Tuesday, October 22, 2024 | |||
---|---|---|---|
Introduction and Fireside Chat | Navigating the Vulnerability Maze: Strategies for Effective Management in an Evolving Threat Landscape | Vulnerability management remains one of the most pressing challenges for cybersecurity professionals today. As the threat landscape evolves, organizations are inundated with vulnerabilities, making it increasingly difficult to prioritize and address the most critical issues. This session delves into the persistent problem of vulnerability overload, exploring:
Join us to learn how to transform your vulnerability management process into a proactive and efficient operation, capable of keeping pace with the ever-changing cybersecurity environment. | Paul Asadoorian - Eclypsium J. Wolfgang Goerlich | |
Breakout Session 1A | Compensating for unenriched CVEs | This session will explore the challenges posed by unenriched CVEs in the National Vulnerability Database (NVD), which has left over 18,000 CVEs without proper CPE identifiers since February 2024. These unenriched reports severely limit automated vulnerability management as they remain invisible to CPE-based searches. With contractors historically managing NVD enrichment and the backlog growing monthly, organizations relying on CVE-based vulnerability databases face significant gaps in visibility. We’ll discuss strategies to compensate for these gaps and the potential of alternative identifiers, like purl, in addressing these issues, particularly in the open-source ecosystem. | Zaira Pirzada - Hive Pro | |
Breakout Session 1B | Reducing Silos Between Developers and AppSec in Your Software Supply Chain | For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, and developer tools, is increasingly essential. However, tracking direct and indirect dependencies, finding, and fixing vulnerabilities can still be siloed. Unified tools and processes exist, providing developers and security teams access to the same security insights, however many organizations have not adopted fundamental dev-centric security tooling. To effectively manage and mitigate supply chain risk a more holistic approach is needed. Join us for this session where we will discuss: An overview of the software supply chain
| Jamie Smith - Snyk | |
Panel Discussion | Vulnerability Management in the Headlines: Proactive Strategies to Stay Ahead of Cyber Threats | Recent headlines have underscored the critical importance of effective vulnerability management as cybercriminals continue to exploit weaknesses faster than ever before. In this panel discussion, cybersecurity experts will analyze:
Join us to gain a deeper understanding of how to protect your organization from becoming the next headline. | Paul Asadoorian - Eclypsium Ed Moore - Carnival Corp Matt Johansen - Reddit | |
How to Think Like an Attacker: Preventative Cyber Security with Censys | In today’s evolving threat landscape, staying ahead of attackers requires more than just traditional, inside-out defensive strategies. Join experts Tabatha Von Koelichen and Harald Roeder as they dive into how Censys solutions empower organizations to identify and close critical gaps in their attack surface—before the bad actors exploit them. This session provides a unique “outside-in” perspective, revealing how hackers view your vulnerabilities. Learn how to think like an attacker and leverage Censys' tools to reinforce your defense strategy and protect your organization from costly breaches. | Tabatha von Koelichen - Censeys Harald Roeder - Censys Robert Heimanson - Censys | |
Breakout Session 2A | Adopting Continuous Threat Exposure Management (CTEM): Insights from Industry Leaders | Join this engaging roundtable discussion on the adoption of the Continuous Threat Exposure Management (CTEM) framework within security functions. Led by Zaira Pirzada, VP at Hive Pro, David Malicoat, CISO of Direct Marketing Solutions and Host of The Professional CISO Show, and James Binford, Director of Offensive Security at Humana, this session explores the real-world challenges, benefits, and strategies for integrating CTEM into modern cybersecurity operations. The panelists will share their unique experiences and insights into how CTEM enhances visibility, improves prioritization, and optimizes threat response. Don’t miss this opportunity to learn from industry experts about transforming your security posture through the CTEM framework. | Zaira Pirzada - Hive Pro David Malicoat James Binford - Humana | |
Breakout Session 2B | Reducing Silos Between Developers and AppSec in Your Software Supply Chain | For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, and developer tools, is increasingly essential. However, tracking direct and indirect dependencies, finding, and fixing vulnerabilities can still be siloed. Unified tools and processes exist, providing developers and security teams access to the same security insights, however many organizations have not adopted fundamental dev-centric security tooling. To effectively manage and mitigate supply chain risk a more holistic approach is needed. Join us for this session where we will discuss: An overview of the software supply chain
| Jamie Smith - Snyk |