• John Walsh
    Chief Strategy and Technology Officer
    BlackRidge Technology
    Date: 2 October 2019
    Time: 1420 - 1500 hrs
    Venue: Auditorium, Hall 406, Level 4

    John Walsh is Chief Strategy and Technology Officer of BlackRidge Technology (OTCQB: BRTI), and formerly VP Secure Technology Group at Analog Devices, and President of Sypris Cyber Solutions. John is responsible for working with BlackRidge and customer teams to develop product and channel solutions that meet their needs and the needs of the commercial and government markets.

    John has a background in high assurance systems security, security assurance frameworks, IoT/IIoT, secure semiconductors and assured identity, cryptographic key management, systems penetration testing, and the development of trusted architectures using identity as a core element. He holds 11 identity architecture related patents with additional patents pending.

    John is a globally recognized leader and contributor in IoT, Smart Cities, identity-based trust models and architectures, trusted identity solutions using hardware roots of trust, securing trust point to point. John is a thought leader in the growing need to develop a broader view in today’s business and technology ecosystems in the environment of connectivity and new and emerging value chains as part of establishing successful global strategies, partnerships, new product / services development and launches.


    Advanced Identity Management and the Zero Trust Environment in Perimeter Security and Access Management

    Presentation Title

    With Great Connectivity Comes Great Responsibility


    As our systems are continuing to become highly distributed, connected, software defined, the advent of 5G and Artificial Intelligence, the need to be legacy system compliant, and the demand to create new outcomes - our systems are becoming perimeter-less. Zero Trust (ZT) is a security concept anchored on the principle that organizations need to proactively control all interactions between people, data, and information systems to reduce security risks to acceptable levels. It shifts from the traditional security policy of all assets in an organization being open and accessible to requiring continuous authentication and authorization for any asset to be accessible. This fundamental change is the essence of ZT. We will review the requirements of ZT and what and a system approach to providing the unique capabilities to securely integrate ZT elements that are required to accomplish this across multiple domains in both software defined and legacy systems (including IT/Network and OT/IoT) architectures.

    The presentation will provide an overview of the zero trust model, considerations and emerging technologies/methods for achieving zero trust, and an agnostic capability that can tie together the components (i.e. legacy infrastructure, future software defined network, identity access and management methods, analytics, policy/rule enforcement, et al) necessary to achieve the objectives. We will include some demonstrated use cases.

  • Huili Wang
    Regional Technical Director
    Date: 2 October 2019
    Time: 1200 – 1240 hrs
    Venue: MR300 – 301, Level 3

    Leading his team of Cyber Defense Technologists in Asia-Pacific at Darktrace, Wang Huili is responsible for the thought leadership in the field, while driving growth and delivering world leading cyber artificial intelligence (AI) solutions across the region.

    With 14 years in the field, Mr Wang’s experience has helped organisations of all sizes in areas of expertise including AI for Autonomous Response, Cyber Defense, Smart Cities and Big Data Analytics.

    Prior to his current role, Mr Wang has held leadership roles at Hewlett Packard Enterprise and Imperva.


    Cyber Threat Landscape & Intelligence

    Presentation Title

    Autonomous Response AI: The Machine Fights Back


    Online cyber-crime cost the world over half a trillion dollars in 2018, recent data breaches have managed to influence elections, and even our energy grids face the threat of cyber-attack. This troubling state of affairs is the product of fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. With attacks increasingly striking at machine-speed and causing damage in seconds, it’s critical that security technology can be relied on to fight back autonomously. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks.

    For the defenders, self-learning cyber AI is transforming complex and vulnerable organizations into resilient, self-defending digital businesses. Those that fail to deploy AI-based cyber defenses today may find themselves unable to detect the attacks of tomorrow. And crucially, these AI defenses can not only detect threats as they emerge but also autonomously respond to attacks in real time, stopping a cyber-threat every three seconds around the world. As the shortage of trained cyber analysts worsens, the future of security is inevitably autonomous. 

    In this presentation, learn about how autonomous response AI can augment human security teams through:

    • AI approaches for detecting and responding to threats
    • How human teams adopt automated defenses through a journey of trust
    • Concepts of ‘human confirmation’ mode and ‘active defense’
    • Success stories across Smart Cities, digital businesses, and industrial control systems
    • What the cyber arms race means for the future of attacks

  • David Warburton
    Senior Threat Research Evangelist
    F5 Labs
    Date: 1 October 2019
    Time: 1650 - 1730 hrs
    Venue: MR303 - 304, Level 3

    David Warburton is Senior Threat Research Evangelist with F5 Labs with over 20 years’ experience in IT and security. A regular speaker at industry events and contributor to online and broadcast media, he was responsible for the design of a public cloud platform and for helping large government organisations adapt and improve their security posture. He also recently completed an MSc in Information Security with Royal Holloway University where his thesis was on the use of cryptography in IoT.


    Cybersecurity in the Cloud

    Presentation Title

    Managing Your Risk in the Cloud


    Cloud allows us to offload many responsibilities to third party providers, but risk is not one of them. In fact, the use of cloud, shared code libraries and other third party resources is rapidly expanding our attack surface whilst reducing the visibility and control we have over our apps and data.

    Supply chain risk management has been failing to identify and prevent breaches caused by the use of third party components and poorly configured cloud deployments.

    We aim to document the most common form of information supply chain breaches as well as suggest some frameworks and methodologies for reducing the risk in the use of cloud and third parties.