Skip to content ↓ | Skip to navigation ↓

Tripwire is so excited for everything it has planned for Infosecurity Europe 2017. In particular, it’s really looking forward to all the speakers it has lined up for the conference. Here are nine talks in particular that attendees to this year’s event won’t want to miss!

People: Back to Cybersecurity Basics

Speaker: Jane Frankland, cyber security entrepreneur, business consultant, and speaker.

When:

06 June 2017, 14:00 – 14:30
07 June 2017, 10:30 – 11:00
08 June 2017, 10:00 – 10:30

Where: Booth D20

In the late 1990s, writer, cryptographer, computer security, and privacy specialist Bruce Schneier popularized a concept that became known as the golden triangle. This approach runs on the premise that operational effectiveness can only be achieved if the relationships between people, process, and technology are optimized.

Within cybersecurity, there’s always been a huge tendency to rely on technology. It’s often been used as a silver bullet to try to eliminate cyberattacks and compliance failures. But whilst people have resorted to new technology and developed processes to support it, this approach has largely failed to achieve operational effectiveness.

Most who have embraced a technology-based method to cybersecurity have been males with military, mathematical, or science backgrounds. Although people from these walks of life do worthy work and are immensely valued and needed, having the same types of people within cybersecurity has limited our thinking capacity. Cyberattacks have become more creative, and hackers have become more collaborative and business-like in their approach. The security industry therefore needs more holistic thinking capabilities, that is, people who can see things in different ways. It needs a new approach.

In her presentation, Jane Frankland will be talking about the foundational steps that the security industry can take to improve the quality of the people it attracts, hires, and retains. She’ll also give guidance on how to develop cultures that will motivate cybersecurity teams to perform at higher standards.

TARA and Read Teaming: Foundational Controls?

Speaker: Peter Wood, chief executive officer of First Base Technologies LLP.

When: 06 June 2017, 11:30 – 12:00

Where: Booth D20

Today’s cyber attacks require an agile and focused response that’s designed to optimize both human and technical resources to counter specific attack methodologies. Our adversaries are well resourced and motivated, using sophisticated techniques, so our defenses need to address the most likely lines of attack with a thoroughly tested and relevant strategy.

Professional threat and risk analyses known as red team exercises are used to design simulated attacks. In his presentation, Peter Wood of First Base Technologies LLP will discuss how they test protective shields as well as incident response capability. He will also shed light on the extent to which these same exercises can also deliver engaging and personalized awareness education to help strengthen the human firewall.

Assessing Your AWS Cloud with Tripwire

Speaker: Ben Layer, principal software engineer at Tripwire.

When:

07 June 2017, 16:30 – 17:00
08 June 2017, 13:30 – 14:00

Where: Booth D20

Ben Layer introduces the Cloud Management Assessor, an integration for Tripwire Enterprise which adds the ability to assess Amazon Web Services management interfaces for a secure configuration. The rapid rise in popularity of Amazon Web Services leaves many users asking the questions, “Is my Amazon management account securely configured, and if not, what do I need to do to secure it?” The Cloud Management Assessor enables the user to answer these questions by leveraging the included Center for Internet Security AWS Foundations Benchmark policy. The Cloud Management Assessor ties in Amazon Web Services configuration and compliance monitoring right along side the rest of customers’ Tripwire-monitored assets.

Brace Yourselves, The EU GDPR Is Coming: Are You Ready?

Speaker: Paul Edon, international services director at Tripwire.

When:

07 June 2017, 16:00 – 16:30
08 June 2017, 14:00 – 14:30

Where: Booth D20

With the European Union’s General Data Protection Regulation (GDPR) on the horizon, the time is ticking for businesses to evaluate their security gaps and address any issues that may impact their compliance.

Despite its origin, this regulation will have a global reach and likely introduce new processes and security considerations to many organisations that store EU citizens’ data.

In this session, Tripwire’s Paul Edon will discuss the top priorities on which businesses should to become compliant, including the steps they can take now to begin preparing for the GDPR; suggested best practices; and provide an overview of how technologies from Tripwire can help.

Out of Chaos: “ITIL” Process for Security

Speaker: Christopher Hill, security software professional at ServiceNow.

When: 

06 June 2017, 11:00 – 11:30
07 June 2017, 14:30 – 15:00

Where: Booth D20

The world of security is moving out of the shadows and into the heart soul of every business. However, an “ITIL” for security is needed. Point solutions with nothing tying them together lead to gaps in security and compliance.

Attend this presentation to learn about key concepts and capabilities for foundational controls and how to increase your security incident response. Topics covered will include Tripwire and ServiceNow integration points, how you can have quicker security incident response on unauthorized change, bigger and better GRC, and more.

Excellence in the Essentials: Why Successful Implementation of the Foundational Controls Can Help

Speaker: David McKissick, senior sales engineer at Tripwire.

When:

06 June 2017, 13:30 – 14:00
08 June 2017, 15:00 – 15:30

Where: Booth D20

It’s a well-known fact that the vast majority of cyber breaches stem from a lack of fundamental IT and security controls. Organizations committed to foundational security controls can more easily protect themselves from attacks and quantify the impact of any data breach.

In this session, attendees will hear about two data-breach stories with very different outcomes. By the end of the presentation, they’ll understand the lessons learned and the value of properly implementing foundational security controls. David McKissick will place special emphasis on explaining why implementing foundational controls effectively can assist in supporting key requirements around security, compliance, and IT operations.

Herding Pets and Cattle: Extending Foundational Controls into the Cloud

Speaker: Ed Smith, senior product marketing manager at Tripwire.

When:

07 June 2017, 11:00 – 11:30
08 June 2017, 14:30 – 15:00

Where: Booth D20

The world of IT is moving to the cloud for flexibility, on-demand computing resources, and speed, just to name a few benefits. However, cloud infrastructures are different from their on-premises counterparts. Not all controls perform equally well between on-premise and the cloud, a divergence which can lead to gaps in security and compliance.

To get to the bottom of these differences, Ed Smith’s presentation will examine key concepts and capabilities for foundational controls in hybrid computing environments. Topics covered will include the Shared Responsibility Model, the CIS Critical Security Controls, centralized management, elasticity, containers, cloud policies and platforms, and more.

Longing for Logs: What You’re Missing Without Centralized Log Management

Speaker: Tim Erlin, VP of product management & strategy at Tripwire.

When:

06 June 2017, 14:30 – 15:00
07 June 2017, 10:00 – 10:30

Where: Booth D20

The market for Security Incident and Event Management (SIEM) products is undergoing an evolution where centralized log management and security analytics are diverging from what was once a common path. As organizations diversify and increase their investment in analytics, the importance of comprehensive and detailed log data has never been higher. It’s simply impossible to build a meaningful analytics program without the right data to supply it.

Log management is one of the most foundational controls for enterprise security, but its value extends further to compliance and IT operations as well. In this presentation, Tim Erlin and attendees will together explore the drivers for log management and the criteria security professionals should use in selecting a log management product.

CISO Confessions: Security Lessons Learned from Modern Day Cyber-Attacks

Speakers: Tim Erlin, VP of product management & strategy at Tripwire; Martin Whitworth, research director for European data security & privacy at IDC; Stephen Khan, head of information security strategy & architecture for the security investment program at the Royal Bank of Scotland; and Thom Langford, CISO at Publicis Groupe.

When: 07 June 2017, 14:00 – 14:25

Where: Strategy Talks

In this panel discussion, attendees will hear security leaders share their real survival stories about life in the hot seat. Panelists will discuss the types of threats their industry is battling and the lessons they’ve learned from defending against them, highlight their most noteworthy successes and failures, and identify the skills every information security professional needs to navigate today’s rising tide of cyber-crime. They’ll also explain how attendees can communicate security to executives and non-technical stakeholders towards building a resilient organization.

To learn more about this panel, please click here.

Conclusion

The folks at Tripwire look forward to seeing you at all the talks mentioned above. Also, don’t forget to check out the rest of Tripwire’s in-booth speaking schedule here. What are you hoping to get out of some of these talks? Let us know in the comments!