WEDNESDAY | MAY 11 | ALL DAY
The Security Summit offers a full day, security-focused track open to all InnoTech attendees.
|8:30 AM - 4:00 PM|
|Exhibit Hall B||Expo Hall Open|
|9:00 AM - 9:50 AM|
|Room 4||The New World Order: Crypto, Disinformation and War||Roy Hadley - Adams and Reese LLP|
Russia’s invasion of Ukraine has upended our vision of the world order. In this session, we will discuss how the current state of the world forces us to look at technology, information and our everyday lives through a new lens, as what we thought was clear isn’t so clear anymore.
|9:50 AM - 10:30 AM|
|Exhibit Hall B||Exhibits, Demos, and Coffee Break (Sponsored by Harness)|
|10:30 AM - 11:20 AM|
|Room 4||The Good, The Bad, The Hacked||Donovan Farrow - Alias|
The way you handle a cyber-attack is critical to your business’s recovery. In this presentation, Donovan Farrow will teach you the proper ways to react in the event of a cyber-attack. As an incident responder, he's worked countless incident response engagements. Hear firsthand stories about businesses that had a good incident response plan, businesses that had a bad incident response plan execution, and businesses that responded so poorly they couldn’t recover. Learn about the good, the bad, and the hacked.
|10:30 AM - 11:30 AM|
|Room 3||Stopping Attacks, Not Your Business: AI and Autonomous Response|
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Darktrace in this session where we explore the benefits of Autonomous Response as a must-have that goes beyond ‘defence’. Includes real-world threat finds and attack scenarios.
|11:30 AM - 1:00 PM|
|Exhibit Hall A, First Floor (Enter through Exhibit Hall B)||Preparing For the Next Global Event, How to Weaponize Cloud Computing Today Capitalize on a Quickly Changing World||David Linthicum - Deloitte Consulting|
It’s no secret that during the global pandemic some companies did very well, and some companies not so much. Even enterprises in the same market space, and relatively the same size. Why did some succeed during adversity, and others fail? For most it was the ability to weaponize technology to provide flexibility for both their workforce and their customers in how they deal with the company, as well as its products and services. Also, it was the ability to see the bigger picture, and invest in technology when everyone else was laying off workers, removing some products from inventory, and just preparing for failure. So, it’s apparent that not only the brave and the visionary won, but those that leverage technologies such as cloud computing as a true force multiplier for their business. Adding the ability to scale, work around global disruptions such as COVID, and provide a business where volatility to be turned into business opportunities. Would you like to understand how? In this presentation David Linthicum will take you through the process of rethinking how your enterprise operates, and how to turn cloud computing into an indispensable weapon that will double revenue in a few short years, and turning worldwide disruptions into opportunities for revenue and job growth that most did not see coming.
|1:00 PM - 1:50 PM|
|Room 3||Experience-First Networking||Skip Bayro - Juniper Networks|
Chris Hall - Juniper Networks
Maximize user and IT experiences with secure client-to-cloud automation, insight, and AI-driven action. In today’s world, experience is the first and most important requirement for networking in the cloud era. Ensuring your networks aren’t just up and available but are also providing the best user and operator experiences. This requires a relentless focus on experience, from when customers first engage to how they deploy and manage solutions on a day-to-day basis. By making applications and data the network’s priority, you are enabled to build agile networks, leverage CI/CS and DevOps approaches and lead the digital transformation. Join our breakout and see for yourself the benefits of an experience-first network!
|Room 4||Dissecting Threat Intel for Practical Threat Hunting||Larci Robertson - Cybereason|
Peter Ortiz - Cybereason
Threat hunting isn’t based on flashy technology that will become irrelevant in a few months. It’s a return to one of the basic tenets of information security: reviewing your IT environment for signs of malicious activity and operational deficiencies. With hunting, you can answer the question, “Am I under attack?” With more infrastructure moving to the cloud, how do we leverage these data sources to contextualize and extend threat hunting efforts?
|2:00 PM - 2:50 PM|
|Room 3||Defending the Metaverse||Jonathon Cerda - Sysdig|
The buzz around the emerging Web 3.0 space is causing corporations to dive head first into the industry, but is it safe? With so many moving parts, how do you identify security risks? This presentation describes the underlying technologies that support Web3 economies while overviewing its cyber security landscape. There will also be broken down examples of recent exploits like the OpenSea hack, and compromised Discord servers.
|2:45 PM - 3:30 PM|
|Exhibit Hall B||Happy 45-Minute Reception, Sponsored by Red Hat|
|Exhibit Hall B||Happy 45-Minute Reception|
|3:30 PM - 4:20 PM|
|Room 4||Top 5 Drone Myths and Misconceptions||Michael Hill - Cumulus Technologies, Inc.|
There’s a lot of hype about drones, but what is real and what is just marketing hype? A top industry expert will shed light on the technology, regulatory landscape, logistical barriers, and opportunities with this new innovative technology.
Thank you to our IT Leadership Forum Sponsors: