Tuesday, October 22, 2024
Introduction and Fireside Chat | Navigating the Vulnerability Maze: Strategies for Effective Management in an Evolving Threat Landscape

Vulnerability management remains one of the most pressing challenges for cybersecurity professionals today. As the threat landscape evolves, organizations are inundated with vulnerabilities, making it increasingly difficult to prioritize and address the most critical issues. This session delves into the persistent problem of vulnerability overload, exploring:  

  • Why traditional approaches often fall short 
  • What innovative strategies can be employed to stay ahead of emerging threats. 
  • Tools, methodologies, and best practices that security teams need to streamline vulnerability management, reduce risk, and enhance overall resilience. 

Join us to learn how to transform your vulnerability management process into a proactive and efficient operation, capable of keeping pace with the ever-changing cybersecurity environment.

Paul Asadoorian J. Wolfgang Goerlich
Breakout Session 1A | Compensating for unenriched CVEs

This session will explore the challenges posed by unenriched CVEs in the National Vulnerability Database (NVD), which has left over 18,000 CVEs without proper CPE identifiers since February 2024. These unenriched reports severely limit automated vulnerability management as they remain invisible to CPE-based searches. With contractors historically managing NVD enrichment and the backlog growing monthly, organizations relying on CVE-based vulnerability databases face significant gaps in visibility. 

We’ll discuss strategies to compensate for these gaps and the potential of alternative identifiers, like purl, in addressing these issues, particularly in the open-source ecosystem.

Zaira Pirzada
Breakout Session 1B | Reducing Silos Between Developers and AppSec in Your Software Supply Chain

For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, and developer tools, is increasingly essential. However, tracking direct and indirect dependencies, finding, and fixing vulnerabilities can still be siloed. Unified tools and processes exist, providing developers and security teams access to the same security insights, however many organizations have not adopted fundamental dev-centric security tooling.

To effectively manage and mitigate supply chain risk a more holistic approach is needed. Join us for this session where we will discuss:

An overview of the software supply chain

  • Why it’s critical to establish a workflow bridging developer and AppSec teams
  • How to prioritize and action vulnerabilities quickly
  • The importance of automated workflows to ensure timely remediation and adherence to your organization's security policies
Jamie Smith
Panel Discussion | Vulnerability Management in the Headlines: Proactive Strategies to Stay Ahead of Cyber Threats

Recent headlines have underscored the critical importance of effective vulnerability management as cybercriminals continue to exploit weaknesses faster than ever before. In this panel discussion, cybersecurity experts will analyze:  

  • High-profile vulnerabilities that made the news and the lessons learned from these incidents. 
  • Evolving tactics of threat actors and the strategic approaches that organizations can adopt to stay ahead. 
  • From improved threat intelligence to enhanced patch management and proactive vulnerability assessments, this session will provide actionable insights to help you anticipate and counter emerging threats before they strike. 

Join us to gain a deeper understanding of how to protect your organization from becoming the next headline.

Paul Asadoorian Ed Moore Matt Johansen
How to Think Like an Attacker: Preventative Cyber Security with Censys

 In today’s evolving threat landscape, staying ahead of attackers requires more than just traditional, inside-out defensive strategies. Join experts Tabatha Von Koelichen and Harald Roeder as they dive into how Censys solutions empower organizations to identify and close critical gaps in their attack surface—before the bad actors exploit them. This session provides a unique “outside-in” perspective, revealing how hackers view your vulnerabilities. Learn how to think like an attacker and leverage Censys' tools to reinforce your defense strategy and protect your organization from costly breaches. 

Tabatha von Koelichen Harald Roeder Robert Heimanson
Breakout Session 2A | Adopting Continuous Threat Exposure Management (CTEM): Insights from Industry Leaders

Join this engaging roundtable discussion on the adoption of the Continuous Threat Exposure Management (CTEM) framework within security functions. Led by Zaira Pirzada, VP at Hive Pro, David Malicoat, CISO of Direct Marketing Solutions and Host of The Professional CISO Show, and James Binford, Director of Offensive Security at Humana, this session explores the real-world challenges, benefits, and strategies for integrating CTEM into modern cybersecurity operations. The panelists will share their unique experiences and insights into how CTEM enhances visibility, improves prioritization, and optimizes threat response. Don’t miss this opportunity to learn from industry experts about transforming your security posture through the CTEM framework.

Zaira Pirzada David Malicoat James Binford
Breakout Session 2B | Reducing Silos Between Developers and AppSec in Your Software Supply Chain

For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, and developer tools, is increasingly essential. However, tracking direct and indirect dependencies, finding, and fixing vulnerabilities can still be siloed. Unified tools and processes exist, providing developers and security teams access to the same security insights, however many organizations have not adopted fundamental dev-centric security tooling.

To effectively manage and mitigate supply chain risk a more holistic approach is needed. Join us for this session where we will discuss:

An overview of the software supply chain

  • Why it’s critical to establish a workflow bridging developer and AppSec teams
  • How to prioritize and action vulnerabilities quickly
  • The importance of automated workflows to ensure timely remediation and adherence to your organization's security policies
Jamie Smith
Time Zone: (UTC-05:00) Eastern Time (US & Canada) [Change Time Zone]