2023 RSAC #2
View Show IndexSegments
1. Detecting Software Supply Chain Breaches with GitGuardian Honeytoken – Eric Fourrier – RSA23 #2
In the ever-evolving world of cybersecurity, attackers are constantly finding new ways to infiltrate your software supply chains. But with GitGuardian's Honeytoken, you can stay ahead of the game. Deploy honeytokens at scale, monitor for unauthorized use, and detect intrusions before they can wreak havoc on your system. With Honeytoken, you'll have the insight you need to protect your confidential data and know where, who, and how attackers are trying to access it.
Segment Resources: Honeytoken product webpage
Honeytoken launch blog post SaaS Sentinel, which is a new GitGuardian lab project leveraging Honeytoken technology. It is designed to detect supply chain breaches from SaaS providers. Subscription is free.
This segment is sponsored by GitGuardian. Visit https://securityweekly.com/gitguardianrsac to learn more about them!
Guest
Eric Fourrier is an experienced engineer and entrepreneur with a degree in machine learning from Ecole Normale Supérieure in Paris and a graduate degree from Ecole Centrale. He started his career as a data scientist in the financial sector in the United States before founding Quantiops, a consulting firm focused on big data analysis. In 2017, Eric co-founded GitGuardian, a rapidly growing cybersecurity startup that is dedicated to helping businesses protect their SDLC and software supply chain. With his expertise and entrepreneurial spirit, Eric is committed to driving innovation and growth in the tech industry.
Host
2. Balancing Security Maturity and Operational Burden – John Grancarich – RSA23 #2
Today’s security products are evolving to meet the changing attack surface, each one targeting a specific set of risks. For organizations, this typically means that to increase security maturity, they need to implement a number of different solutions, and as the attack surface continues to expand, their tech stack quickly becomes difficult to manage. It’s time for the industry to help security teams achieve a better balance and reduce this operational burden.
Segment Resources: https://www.fortra.com/resources/cybersecurity-education?code=cmp-0000011766&ls=717710002&utmsource=cyberrisk-alliance&utmmedium=video&utm_campaign=ft-rsa-conference
This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them!
Guest
John works with global organizations and their security teams to develop a full understanding of their business and security priorities in light of today’s ever changing threat landscape. John’s leadership enables the Fortra team to develop and bring to life a product vision that enables customers to increase their security maturity while simultaneously decreasing their operational burden. Prior to joining Fortra in 2018, John was the founder of Product Fuse, where he worked with enterprise technology companies to build and execute successful product strategies. Prior to becoming a product leader, John served in a variety of hands-on technical roles, including web developer, database administrator, and computer forensics engineer.
Host
3. Hackers Increasingly Targeting Mobile Apps – Asaf Ashkenazi – RSA23 #2
Learn how hackers are exploiting the trust that mobile app owners place in their customers. Hackers are increasingly modifying app code, posing as trusted customers, and infiltrating IT infrastructure.
This segment is sponsored by Verimatrix. Visit https://securityweekly.com/verimatrixrsac to learn more about them!
Guest
Asaf Ashkenazi is Chief Executive Officer of Verimatrix. Asaf joined Verimatrix in 2018 and previously served as the company’s Chief Operating Officer. As CEO, Asaf leads the company’s ongoing business model transformation that focuses on recurring subscription-based revenue sources and new products. Offering a distinct mix of extensive cybersecurity technical expertise and management successes, he brings proven insights for market analysis, strategic partnerships as well as mergers and acquisitions. Asaf is a recognized security expert and routinely appears as a thought leader in industry publications around the globe – positioning Verimatrix as a top innovator that’s committed to providing the most powerful yet people-friendly protection for digital content, applications and devices. Prior to Verimatrix, he served as vice president of IoT security products at Rambus (NASDAQ: RMBS), lead security products at Qualcomm (NASDAQ: QCOM), and held other engineering management positions at Freescale Semiconductor and Motorola (NYSE: MSI). Asaf is a former board member of the FIDO Alliance and holds 10 U.S. patents for security architectures as well as an engineering degree from Ben-Gurion University of the Negev.
Host
4. Build Resiliency in Security Posture – Rhett Dillingham – RSA23 #2
Resilience and the capacity for reinvention have never been more important. In a world evolving at the speed of tech and roiled by the pandemic, enterprises that have security innovation woven into their DNA enjoy a distinct advantage. Learn more.
This segment is sponsored by Sumo Logic. Visit https://securityweekly.com/sumologicrsac to learn more about them!
Guest
Rhett leads product management and user experience for Sumo Logic security solutions. With over 20 years of experience building cybersecurity, cloud, and collaboration platforms, he guides the build-out of Sumo Logic’s SaaS analytics platform to delight customers securing and protecting their enterprise against modern threats. Prior to joining Sumo Logic, Rhett held product development leadership roles at Amazon, AMD, JASK, Microsoft, and Rackspace.
Host
5. Streamline Your Security Position and Strengthen It in the Process – Richard Yew – RSA23 #2
New security vulnerabilities are growing by more than 24% YoY and critical zero day exploits are occuring at an increasing frequency. At least a quarter of internet traffic is from botnets that are constantly scanning and attacking websites 24x7. Recently, cyber attack group i.e. Killnet and Anonymous Sudan claimed some of the largest application DDoS attacks in history.
In light of the constant change in the threat landscape, how does an organization keep up with the attackers who're always innovating? New specialized security solutions are regularly being introduced to address new threats, increasing complexities and the non-functional requirement(NFRs) associated with integration of these systems to already complicated enterprise web applications. How does an organization implement holistic defense without increasing cost, complexity and impacting user experience?
Edgio will address how an edge-enabled holistic security platform can effectively reduce the attack surface, improve the effectiveness of the defense while reducing the latency of critical web applications via it’s multi-layered defense approach. It also offers the ability to integrate with an enterprises' DevSecOps workflow to achieve better security practices. Edio will discuss how its security platform “shrinks the haystacks” so that organizations can better focus on delivering key business outcomes.
Consolidating an organization’s security footprint will enable them to be more efficient and to be better protected along with the ability to integrate with their DevSecOps workflow to achieve better security practices.
Segment Resources:
https://edg.io/resources/blog/edgio-waap-rules-creating-order-out-of-chaos/
https://www.cio.com/article/462779/debunking-conventional-wisdom-increased-security-improves-performance-and-customer-experience.html
This segment is sponsored by Edgio. Visit https://securityweekly.com/edgiorsac to learn more about them!
Guest
Richard Yew is Senior Director, Product Management for Edgio Security. With more than 10+ years of security technology experience worldwide, Richard is on top of the latest trends and technologies including WAAP, DDoS protection, bot management and enterprise security. Richard comes to Edgio from Yahoo-Edgecast and, prior to this, he was with Verizon Media Platform for a number of years. Richard also spent a brief time at Akamai before moving back to Verizon Digital Media Services as Head of Product for Security. He has led teams involving technical scope and developed strategic solutions for customers and prospects. He was educated at the Illinois Institute of Technology, and later at DePaul University, rising through a technical and engineering background to a managerial role.
Host
6. Why CISOs Should Consider an MSSP and How to Choose the Right One for You – Jim Broome – RSA23 #2
A resilient cybersecurity strategy is essential to running your business while protecting against security threats and preventing data breaches. For CISOs, partnering with a managed service security provider (MSSP) means you can be in control of your organization’s information and infrastructure security without placing a strain on internal personnel or resources which is critical in today’s uncertain economy. With an MSSP on board, CISOs are better equipped to meet strategic and business goals, while improving operations and reducing expenses. This interview will discuss not only why to consider an MSSP but how to choose the right one for the job.
Segment Resources: DirectDefense 2022 Security Operations Report: https://go.directdefense.com/2022-Security-Operations-Threat-Report
This segment is sponsored by Direct Defense. Visit https://securityweekly.com/directdefensersac to learn more about them!
Guest
Jim Broome is a seasoned IT/IS veteran with more than 20 years of information security experience in both consultative and operational roles. Jim leads DirectDefense, where he is responsible for the day-to-day management of the company, as well as providing guidance and direction for our service offerings.
Previously, Jim was a Director with AccuvantLABS where he managed, developed, and performed information security assessments for organizations across multiple industries. Prior to AccuvantLABS, Jim was a Principal Security Consultant with Internet Security Systems (ISS) and their X-Force penetration testing team.
Host
7. AI-Powered Phishing Campaigns on the Rise: New Research – Deepen Desai – RSA23 #2
The increased prevalence of phishing kits sourced from black markets and chatbot AI tools like ChatGPT has seen attackers quickly develop more targeted phishing campaigns. This improved targeting has simplified the process of manipulating users into taking actions that compromise their security credentials, leaving them and their organizations vulnerable.
This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them!
Guest
As Chief Security Officer at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 19 years. Prior to joining Zscaler, he held security leadership roles at Dell SonicWALL.
Host
8. Reduce Your Attack Surface by Automating IT Management and Security Operations – Ashley Leonard – RSA23 #2
Enterprises are struggling to manage and reduce their organizational attack surface, especially with a shortage of skilled staff. Find out how some security executives are tackling this challenge by automating their IT and vulnerability management.
Segment Resources: https://hubs.la/Q01K-vgs0 https://hubs.la/Q01Ld1Ql0
This segment is sponsored by Syxsense. Visit https://securityweekly.com/syxsensersac to learn more about them!
Guest
Ashley Leonard is the president and CEO of Syxsense-a global leader in Unified Security and Endpoint Management (USEM). Ashley is a technology entrepreneur with over 25 years of experience in enterprise software, sales, marketing, and operations, providing critical leadership during the high-growth stages of well-known technology organizations.
Ashley manages U.S., European, and Australian operations in his current role, defines corporate strategies, oversees sales and marketing, and guides product development. Ashley has worked tirelessly to build a robust, innovation-driven culture within the Syxsense team while delivering returns to investors.
He has founded several successful technology companies with global operations, serves on several boards and mentors up-and-coming technology CEOs. Accolades include being named a finalist for Ernst & Young’s “Entrepreneur of The Year” and AeA’s “Outstanding Private Company CEO” Award and won the AGC Innovation CEO Award.
Host
9. Why Insider Risk is One of the Hardest Cybersecurity Threats to Solve – Joe Payne – RSA23 #2
Insider Risk is a problem that continues to grow - and that companies are still struggling to solve. CISOs state that it is the number one most difficult threat to detect, placing it over malware and ransomware. Code42 President and CEO Joe Payne will explain why the Insider Risk problem is so challenging and will offer guidance on how to solve it.
Segment Resources: Annual Data Exposure Report 2023 https://www.code42.com/resources/reports/2023-data-exposure
This segment is sponsored by Code42. Visit https://securityweekly.com/code42rsac to learn more about them!
Guest
Joe Payne is the president and CEO of Code42 Software, the leader in Insider Risk Management, which focuses on reducing the risk of data leakage from insiders while enabling the collaboration culture. Joe is a seasoned executive with more than 20 years of leadership experience and a proven track record leading high growth security and technology companies. With a passion for identifying and solving emerging market needs, Joe engages personally in product strategy and direction, while growing and providing vision and guidance to a world-class team of security executives.
Previously, Joe served as CEO of eSecurity, the first SIEM software company. He also served as the president of iDefense prior to its acquisition by VeriSign. At iDefense, Joe led some of the best white-hat security researchers in the world and worked with the top financial institutions and government agencies in the United States to improve their risk profile.