***NOTE*** In order to enter this office you must have an ID or a Driver License.
Join us for an evening with ElasticSearch and Outpost24 and learn how they're combating cybercrime with advanced data analytics and mitigating risk exposure to cyber threats.
5:00PM - Social Hour (Food & Beverages will be provided)
6:00PM - Introduction from organizer and sponsors
6:05PM - Guest Speaker from Elastic
Session Title: Cyber Security...a search problem
Q&A + Short Break
7:00PM - Guest Speaker from Outpost24
Session Title: Full Stack Security and the Prevention of Hacker Pivot
8:00PM - Networking
Speaker Bio: Neil Desai
Neil has built SOC’s (Security Operations Centers), architected defensible, and monitorable infrastructures for Fortune 500 US financial institutions. He has over two decades of information security experience and is currently working for Elastic.
Analyzing terabytes of data with response times measured in seconds is something security analysts dream of. Fast search queries for large amounts of data has been commonplace in other areas of IT. By looking outside of the information security silo to other disciplines, we can learn from them to better our abilities to find threats in the sea of data. By leveraging tools geared towards search and analytics, we can gain insight into the data that we haven’t had before. By enriching the data, we can get even more insight.
Speaker Bio: Bob Egner
With a constant eye on the evolving threat landscape, Bob is the advocate of the customer in their terms of security, value, and experience. He has led marketing, product management, and business development functions for large and small security and e-business companies in all regions of the world. In addition to a special focus on digital marketing, Bob highlights innovative contributions as companies such as Episerver, Check Point Software, and Pointsec.
There’s a gap between the hacker’s view and the defender’s view of an attack. The defender strives to break down the complex whole to simple components that can be assessed individually while the hacker thrives on complexity and sees opportunities in the white space between assessments. In this session you will learn how to move beyond component assessment of devices, networks, applications, data, and users into full stack cyber security assessment.