Join us for the biggest, final meetup event of 2017, the NS1 Information Security Wrap-up! Six experts will be presenting 15-20 minute talks on subjects near and dear to the heart of anyone who cares about keeping their company's and customers' data safe and secure.
Benjamin "Phoenix" Morgan
Will Artificial Intelligence (AI) destroy the world first, or will humans? This year we have seen many cybersecurity issues occur. What is the real threat? Man or Machine? Phoenix Morgan will cover "shenanigans" that have happened on both sides and who really is the greatest threat...Us or AI? Prepare to laugh and groan as you hear how humanity and its code are stumbling into the future, for better or worse.
Phoenix Morgan is a polyglot with an extensive background in financial markets, psychology, computer science, marketing/advertising and cognitive enhancement/longevity. He combines the best of many disciplines to provide innovative, out-of-the-box (and sometimes out of your mind) solutions to problems that challenge today's companies. He acts as a liaison between the C-Suite and the Geek Suite, bridging the two worlds that are both creating the future now.
2016 was the year of broken precedents for cyber security at the national level, 2017 is likely to be the year of broken precedents for cyber security at the business level. A review of how 2016 and 2017 differed via side by side comparisons.
Calvin Liu is the CEO and cofounder of Basteon Inc, a ransomware, business continuity and cyber loss warranty provider to SMBs. He has had considerable experience dealing directly with cyber crime via his previous role as COO of Ventura Enterprise Risk Management — the Ventura team’s work has led to over 200 arrests for cyber crimes.
Elvis M. Chan
Advances in technology have made businesses run more effectively, but also left them more vulnerable to cyberattacks and cybercrime. We will discuss current cyberthreats facing businesses, the FBI's role and response to cybercrime, and our recommendations for pre-breach and post-breach efforts.
Elvis Chan is a Supervisory Special Agent (SSA) assigned to the FBI San Francisco. He manages a squad responsible for investigating national security cyber matters. With over 11 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. He was the lead agent on significant cyber investigations and managed joint counterterrorism operations with domestic and foreign law enforcement agencies. Prior to joining the Bureau, he was a process development engineer in the semiconductor industry for 12 years.
Find out how email authentication has risen as an effective, DNS-based tool for anti-phishing. There's been a substantial increase in the deployment of DMARC, SPF, and DKIM in 2017, and an increased emphasis on enforcement over simple reporting. Learn how email authentication can stop email impersonation attacks and provide visibility and control over shadow email, as well as the myriad benefits to the business of trusted email.
Peter Goldstein is an MIT and Stanford trained technologist who has worked in a variety of software verticals including security, enterprise, email, and video. He has built products and teams at a number of large technology companies such as RSA Security and Perot Systems, as well as at small startups like Tout, Securant, and Swapt. He co-founded ValiMail, the leader in automated email authentication, in 2015.
Location, location, location. A common phrase in real estate but also an important question in computer security. The location of customers is changing from in-store presence to virtually anywhere in the world. Along with the shift in customer location, retail infrastructure is now remote and often offshore. The criminal is no longer someone holding up a single store but inexperienced youth to experienced professional criminals all chipping away at one’s defenses. Retail is under extreme pressure to reduce costs, provide service and value, with reduced budget and staff, while threats increase and hacking gets less expensive. Knowing the location of your users and customers is valuable data to protect corporate assets.
Robert Morris has been in the industry for over 20 years providing technical support at many levels. Past roles have included Unix administration, network management and design, enterprise management systems, and computer security. Projects include HIPAA compliance, pen testing, managing client’s firewalls and promulgating security policies. Most recently, he completed a VPN replacement project for a major retailer.
W. Jenks Gibbons
2017 saw the continued move to cloud infrastructure and DevOps. The speed that teams have been moving to these new environments has left Security and IT in the dark regarding software vulnerabilities, configuration issues and other items that can leave infrastructure open to attacks and regulatory violations. In addition, many traditional security tools don't work in these new environments or across hybrid ones. With continued wide-spread container adoption, 2018 is set to increase the speed and related issues. How can Security and Operations provide a transparent continuous security and compliance program to move DevOps to DevSecOps?
W. Jenks Gibbons is currently working as a Solutions Architect at CloudPassage. He has spent his career as a Solutions Architect focusing his time on security as well as software process development improvements. This journey has included roles at Widevine Technologies, YouTube and currently CloudPassage. His focus has been in areas such as DRM for video, workload security, and continuous integration, continuous deployment.
444 Townsend St