RSAC 2021 #2View Show Index
“Behind the scenes of the cyber fight” – talking about the good on the defender side, taking down cyber criminal supply chains, partnerships, taking down ransomware gangs.
This segment is sponsored by Fortinet.
Visit https://securityweekly.com/fortinet to learn more about them!
Derek Manky formulates security strategy with more than 20 years of cybersecurity experience behind him. His ultimate goal to make a positive impact in the global war on cybercrime. Manky provides thought leadership to industry, and has presented research and strategy worldwide at premier security conferences. As a cybersecurity expert, his work includes meetings with leading political figures and key policy stakeholders, including law enforcement. He is actively involved with several global threat intelligence initiatives all in effort to shape the future of actionable threat intelligence and proactive security strategy.
Michael Daniel currently serves as the President & CEO of the Cyber Threat Alliance (CTA), a not-for-profit that enables cyber threat information sharing among cybersecurity organizations. Prior to coming to CTA in March 2017, Michael served for four years as US Cybersecurity Coordinator, leading US cybersecurity policy development, facilitating US government partnerships with the private sector and other nations, and coordinating significant incident response activities. From 1995 to 2012, Michael worked for the Office of Management and Budget, overseeing funding for the U.S. Intelligence Community. Michael also works with the Aspen Cybersecurity Group, the World Economic Forum’s Partnership Against Cybercrime, and other organizations improving cybersecurity in the digital ecosystem. In his spare time, he enjoys running and martial arts.
Security professionals must protect their organizations from the five shifts which will persist after the pandemic: 1) customers will demand safety and convenience; 2) brands will create hybrid experiences; 3) stakeholders will build the future of work; 4) smart firms will retire technical debt; and 5) resiliency will become a competitive asset. Each of those five shifts has profound implications for us, from the nuts-and-bolts of securing a much more remote and cross-border workforce, to the delicate dance required by the rampant growth of data protection and software supply chain nationalism among governments and regulators.
Laura Koetzle leads Forrester’s European Research organization. She previously led the security and risk and the infrastructure and operations research teams. As a Security and Risk Analyst, Koetzle researched operating system security, security architecture, network security, and security incident response, and she served as the Chairperson for Forrester’s inaugural Security Forum event. She is also a member of the Advisory Board and the Program Committee for RSA Conference. Koetzle’s work has enjoyed wide exposure in the media, including BusinessWeek, The Economist, The New York Times, and The Wall Street Journal. Koetzle has also appeared on CNN, CNBC, and Reuters Television, and she is a frequent speaker at information security and executive conferences.
The development life cycle as we know it is rapidly changing, and today’s AppSec testing needs to keep up with shorter and faster processes. A shift-left approach is no longer enough to protect web assets - you need much more dynamic tools and ways of working.
We want to talk about why enterprises should move beyond the shift-left approach, how to approach testing in a more dynamic way, and how this supports a zero-trust model.
This segment is sponsored by Detectify.
Visit https://securityweekly.com/detectify to learn more about them!
Entrepreneurial tech nerd Rickard Carlsson has grown Detectify from a group of ethical hackers with an idea on how to make the internet safer, to an international industry challenger of 140+ people. Rickard has a background in tech and management consulting, and has lived and worked in Sweden, India and the US.
Cloud security, the next frontier. How do we build resilient services in the cloud and secure them. Ganesh Pai, CEO at Uptycs, joins us to discuss a new perspective on cloud security resilience.
This segment is sponsored by Uptycs.
Visit https://securityweekly.com/uptycs to learn more about them!
Ganesh Pai is Founder & CEO of Uptycs. He is a Boston-based entrepreneur and technologist (formerly Akamai, Verivue, NetDevices) and has been awarded multiple U.S. patents. Ganesh received a BE degree in electronics and communication engineering from Mangalore University and a MS in computer science from Temple University.
Security can be somewhat of a mystery at a lot of organizations. Most companies choose to be tight-lipped about the security measures they have implemented. Rightfully so, there is an underlying fear that publicizing your security efforts could make you more vulnerable to security attacks and damage your reputation with your customers. However, there is another way. Transparency can be your ally in security.
In this interview, we will be talking about how transparency practices can lead to improved security. With transparency being one of our core values at GitLab, we will talk about the processes we have implemented to maintain our security stance while operating with the highest possible public transparency and how you can apply them to your enterprise to achieve increased security and transparency.
This segment is sponsored by GitLab.
Visit https://securityweekly.com/gitlab to learn more about them!
Wayne Haber, CISSP is the director of engineering at GitLab for the threat management and growth departments. His teams focus on things including vulnerability management, Kubernetes container security, growth hacking, and engineering productivity. Wayne has more than 20+ years of experience in security and engineering. When not working, Wayne is a dedicated learner averaging one book a week.
A former Gartner analyst, Frank Catucci will share his thoughts on the latest application security trends that will impact the markets in 2021.
Frank Catucci is a global application security leader with over 15 years of diverse experience which grants him the unique ability to see and lead information and application security with a unique, complete and holistic approach. Frank is currently leading efforts within application security and devsecops with groundbreaking security research, techniques and completeness of vision, as a pioneer and leader of application security and devsecops advancement.
The cyber risk ratings market, comprised of companies providing a security rating based on what they can see of your external infrastructure is controversial. In my latest evaluative New Wave looking at this market, we identified a number of issues meaning this market is not ready for the prime time. I'll discuss why that is and what this market has to do make itself useful and valuable to security teams.
Paul is a principal analyst on the Security and Risk team. Paul’s research coverage includes cybersecurity risk ratings solutions and cyber risk quantification; CISO and security leadership research in the European market; and European security service providers, focusing on managed security service providers and security consultancies.
Paul is frequently asked to comment on areas relevant to his research coverage and has been quoted in publications such as the Financial Times, Wall Street Journal, Fortune, ZDNet, SC Magazine, Handelsblatt, City A.M., and Infosecurity Magazine.
Scott Crawford joins us to discuss some of the most frequent trends in the security industry today, including high profile incidents and their impact on the industry.
Scott Crawford is an industry analyst and heads the Information Security team at 451 Research, a technology industry analyst firm now part of S&P Global Market Intelligence. He was the first information security officer for the Comprehensive Nuclear-Test-Ban Treaty organization in Vienna, Austria, and served as a senior strategist with IBM Security before joining 451.
Data privacy and Web security teams are converging across enterprises and we are seeing more Privacy use cases like cookie banner consent and limiting data sharing (vendors like Facebook, Google etc. are capturing sensitive user data, accessing cameras, microphones, geolocation etc.) via security policies, under the security teams purview.
At Tala we offer a Privacy scan that gives enterprises a full view of which vendors have access to sensitive data and how this data is being shared. This in turn helps set the right security controls in place.
This segment is sponsored by Tala Security.
Visit https://securityweekly.com/talasecurity to learn more about them!
Deepika is responsible for product strategy and delivery at Tala. Working closely with our customers, she drives product direction and shapes the product roadmap to address their core needs.
Prior to Tala, Deepika was part of Cisco Jasper where she led the launch of IoT smart city applications. Her career in Product Management began at EMC, in the New Product Introduction team, working on key initiatives across the Storage and the Data Protection divisions.
Deepika has held diverse roles in her career: her first job out of school was in Research and Development of high voltage particle accelerator technology used in cancer therapy machines.