BH2020 #2

View Show Index

Segments

1. IoT Security, Hacking, Testing & Testing Methods – Deral Heiland – BH20 #2

Sponsored By

Rapid7

Guest

Deral Heiland
Principal Security Research IoT at Rapid7

Deral Heiland, CISSP, has over 20 years of experience in IT. Over the last 8+ years, he has focused on security research, security assessments, pen testing, and consulting.

Host

Chief Product Officer at CyberSaint

2. Black Box to Glass Box Verdicts – Mario Vuksan – BH20 #2

Sponsored By

Reversing Labs

Guest

Mario Vuksan
CEO & Co-Founder at ReversingLabs

Mario founded ReversingLabs in 2009 and currently serves as CEO. In this role he drives all aspects of the company’s strategy, operations and implementation. Prior to ReversingLabs Mario has held senior technical positions at Bit9 (now Carbon-Black), Microsoft, Groove Networks, and PictureTel (now Polycom). He is the author of numerous research studies, speaking regularly at FS-ISAC, RSA, Black Hat and other leading security conferences.

Host

Principal Security Evangelist at Eclypsium

3. Navigating a Post-Compromise Reality – Michael Sanders – BH20 #2

Sponsored By

ExtraHop Networks

Guest

Michael Sanders
Senior Engineer at Extrahop

Michael is responsible for architecting security implementations across hyper-converged networks and is part of ExtraHop’s team of cloud security engineers who work directly with customers and prospects. A passionate technologist and evangelist, he brings fresh thinking to security threat detection. Prior to ExtraHop, Michael was a consultant working with multiple technologies across the security landscape. He holds a Masters Degree from the University of Arizona and a BBA from the University of Georgia. Michael speaks at industry events, supports security research organizations, and has been quoted in industry coverage.

Host

Chief Product Officer at CyberSaint

4. “Demystifying Modern Windows Rootkits” – Bill Demirkapi – BH20 #2

Guest

Bill Demirkapi
Security Researcher at Independent

Bill Demirkapi is a student at the Rochester Institute of Technology with an intense passion for Windows Internals. Bill’s interests include game hacking, reverse engineering malware, and exploit development. In his pursuit to make the world a better place, Bill constantly looks for the next big vulnerability following the motto “break anything and everything.”

Host

Principal Security Evangelist at Eclypsium

5. Threat Hunting Platforms vs. SIEM, What’s the Difference? – Corey Thuen – BH20 #2

Sponsored By

Gravwell

Guest

Corey Thuen
Co-Founder at Gravwell

Corey Thuen is a founder of Gravwell and has spent over a decade doing cybersecurity at places like Department of Energy national labs, Digital Bond, and IOActive. That experience is now driving development of a full-stack analytics platform built to alleviate pain points he personally experienced from inflexible tools.

Host

Principal Security Evangelist at Eclypsium

6. The Entire IT Security Industry – Richard Stiennon – BH20 #2

Guest

Richard Steinnon
Author, Security Yearbook 2020 at IT-Harvest

Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,337 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes and The Analyst Syndicate. He is a member of the advisory board at the Information Governance Initiative. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a BS in Aerospace Engineering and his MA in War in the Modern World from King’s College, London. His latest book, Security Yearbook 2020, is available on Amazon.

Host

Chief Product Officer at CyberSaint

7. Simplifying The Process Of Identifying, Assessing & Mitigating Risks – Liam Downward – BH20 #2

Sponsored By

CYRISMA

Guest

Liam Downward
CEO at CYRISMA

Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.

Host

Chief Product Officer at CyberSaint

8. Being Thorough or Working Fast: Which Matters Most in Security? – Paul Battista – BH20 #2

Sponsored By

Polarity

Guest

Paul Battista
CEO & Founder at Polarity

Paul Battista is CEO and Co-Founder of Polarity.io. Prior to Polarity, Paul was an intelligence officer for the United States Government and participated in all elements of the intelligence cycle from planning operations through dissemination to senior policy makers in the White House. Before his government service, Paul was a senior engineer for Aetna Inc., a penetration tester, and incident responder for multiple fortune 100 customers.

Host

Principal Security Evangelist at Eclypsium

9. Observing Privilege To Reduce Risk In Software As A Service – Chris Morales – BH20 #2

Sponsored By

Vectra

Guest

Chris Morales
CISO and Head of Security Strategy at Netenrich

As an industry leader, Chris Morales oversees Netenrich’s security vision and strategy as Chief Information Security Officer (CISO) and Head of Security Strategy. He’s well known and respected in security circles as an innovative leader and technical expert. Throughout his career, he has advised and designed incident response and threat management programs for some of the world’s largest enterprises. Chris most recently led advisory services and security analytics at Vectra AI. He has also held roles in cybersecurity engineering, consulting, sales, and research at companies including HyTrust, NSS Labs, 451 Research, Accuvant, McAfee and IBM.

Host

Principal Security Evangelist at Eclypsium