolution of IT security. His portfolio of clients includes international corporations such as AT&T, Sears, and Exelon as well as the U.S. Department of Defense. Davis’ early embrace of entrepreneurship earned him a spot on BusinessWeek’s “Top 25 under 25” list, recognizing his launch of IT security consulting firm Savid Technologies, which was recognized as one of the fastest growing companies of its decade. He has a passion for educating others and as a contributing author for the “Hacking Exposed” books, has become a keynote speaker at dozens of conferences and symposiums worldwide. Most recently, Davis has served as CTO of CounterTack, provider of an endpoint security platform delivering real-time cyber threat detection and forensics. He chose to join the company because he recognized that the battle is moving to the endpoint, and that conventional IT security technologies can’t protect enterprises. Rather, he saw a need to deliver to the community continuous attack monitoring backed by automated threat analysis. Davis brings a solid background in IT threat assessment and protection to his latest posting, having been Senior Manager Global Threats for McAfee prior to launching Savid, which was acquired by External IT. Aside from his work advancing cyber security, Davis authors through industry publications including InformationWeek and Dark Reading. Additionally, he has been a partner in a number of diverse entrepreneurial startups; held a leadership position at 3com; managed two Internet service providers; and recently served as President/CEO of the InClaro Group, a firm providing information security advisory and consulting services based on a unique risk assessment methodology. Davis' ability to analyze, translate, and make connections among emerging IT and security trends combined with a business and entrepreneurial mindset make him a popular speaker — he strives to present complex concepts in a way that delivers value to a range of listeners. He regularly presents at industry conferences including Black Hat, Interop, SuperStrategies, and InfoSecWorld. His long-term vision, to create systems that will “push defenders ahead of attackers,” is relevant to a wide array of enterprise, government and vertical-industry stakeholders.
Regine Bonneau
Regine Bonneau
Founder & CEO, RB Advisory LLC
Regine Bonneau is a leading expert on cyber security, risk management and compliance. Her career spans 20 years with a focus on technology and processes in the healthcare, financial and energy sectors. Ms. Bonneau is the Founder of RB Advisory LLC, which provides cyber risk management, security assessments, compliance services, forensic audits and privacy consultations for private sector and government clients. She is a sought after speaker and holds leadership roles in several technology industry associations. Ms. Bonneau has been featured in the Orlando Sentinel, the Orlando Business Journal and other prominent publications. Areas of expertise: Risk management, Cyber Risk Management, compliance, cyber security, systems and technology, product development, anti-money laundering (AML) risk and control, business continuity, training and education.
Vinod Vasudevan
Vinod Vasudevan
CTO, Paladion
Vinod Vasudevan is the co-founder and CTO of Paladion. He has over 20 years of experience in the technology and information risk management domain. He is responsible for establishing the company’s technology and services vision, and leading all aspects of the company’s technology development. As the CTO at Paladion, Vinod has serviced large enterprise organizations across the globe for setting up integrated risk management systems, and for streamlining system based operations. Vinod regularly presents in leading global cyber security forums and conferences. He sits on the expert panel of industry consortiums. He is the lead author of the book “Application Security in the ISO 27001 Environment” from IT Governance, UK. Vinod is also the co-author of “Enhancing Computer Security with Smart Technology” published by Auerbach. He is a CISSP.
Tudor Dumitras
Tudor Dumitras
Assistant Prof, U of Maryland
Tudor Dumitraș is a professor in the Electrical & Computer Engineering Department at the University of Maryland, College Park. His research is in the area of data-driven security: he conducts empirical studies of adversary behavior, he builds machine learning systems for detecting malware and attacks, and he investigates the security of machine learning in adversarial environments. He also has a good knowledge of the security industry, having worked for 2.5 years at Symantec Research Labs. In his most cited paper he measured how long zero-day attacks go on undiscovered in the wild. His research has been widely cited in the media, for example in The Economist, the MIT Technology Review, Forbes, and The Register.
David Ting
David Ting
VP, Engineering, DataVisor Inc
David Ting is the vice president of engineering at DataVisor, an innovator in Big Data analytics for financial fraud and anti-money laundering, which utilizes unsupervised machine learning to identify attack campaigns. Prior to DataVisor, he was the VP of Engineering at CARDFREE, where he worked on mobile payment solutions that power three out of the top 10 Food and Beverage apps. He was also previously General Manager of North America for NetEase, and General Manager and SVP of eSports for IGN, which was acquired by Blizzard Entertainment in 2013. He is a big believer in innovation design culture that drives solution that pushes the imagination on scale, simplicity, maintainability and time-to-market. David has rich domain expertise in mobile, gaming, eCommerce, streaming media and payment. He received his Bachelor of Science in Electrical Engineering from UCLA and worked on his advanced degree in Computer Science at Stanford University.
Candan Bolkubas
Candan Bolkubas
CTO, Normshield
Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring. Candan is responsible for the technical direction and innovation of NormShield products. Besides being a certified Ethical Hacker, he is a certified secure programmer, certified incident handler and a certified computer hacking forensic investigator. He has more than ten years of experience working with data protection and information security standards and technologies including business continuity, data-loss protection, data privacy, disaster recovery, encryption, enterprise architecture, firewalls, intrusion detection and prevention systems, penetration testing, physical security, security event management and vulnerability scanning. Candan has a BS degree in Computer Engineering and he has been developing security products, performing penetration testing & forensic analysis, and providing cyber security training. Certifications: CCNA, CCNP, CHFI, ECSP, MCSA, ECIH, CEH, LPT. Candan worked for both public and private sectors for many years and strong supporter of human rights, freedom and privacy.
Eric Lawrence
Eric Lawrence
Software Engineer, Google Chrome
Eric Lawrence (@ericlaw) is a Software Engineer on the Google Chrome Security team, helping bring HTTPS to every site on the web. Prior to Google, Eric spent a decade building browsers and websites for Microsoft, and was best known as the original developer of the Fiddler web debugging platform. Eric blogs about security and software development at https://textslashplain.com/.
Amir Husain
Amir Husain
Founder & CEO, SparkCognition
Amir Husain, recognized as Austin’s Top Technology Entrepreneur of the Year and one of Onalytica’s Top 100 global Artificial Intelligence influencers, is a serial entrepreneur and inventor with more than 50 filed patents. He is the founder and chief executive officer of SparkCognition, an award-winning machine-learning/AI-driven cognitive analytics company. He is the author of the upcoming book, The Sentient Machine, to be published by Simon & Schuster.
Mathias Payer
Mathias Payer
Assistant Professor, Purdue
Mathias Payer is a security researcher and an assistant professor in computer science at Purdue university leading the HexHive group. His interests are related to system security, binary exploitation, user-space software-based fault isolation, binary translation/recompilation, and (application) virtualization. His research focuses on protecting applications even in the presence of vulnerabilities, with a focus on memory corruption. Before joining Purdue in 2014 he spent two years as PostDoc in Dawn Song's BitBlaze group at UC Berkeley. He graduated from ETH Zurich with a Dr. sc. ETH in 2012. The topic of his thesis is related to low-level binary translation and security. He analyzed different exploit techniques and wondered how we can enforce integrity for a subset of data (e.g., code pointers). All prototype implementations are open-source. In 2014, he started the b01lers Purdue CTF team. Some of his random ramblings on security-related topics are published on a security blog . You can find his publications under Publications or on Google scholar .
Juan Cabarello
Juan Cabarello
Assistant Research Professor, IMDEA
Juan Caballero is an Associate Research Professor at the IMDEA Software Institute in Madrid, Spain. His research focuses on security issues in systems, software, and networks. One of his focus is the analysis of malware and cyberattacks. He received his Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University, USA and was a visiting student researcher at University of California, Berkeley for two years. His research regularly appears at top security venues and has won two best paper awards at the USENIX Security Symposium and the DIMVA Most Influential Paper 2009-2013 award. He is an Associate Editor for ACM Transactions on Privacy and Security (TOPS). He has been in the technical committee of venues such as IEEE S&P, ACM CCS, USENIX Security, NDSS, WWW, RAID, and DIMVA. He has been program chair or co-chair for the Annual Computer Security Applications Conference (ACSAC, 2017), the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA, 2016), the Digital Forensics Research Symposium (DFRWS, 2014 & 2013), the European Workshop on Systems Security (EuroSec, 2015 & 2014) and the International Symposium on Engineering Secure Software and Systems (ESSoS, 2015 & 2016).
David Puron
David Puron
SVP Engineering, Silent Circle
David Puron is a telecommunications engineer, serial entrepreneur and maker, with more than 20 years of experience working with technology. He started his career as software developer and international standards delegate in the telco carrier Telefonica, where he had a rapid promotion getting to be the Open Mobile Alliance Requirements Group Chairman for two years. He jumped in 2009 to the device manufacturer side, working in big companies - such as Huawei - and startups - such as Geeksphone. In 2014, David co-founded the joint venture "Blackphone", the first privacy oriented mobile device manufacturer that won the TIME Magazine's Best 25 Inventions of 2014, Best of MWC 2014 Award by PC Magazine and Top 10 Breakthrough Technologies 2014 by MIT Technology Review among other awards. In the recent years, David has become more and more active in the Internet of Things ecosystem, and currently he is running TipTap Labs as Managing Director and CTO. TipTap Labs is a software development company specialized in secure connected devices, including IoT, wearables and smartphones.
Itzik Kotler
Itzik Kotler
Co-Founder & CTO, SafeBreach
Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security-Art, an information security consulting firm, and before that he was SOC Team Leader at Radware. (NASDQ: RDWR).
Scott Schober
Scott Schober
ScottSchober.com
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Since the beginning of Mr. Schober’s BVS tenure in 1989, the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT and advanced radio devices. As an experienced software engineer, Schober has developed cellular test instruments used for measuring, optimizing and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development (patent pending) of BVS’ cell phone detection tools, used to enforce a ‘no cell phone policy’ in various markets including government, corporate, military, educational, correctional and law enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world. Mr. Schober is a highly sought after subject expert on the topic of Cybersecurity and wireless technology for media appearances and commentary. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CGTN America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition, MSNBC and many more. His security advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The Peggy Smedley Show. He regularly presents at conferences around the globe discussing wireless technology and its role in the current Cybersecurity breaches along with his vision for best practices to stay safe in the future. Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily News, Newsweek, USA Today, and The New York Times. Scott educates all business around the world about how to prepare for a future of Cybersecurity and corporate espionage, opening their eyes to this ever deepening black hole of liability. He has spoken at SecureWorld, ShowMeCon, GovSec, Counter Terror expo, ISS Americas, Espionage Research International, Connected World, ConstrucTech, IEEE and GSM World Congress as well as many business events. Mr. Schober was a VIP attendee at two Concordia Summits both held in New York and was selected to appear in an interview discussing national security. He is a regular contributor on Huffington Post, Fortune Magazine, and blogs for IBM, SecureWorld, HP’s Business Value Exchange, and TripWire’s State of Security. Scott Schober, Pres/CEO of BVS, Author, cyber security expert @ScottBVS www.ScottSchober.com
Brian Kelley
Brian Kelley
CIO, Portage County
Brian Kelley is in his 27th year at Portage County where he has served in the capacity of Chief Information Officer for the past 26 years. He is responsible for the County’s enterprise-wide information technology operations spanning 18 elected officials, over 30 departments, and 700+ users. Under his leadership, Portage County has received international, national, state, and regional recognition for highly successful enterprise-wide IT projects. Brian earned his Master of Public Administration Degree from Kent State University. He completed the Certified Government Chief Information Officer Program at the University of North Carolina at Chapel Hill. Brian is an adjunct professor in the Political Science Departments at Kent State University where he teaches a public sector IT management , e-governance, and strategic planning online graduate courses and undergraduate police role and interviewing course in Sociology. He is also a senior lecturer at the University of Akron where he teaches an undergraduate course in computer and information security. Brian spent fifteen years as a commissioned special deputy sheriff at Portage County, OH, and performed computer forensics and conducted cyber-related investigations. He is currently sector chief for higher education with the Northeast Ohio InfraGard Chapter sponsored by the FBI and he is a member of the Cleveland Electronic Crimes Taskforce sponsored by the Secret Service.
Tyler Moffitt
Tyler Moffitt
Sr Threat Research Analyst, Webroot
Tyler Moffitt is a Senior Threat Research Analyst with Webroot, Inc. He has been with Webroot since 2010 working as a key member of the Threat Research team, immersed deep within the world of malware. Tyler is focused on improving the customer experience through his work directly with malware samples, creating antimalware intelligence, writing blogs, speaking at conferences, and testing in-house tools. Tyler has a passion for hands on learning as he spends his time gathering samples from the wild to test and improve Webroot capabilities to handle the latest malware threats.
Katie Burnell
Katie Burnell
Insider Threat Analyst, Dtex Systems
Katie is a seasoned cyber investigator and insider threat specialist, applying a unique blend of public and private sector experience to her work. Conducting threat assessments through in-depth analysis of user activities, Katie communicates the observed threats to a client’s information security posture; reporting the weaknesses in their information security measures and user practices warranting further investigation. A client portfolio spanning EMEA provides an expert understanding of corporate cultures, legislation and culpability, insider threat maturity, risk appetite acceptance anomalies within companies and the challenges faced at board level. Katie is a qualified OSINT practitioner, certified ‘human hacker’, a Maltego CTF champion and a Women in Cyber advocate. Leisure activities include running, yoga and Egyptology.
Julia Ellefson
Julia Ellefson
VP of Development, Mkacyber
Julia Ellefson has over 17 years of software development experience in variety of industries, with nearly a decade of experience in development for the cybersecurity industry. Ms. Ellefson currently serves as Vice President of Development at MKACyber where she is responsible for leading the development of MKACyber technologies. Previously Ms. Ellefson worked at Concept Solutions leading the development of an enterprise level cyber-focused Incident Management system for a Federal client. Her work ranged from designing, coding, testing, and implementing several Web 2.0 Oracle applications. Preceeding her work at Concept Solutions, Ms. Ellefson held software engineering roles at both Citizant and Verizon. Ms. Ellefson holds Bachelor of Science, Mathematics.
Jason Atlas
Jason Atlas
CTO, Adbrain
Software Executive that started with the birth of the internet as a commercial venture - spent years creating Operating Systems to support distributed systems, servers for internet scale. Have a specialization in intelligent software systems, security and safety technologies, and ML as it is applied in distributed systems, especially focused on concepts of Identity. Currently the Chief Technology Officer at Adbrain, where I oversee engineering data science, and product management.
Daniel Cid
Daniel Cid
CTO, Sucuri, Inc
Daniel B. Cid is the Founder & CTO of Sucuri, VP of Engineering at GoDaddy and also the founder of the open source project OSSEC. He is passionated about security, with special interest for intrusion detection, log analysis, web-based malware research and secure development. You can find more about Daniel on his site https://dcid.me or on Twitter:
Max Bazaliy
Max Bazaliy
Security Researcher, Lookout
Max is a Security Researcher with more than ten years of experience in areas as reverse engineering, software security, vulnerability research and advanced exploitation. Max was a lead security researcher at Pegasus iOS malware investigation. Max is author of various jailbreaks for iOS\tvOS\watchOS.
Graham Penrose
Graham Penrose
Owner, TMG Corporate
Ex-pat Irish living in Belgium, avid traveller 85/196, privacy advocate & alphabet agency contrarian, works for a fee most of the time but also works for free for activists, hacktivists, & the politically homeless. Not available for work in Iran or Turkey due to differences of opinion on human rights. Distrusts anyone who works for a government. Owner of TMG Corporate Services (Private Military Company) & Intelography (Specialized Security Provider - Encryption & TSCM), Blogger at AirGap Anonymity Collective (www.airgapanonymitycollective.com), Anonymous Chronic (@AnonymousCronic) & Peerlyst (@Peerlyst), CMO @MyFaceValue, Social VIP & Systems Innovator @IBMSystems, No.16 Global Influencer #Cybersec & #Infosec @Onalytica, Open Water Diver @PADI, Nomad
Arthur Edelstein
Arthur Edelstein
Developer, Tor Browser.
Arthur Edelstein is a programmer for the Tor Project. He works on the team that develops Tor Browser and contributes features to prevent tracking of users, improve browser security, and enhance the user experience. He also collaborates closely with a team at Mozilla working to bring Tor Browser anti-tracking features to Firefox.
Doina Precup
Doina Precup
Associate Professor, McGill University
Troy Wilkinson
Troy Wilkinson
CEO & Co-founder, Axiom Cyber Solutions
Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective however his greatest achievement in the field of law enforcement came from his ability and skill investigating and prosecuting child pornography and other electronic crimes. Wilkinson was recruited by the U.S. State Department to train police officers in Kosovo on cyber investigations. Working under the George W Bush and Obama presidencies, he was a top U.S. cyber investigator seconded to the United Nations and European Union to lead investigations into political corruption, organized crime, war crimes, financial crimes and terrorism. Together with a team of international investigators, Wilkinson built the first IT forensics lab in the European Union Mission in Kosovo. After returning home to the U.S, Wilkinson co-founded Axiom Cyber Solutions, with a mission to develop intelligent, automated, and self-healing cyber security platforms to help secure America’s businesses against cybercriminals. He is an international speaker on cyber security focusing on the topics of ransomware, DDoS, cyber-crime trends, and cyber security careers.
Joe Palmer
Joe Palmer
Technical Director, iProov Limited
Joe is a skilled and experienced developer and project manager with a degree in Computer Science from UCL. His expertise lies in internet technology, and as co-founder and director of SoftForge he successfully delivered large and complex web-based e-commerce and secure information solutions for clients such as the NHS and Shell. Since 2012 he has led the development of iProov’s proprietary technology.
Abhijitt Mukharjji
Abhijitt Mukharjji
CyberZest Pty Ltd.
A Digital Security Evangelist, working in the domain of Information Security for past 11 years with the experiences spanning across working with Knowledge Processing Industry, Technology Conglomerates, ISVs and Financial Entities delivering range of Security Solutions and Framework for Information Security, Cyber Security and IPR protection. Over all an explicit career in IT and Information Security of over 20 years. A continuous learner, researcher, blogger and a traveller who has worked and travelled across 34 countries. Originally from New Delhi, India and now based in Sydney, Australia where he is managing the security of an International Bank. His list of qualifications entails an Honours in Bachelors of Commerce with specialisation in Tax Planning and Financial Management,MCA, MBA from IIM Calcutta, India, LLB, PGD in Cyber Laws and IPR Management from Indian Law Institute, New Delhi along with other Industry certifications like CISSP, CISA, ISO27001 LI, CPISI PCI DSS, CEH, CHFI, Six Sigma, ITIL, PMP, PRINCE2.
Khadir Fayaz
Khadir Fayaz
VP, Global Security Strategy, Engineering and Architecture, Pearson
Khadir Fayaz is a recognized Cyber Security Executive Leader with more than 16 years of experience in driving large scale technology security initiatives, cyber resiliency programs and risk management. Experience includes Financial, FMCG, Education, Manufacturing, Technology Consulting and Hospitality/Travel industries requiring on demand adaptability, high availability, and secure architecture. Currently employed with Pearson as a VP, Global Security Engineering and Architecture.
Jamie Graves
Jamie Graves
CEO & Founder, ZoneFox
Jamie is a data security and enterprise software entrepreneur and is the CEO at ZoneFox. He attended the prestigious Ignite course at Cambridge University’s Judge Business School, and the Entrepreneur Development Programme at MIT. Jamie has a PhD in Computer Science, extensive security and digital forensics experience and was recently recognised as the 'Champion of Champions' at the inaugural Scottish Cyber Security awards for his contribution to the industry. ZoneFox protects business-critical assets; data and IP and has a proven track record protecting reputation, sales revenue, and competitive advantage for its growing client base.
Mark Weatherford
Mark Weatherford
Chief Cybersecurity Strategist, vArmour
Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He has more than 20 years of security operations leadership, and executive-level policy experience, in some of the largest and most critical public and private sector organizations in the world. His experience includes roles at The Chertoff Group, an appointment by President Obama as Deputy Under Secretary for Cybersecurity at DHS, VP & CSO at the North American Electric Reliability Corporation (NERC), an appointment by Governor Schwarzenegger as CISO for the state of California, and CISO for the state of Colorado.
Abbas Kudrati
Abbas Kudrati
Chief Information Security Officer, KPMG AUS
Abbas Kudrati is the chief information security officer for KPMG Australia, responsible for managing cybersecurity policies, standards, and best practices to protect the firm’s information systems. He has more than 20 years of working experience with cross-functional sectors of cyber security, information security and information risk management, with skills in cyber security strategy, information security management, ethical hacking, cloud and BIG Data security, IT contingency planning, information system security auditing and compliance in various industries including government, Big 4 consulting, banking, financial, telecommunications and education sectors. He is a frequent speaker at external conferences, events and local universities on the topics of cyber and information security. He is a Certified Chief Information Security Officer (C|CISO), Certified Information Security Manager (CISM) and a Certified Information Systems Auditor (CISA), among other professional certifications.
Mamoun Alazab
Mamoun Alazab
Lecturer of Cyber Security, Macquarie University
Shawn Riley
Shawn Riley
Chief Data Officer & Cybersecurity Scientist, Champion Technology Company Inc.
A recognized thought leader in the defense and intelligence communities, Shawn Riley, Executive Vice President at The Center for Strategic Cyberspace and Security Science, brings over 25 years of cyber security, all source cyber threat intelligence, and artificial intelligence experience with an unparalleled understanding of the pitfalls that overtake modern security teams.
Lonnie Benavides
Lonnie Benavides
Head of Cybersecurity Active Defense, McKesson
Lonnie was formerly the Senior Director of Security Operations at Docusign, and he has over 20 years of information security experience. In 2007, he was part of a hand picked Air Force red team that took over The White House network in two hours. Lonnie then led the Application Security Team at Washington Mutual and also created the Red Team at Boeing. He is an expert in security operations, enterprise security assessment strategy and vulnerability management.
Raj Samani
Raj Samani
Fellow & Chief Scientist, McAfee
Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organisation in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL). Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. Raj Samani is a sought-after speaker and regularly appears on television commenting on the top IT security issues driving headlines today. Samani’s recent speaking engagements include Mobile World Congress and RSA.
Moty Cristal
Moty Cristal
CEO, NEST Negotiation Strategies
Moty Cristal is the founder of NEST Group and the CEO of NEST Consulting. Following an illustrious career as one of Israel's leading negotiation experts, Cristal established NEST in order to bring a unique systemic approach to the world of negotiation and the benefit of his experience and success to the private and public sector. From 1994 to 2001, Mr. Cristal served in various official capacities in Israel's negotiation teams with Jordan and the PLO, and experienced years of intense negotiations. Since 2001, Mr. Cristal advises, consults and trains business people, top managers, CEOs and senior government officials in US, Europe (UK, France, Spain, Germany, Austria, Serbia, Greece, Italy) Russia and CIS and Asia (China, Singapore, Sri-Lanka, Australia and New Zealand) in analyzing, planning and designing complex negotiation processes. His experience extends to the energy, construction, financial, technological, pharmaceutical, industrial, transportation and aeronautical sectors, and varies from complex deal-making negotiations, business cross-cultural disputes, union-management conflicts, post-merger integration, project integration and project management to business and national crisis management. Cristal is a Lt. Col. (Res.) in the Israeli Defense Forces, with extensive operational experience in crisis negotiation and crisis management, within the physical and the virtual worlds. He is a Professor for Negotiation Dynamics at SKOLKOVO, Moscow's leading Business School, as well as a lecturer at Hebrew University in Jerusalem, the Lauder School of Government at and the Arison Business School at the Interdisciplinary Center in Herzelia. Mr. Cristal commentates and writes regularly on the international media, international conferences and academic publications on negotiation processes and crisis interventions. (See recent profile article: http://www.haaretz.com/weekend/magazine/.premium-1.556814) Graduated Bar-Ilan Law School in Israel (1994), and Harvard Kennedy School of Government (1998), Mr. Cristal is also a doctoral researcher at the London School of Economics. Personal email: cristalm@nest-consulting.net
Gib Soreno
Gib Soreno
Chief Cybersecurity Strategist , Leidos
Gib Sorebo is a Chief Cybersecurity Technologist for Leidos where he develops strategy and solutions, leads large cybersecurity captures, and provides subject matter expertise to commercial and government customers. He has been working in the cybersecurity industry for more than twenty years in both the public and private sector. In addition to federal and state governments, Gib has done security consulting and led professional services teams in the financial services, healthcare, and energy sectors. He also recently co-authored a book on Smart Grid Security that was published in December 2011.
Yan Shoshitaishvili
Yan Shoshitaishvili
PhD Candidate, UCSB
Yan Shoshitaishvili is a Assistant Professor of Computer Science at Arizona State University. Over much of the last decade, he has pursued techniques in the automation of Computer Security, building frameworks (angr.io) and whole systems (shellphish.net/cgc) to enable the assistance of security researchers by autonomous systems. He route to Computer Security involved accidental buffer overflows in C code written in elementary school, hacking his friends for fun in high school, protecting networks in college, and competing in cybersecurity competitions with his team, Shellphish.
Jen Tong
Jen Tong
Developer Advocate, Google Cloud
Jen is a Developer Advocate on Cloud at Google. In this role she helps developers build cool stuff on all sorts of platforms. Previously she worked in a wide variety of software roles from robotics at NASA, to developer advocacy for Google Glass. She is passionate about education, especially on the subjects of technology and science. If she’s away from her laptop, she’s probably skating around a roller derby track, or hanging from aerial silk.
Marudhamaran Gunaseka
Marudhamaran Gunaseka
Software Security Consultant, Prowareness
Marudhamaran Gunasekaran (Maran) is a Software Security Consultant at Prowareness who focuses on helping Organizations implement Security Initiatives and delivering secure software at a faster pace. He is an ICAgile Certified Coach and works with Agile Software Development Teams and Portfolio Managers daily switching between a developer and security coach roles. At his spare time he digs the OWASP ZAP project, moderates some security meet up groups in India and The Netherlands, and enjoys watching comedy. He blogs at https://renouncedthoughts.wordpress.com./
Brian Liceaga
Brian Liceaga
Senior Security Consultant, Evolve Security
Brian Liceaga has worked and consulted for organizations of all sizes from start-ups to large corporations. Brian’s experience includes vulnerability management, application security, incident response, security program development, cloud security, DevSecOps, and penetration testing. Notably, he has developed and implemented solutions to establish secure SDLC processes for Waterfall and Agile environments. Recently, his focus has been on next-generation vulnerability management utilizing automation and orchestration as well as finding solutions for privacy and security to better coexist.
Florian Tramèr
Florian Tramèr
PhD, Stanford University
Florian Tramèr is a second year PhD student at Stanford University, advised by Prof. Dan Boneh. He is interested in various aspects of Machine Learning Security, from adversarial examples to attacks on model confidentiality and data privacy. Before starting his PhD, he was a Master student and researcher at EPFL, Switzerland, working on various topics in Cryptography and Cryptocurrencies.
Reza Shokri
Reza Shokri
CS Assistant Prof, NUS
Reza Shokri is a computer science assistant professor at National University of Singapore. He is an active member of the security and privacy community, and his research focuses on data and computational privacy. He received his PhD from EPFL.
Aaron Rinehart
Aaron Rinehart
United Health Group, Chief Enterprise Security Architect
Aaron Rinehart currently serves as Chief Enterprise Security Architect at the United Health Group and has worked and consulted in the field of Information Security and Technology for organizations such as the Department of Homeland Security (DHS), National Aeronautics and Space Administration (NASA), and the Department of Defense (DoD). Aaron has been a featured speaker at several media outlets and conferences, most notably the National Press Club in Washington DC, RSA, HITRUST, and ABC News. Aaron has been interviewed and quoted in various publications including the Huffington Post, Medill News Service, and CBS MarketWatch.
Jaime Blasco
Jaime Blasco
AlienVault, Vice President & Chief Scientist
Jaime Blasco is a renowned Security Researcher with broad experience in network security, malware analysis, and incident response. At AlienVault, Jaime leads the Lab Intelligence and Research team that leads the charge of researching and integrating threat intelligence into detection mechanisms. Prior to working at AlienVault, he founded a couple of startups (Eazel, Aitsec) working on web application security, source code analysis, and incident response. He is based in San Francisco. Jaime’s work in emerging threats and targeted attacks is frequently cited in international publications such as New York Times, BBC, Washington Post and Al Jazeera.
Chris Doman
Chris Doman
AlienVault, Security Researcher / Threat Engineer
Chris had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense’s forensics competition. Chris run a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
Ahmad Abdulkader
Ahmad Abdulkader
Voicera, CTO
Ahmad Abdulkader is CTO of Voicera and a well-renowned industry expert in Machine Learning, Deep Learning, and Neural Networks. Before co-founding Voicera, Abdelkader served as a lead architect for Facebook’s applied AI efforts, which produced platforms like DeepText, a text-understanding engine with near-human accuracy in over 20 languages. Prior to that, he worked at Google, building OCR engines, Machine Learning systems, and computer vision systems. Prior to Google, Abdulkader led a number of teams at Microsoft Ad-Center & Bing. He also built the state of the art 'Handwriting Recognition Technology' which currently powers Microsoft's touch devices including 'Surface'.
Philipp Jovanovic
Philipp Jovanovic
Postdoc Researcher, EPFL
Philipp Jovanovic is a cryptographer and post-doctoral researcher at the Swiss Federal Institute of Technology Lausanne (EPFL), in Switzerland. He obtained his PhD in cryptography from the University of Passau, Germany, in 2015. Philipp designed several cryptographic algorithms, such as NORX and OPP/MRO, and protocols, like CoSi, ByzCoin, and RandHound. He is actively involved in the development of open source projects like the kyber crypto library or the cothority framework for scalable, decentralized, cryptographic protocols, and he works as an adviser on the DFINITY project. His research is published regularly at top crypto/security conferences such as IEEE S&P, USENIX Security, or EUROCRYPT, and he is frequently active at non-academic events like the Chaos Communication Congress, Troopers, or dotSecurity. Philipp tweets as @daeinar.

Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

Yanick Fratantonio, EURECOM

Control-Flow Hijacking: Are We Making Progress?

Mathias Payer, Purdue University

ICS Cyber Attacks: Fact vs. Fiction

Robert M. Lee, Dragos, Inc.

Cybersecurity and DevOps – Focusing on “Build Security In”

Regine Bonneau, RB Advisory LLC

Reducing Attacker Dwell Time and Increasing Speed of Response

Vinod Vasudevan, Paladion

Scalable Bias-Resistant Distributed Randomness

Philipp Jovanovic, EPFL

Hacker Reconnaissance w/ OSINT

Candan Bolukbas, Normshield

Moving to HTTPS in 2017

Eric Lawrence, Google Chrome

The Rise of Potentially Unwanted Programs: Measuring its Prevalence, Distribution through Pay-Per-Install Services, and Economics

Juan Caballero, IMDEA

Encrypting the Internet of Things

David Puron, Silent Circle

Putting Security First in Web Application Development

Itzik Kotler, Safebreach

Navigating the Looming Cyber Threats on the Horizon

Brian Kelley, Portage County

Putting Security First in Web Application Development

Julia Ellefson, Mkacyber

Finding the Grumpy Old Troll - Using traditional cross device detection methods as a tool for blocking trolls

Jason Atlas, Adbrain

Secure Authentication using Face Verification

Joe Palmer, iProov Limited

Building an Effective Cyber Defense Portfolio

Khadir Fayaz, Pearson

The Typical Day in The Life of a CISO

Abbas Kudrati, KPMG Aus

How to Build a Threat Intelligence Program

Lonnie Benavides, McKesson

Cyber Extortion: How to Negotiate with Cyber Criminals

Moty Cristal, NEST Negotiation Strategies

Firebase security rules - Protecting App Data from the Zombie Apocalypse

Jen Tong, Google Cloud
Presenting companies include
NUS
Prowareness
Google Cloud
STM
Leidos
NEST Negotiation Strategies
McAfee
McKesson
Champion Technology Company Inc. -- www.DarkLightCyber.com
Macquarie University
KPMG Aus
vArmour
ZoneFox
Pearson
iProov Limited
Axiom Cyber Solutions
McGill University
Gotham Digital Science
Tor Browser
TMG Corporate
Lookout
Sucuri Inc
Adbrain
CheckRecipient
Mkacyber
Dtex Systems
Webroot
Portage County
Safebreach
Silent Circle
IMDEA
Spark Cognition
Google Chrome
EPS
Normshield
DataVisor Inc
STM
EPFL
Paladion
RB Advisory LLC
CounterTack Inc.
Dragos Inc
ScottSchober.com
Telo Consulting
Stanford
LinkedIn
Purdue
Penn State
UCSB
Netsparker

AGENDA EST

9am-6pm EST // 6am-3pm PST // 3pm-12am CEST // 9pm-6am GMT+8
SYSTEM SECURITY AND BROWSER SECURITY
SECURITY & PRIVACY IN MACHINE LEARNING
AND Cyber Security Operations in Industry
9:00 am
9:40 am
9:40 am
10:20 am
10:20 am
11:00 am
11:00 am
11:40 am
11:40 am
12:20 pm
12:20 pm
1:00 pm
Brian Liceaga
Senior Security Consultant, Evolve Security
Corrective Cloud Security in AWS with Lambda Functions

An overwhelming number of security controls revolve around generating and forwarding alerts to System Administrators or a Security Operations Center (SOC). These mechanisms often require a significant human element to actively manage and triage alerts. In addition, alerting tools require ongoing TLC, a.k.a. tuning, and typically result in alert fatigue or delayed response times. To ensure a timely response to security events, 24/7 SOCs and response SLAs become a necessity. Unfortunately, a SOC is a luxury which many organizations cannot afford. To overcome this challenge, automated corrective access controls must be deployed in conjunction with preventative access controls in order to effectively manage security threats and discourage alert fatigue. In a cloud environment, automated corrective controls can be triggered based on specific events deemed as security violations. In AWS, this can be achieved using AWS Lambda functions. This talk will focus on how to implement automated corrective access controls in AWS to quarantine users based on security policy violations.

1:00 pm
1:40 pm
1:40 pm
2:20 pm
2:20 pm
3:00 pm
3:00 pm
3:40 pm
3:40 pm
4:20 pm
4:20 pm
5:00 pm
5:00 pm
5:40 pm
5:40 pm
6:20 pm
SYSTEM SECURITY AND BROWSER SECURITY
SECURITY & PRIVACY IN MACHINE LEARNING 
AND CYBER SECURITY OPERATIONS IN INDUSTRY
9:00 am
9:40 am
9:40 am
10:20 am
10:20 am
11:00 am
11:00 am
11:40 am
11:40 am
12:20 pm
12:20 pm
1:00 pm
Gib Sorebo
Chief Cybersecurity Strategist, Leidos
Best Practices for An Industrial Control System Asset and Configuration Management Program

This talk will focus on an important but frequently overlooked area of Industrial Control System cybersecurity, asset and configuration management. While asset owners often do a good job of physical inventories, their management of software assets and their configurations on the OT side often leave much to be desired. While NERC CIP has forced utilities to dramatically improve their change and configuration management processes, particularly the tracking and approval aspects, many other industries are still operating in the dark in many cases. Moreover, even with utilities, the efforts may still rely heavily on labor-intensive, spreadsheet-based processes. We will discuss how organizations can insert more automation to not only improve security but also reduce costs. The session will highlight both the tools available, and, more importantly, the steps used to integrate those tools into a process appropriate for the environment.

1:00 pm
1:40 pm
1:40 pm
2:20 pm
Moty Cristal
CEO, NEST Negotiation Strategies
Cyber Extortion: How to negotiate with Cyber Criminals

Many believe that “To pay or not to pay?” is the fundamental dilemma in ransomware and cyber extortion. However, who is the crisis manager, and what should be the engagement process with the hackers, shareholders, customers and frustrated employees are far more relevant, and urgent, issues to address. This brief presentation will focus solely on managing the human dimension in cyber crisis, and will cast light on how to negotiate with cyber-criminals, as well as how to set up the company’s crisis management structures.

2:20 pm
3:00 pm
Shawn Riley
Chief Data Officer & Cybersecurity Scientist, Champion Technology Company
An A.I. Cyber Defense Expert System for Active Cyber Defense and Trusted Information Sharing

DarkLight is a first of its kind, AI-based expert system which enables sense-making and decision-making for active cyber defense and information sharing. /It helps an organization to immediately deploy a scientific, evidence-based foundation for vastly improved cyber security operations and automation of their most highly-prized resource: the logic and experience of the human analyst. DarkLight automates what was previously solely a human task in frameworks such as the Integrated Adaptive Cyber Defense (IACD), a collaboration between NSA, DHS, Johns Hopkins APL and many industryleading vendors. Upper-level sense-making and decision-making functions which require human expertise and analytic tradecraft in the loop are now captured, augmented and/or automated to perform at machine speed, while the human remains on the loop only as needed, to further train and guide the AI. Created, tested and proven at one of the nation's most advanced research aboratories over the course of more than four years, the company has been granted multiple patents on this unique technology. The company recently emerged from stealth and first demonstrated the product publicly at the RSA Early Stage Expo in February 2017.

3:00 pm
3:40 pm
3:40 pm
4:20 pm
4:20 pm
5:00 pm
5:00 pm
5:40 pm
5:40 pm
6:20 pm

TICKETS

WHAT PEOPLE SAY
REGISTER
SPONSOR

SPONSOR

Media Partners

Community Partners