Virtual Event
Predictive analytics, AI, and machine learning are changing how cybersecurity professionals protect against and respond to threats and attacks. It’s now possible to know what an attacker is about to do before he does it, which means enterprise cybersecurity professionals can move up the maturity model from reactive to proactive and anticipatory.
This session zeroes in on the specifics of how these technologies can work in a cybersecurity environment. We’ll discuss the controls they enable, the benefits they bring–and the security operational changes they require. And we’ll provide participants and attendees with actionable next steps for implementing these tools in their own cybersecurity environments.
Key topics and technologies include:
- The role of analytics in zero trust
- Analytics, AI, ML, and cloud-based cybersecurity
- How AI and ML are upending the role of a cyber data analyst
- Analytics, AI and advanced threat detection/threat-hunting
- Analytics-driven cybersecurity modeling
- Behavioral threat analytics (user and entity behavioral analytics)
- Digital ethics and insider threat analytics
- Infrastructure enabling effective cyber analytics at scale
- Where now? The future of cybersecurity analytics
Agenda
8:25AM-8:30AM WSTA Introductions: Don Anderson, Chief Information Officer, Federal Reserve Bank of Boston and a WSTA Director
Bio
Don Anderson, Senior Vice President, Transformation Executive, Federal Reserve SystemDon Anderson is the Senior Vice President, Transformation Executive of the Federal Reserve System. In this capacity, he is responsible for the successful transformation of the finance, HR and procurement functions for 22,000 users.
Previously, Don served as CIO of the Federal Reserve Bank of Boston and in 2017, was awarded the Boston CIO of the Year ORBiE award by the Boston CIO Leadership Association. He is a frequent speaker on Cyber Security, Financial Technology and Digital Transformation.
Prior to joining the Federal Reserve, Don was a senior consultant with Hewlett Packard (HP) Enterprise focused on the development and execution of IT transformation strategies for Fortune 500 companies. While at HP, Don successfully managed a number of multi-million dollar international programs.
He holds a BS degree from the University of Connecticut and an MBA from Bentley University, serves on the Boards of the Advanced Cyber Security Center (ACSC), Wall Street Technology Association (WSTA), and Boston CIO Leadership Association.
Twitter: @DonAndersonCIO
LinkedIn: https://www.linkedin.com/in/donandersonjr/
Abstract
8:30AM-8:55AM Keynote Presentation: “Using Predictive Analytics and AI to Futureproof Your Cybersecurity Strategy”
Bio
Johna Till Johnson, CEO and Founder, NemertesJohna Till Johnson is the CEO & Founder of Nemertes Research, an 18-year old research-advisory firm specializing in the business impact of emerging technologies. Ms. Johnson spearheads Nemertes’ security and risk management practice, where she works with Fortune 200 financial services, manufacturing, utility, and other leading organizations.
Ms. Johnson’s career in information security began more than 25 years ago when, as a young engineer, she developed security products for Mosler Security Systems. In the early 1990s, she ran the lab-testing program at Data Communications Magazine, which uncovered vulnerabilities in the then-novel RSA two-factor authentication system. In the mid-1990s, Ms. Johnson ran the Global Networking Strategies Service at the META Group, which included META’s security and risk management offering. Subsequently, she served as the Chief Technology Officer overseeing the security practice for Greenwich Technology Corp., a global consulting and engineering firm that developed and implemented leading-edge security architectures for financial services firms and other global organizations.
Abstract
Everyone knows that AI and predictive analytics are changing the face of cybersecurity. But how, precisely, should enterprise cybersecurity professionals be thinking about deploying these technologies (or more accurately, technology portfolios) to their cybersecurity operations? What are the benefits, and what pitfalls should they avoid? This keynote address focuses on best practices for deploying AI and predictive analytics to ensure long-term effectiveness of your cybersecurity strategy.
8:55AM-9:15AM Breakfast Sponsor Presentation: “How Machine Learning Can Fence-in Bad Actors"
Bio
Julio Gomez, Financial Services Lead, Americas, SplunkJulio Gomez is Financial Services Lead, The Americas for Splunk, the Data-to-Everything platform.
A builder of businesses and brands, Mr. Gomez is widely known as the founder and CEO of Gomez, Inc., the de facto standard for measuring Internet services quality, which has evolved into what is now APM industry leader Dynatrace.
He is a frequent keynote speaker on market trends and strategic initiatives and is a trusted advisor to global leaders in business and technology. Institutional Investor named him one of Wall Street’s “50 Most Influential People” and Time Magazine listed him among the “Fifty Most Important People Shaping Technology.” He has also been interviewed for his expertise by numerous print publications and radio and television networks.
Mr. Gomez is a graduate of Princeton University.
Abstract
It’s not just about detection anymore. Without a solid vision of achieving prevention, a security strategy is dead on arrival. Fortunately, technologies have emerged that make prediction, and thus prevention, a reality. In this session, participants will explore:
- techniques deployed by leaders in the field to leverage machine learning/AI;
- and how to develop actionable, predictive analytics in security operations.
9:15AM-9:35AM Secondary Sponsor Presentation: "Predictive Analytics Alone Won't Protect Your Critical Applications nor the Data Behind Them"
Bio | Abstract | Seminar Replay
Bio
Terry Ray, SVP Strategy for Finance and Healthcare, and an Imperva Fellow, Imperva Inc.Terry Ray is the SVP Strategy for Finance and Healthcare and an Imperva Fellow for Imperva Inc. Uniquely, Finance and Healthcare have very strict regulations, steep fines, complex environments and highly valued data that attracts bad behavior. Terry applies his decades of security experience to these industries and their cyber security challenges. As a technology fellow, Terry supports all of Imperva’s business functions with his more than two decades of security industry experience and expertise. Previously he served as Imperva’s Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well as, maintaining a deep knowledge of the Application and Data Security Solution and Threats Landscape. Earlier in his tenure at Imperva, he held the role of Chief Product Strategist where he consulted directly with Imperva’s strategic global customers on industry best practices, threat landscape, application and data security implementation and industry regulations.
He continues to operate as an executive sponsor to strategic customers who benefit from having a bridge between both company’s executive teams. He was the first U.S.-based employee, and during his 17 years at Imperva, he has worked hundreds of data security projects to meet the security requirements of customers and regulators from every industry.
Terry is a frequent speaker for RSA, Gartner, ISSA, OWASP, ISACA, IANS, CDM, NLIT, The American Petroleum Institute and other professional security and audit organizations in the Americas and abroad. Terry also provides expert commentary to the media and has been quoted in Security Week, SC Magazine, Forbes, CBS News, the BBC and others.
Abstract
When it comes to cybersecurity putting your trust in Artificial Intelligence is risky for the following reasons:
- Systems are dynamic with new databases and tools making it difficult to predict traffic.
- People are dynamic with human behavior being less predictable than that of systems.
- Attackers are dynamic adjusting their behaviors to bypass protection mechanisms.
Artificial Intelligence alone is not reliable for cybersecurity, however, when combined with certain application security solutions it can be very powerful.
In this session you will learn:
- How Attack Analytics relies on Community Reference information to help identify attacks with the same characteristics on various industries.
- How Cloud WAF leverages Reputation Intelligence to identify malicious offender IPs and provides a risk score.
- And how API Security uses machine learning to detect clean traffic, understand normal patterns and to block suspicious traffic.
9:35AM-9:45AM Break and Visit to Resource Rooms
9:45AM-10:05AM Presentation: “The Human Element in Applying AI to Detecting Cyber and Insider Threat”
Bio | Abstract | Seminar Replay
Bio
Sudhir Udipi, Senior Director, Systems Engineering & Architecture, CISSP, GCNA, GCFA, SecuronixSudhir Udipi focuses on delivering advanced UEBA and next-gen SIEM capabilities to address the insider threats and cyber threats that clients face globally. He has extensive experience in cybersecurity, having delivered solutions to some of the largest financial services organizations, government entities, and other commercial institutions in the US. Sudhir has extensive experience working with SIEM, DLP, authentication, and GRC tools. He has also developed techniques and tools for the detection of advanced cyber threats through log analysis, network data, and host-based forensics. Sudhir has been at Securonix for 4+ years, and leads Securonix’s global team of Systems Engineers and Solutions Architects.
Abstract
There’s a lot of hype around applying machine learning, cognitive learning, and artificial intelligence to detect security threats in an environment. While analytics capabilities have advanced, there are still practical limitations in applying AI, such as:
- Lack of data that results from the inability to deploy sensors and collect data, and the overall visibility gaps in an environment.
- AI systems take time to learn and develop patterns, but who has the patience to wait weeks or months to train the bots?
- AI systems lack business context.
The practical approach is to use a combination of unsupervised machine learning, supervised machine learning, and predictive analytics through AI, with human support throughout this process. It’s your people who understand your environment the best. Equip senior Security Analysts with the ability to train and teach the system, and it will in turn prepare the junior Analysts.
What you’ll walk away with:
- Best practices for applying human intelligence to aid AI and ML.
- Recommendations for incorporating business context into the detection, prioritization, and response to security events.
10:05AM-10:25AM Presentation: “Improving Cyber Detection & Response using Predictive Analytics"
Bio
Matt Costello, Principal, Booz Allen HamiltonMatt Costello leads Booz Allen’s Commercial Advanced Analytics and Engineering practice. Matt brings over 20 years’ experience helping clients leverage analytics, AI and advanced platforms across finance, energy, communications and high-tech manufacturing. Prior to Booz Allen Matt worked in the wireless industry and as Chief Technology Officer for a startup focused on the Telecom and Cable markets.
Matt Costello is a senior technologist, bringing deep experience in cloud architecture, security analytics, high volume and velocity data pipelines and enrichment. At Booz Allen, Matt has managed multiple large engagements leveraging multiple public and private cloud providers. Matt has also worked in Enterprise Architecture, supporting a tier-1 wireless carrier in the US as well as a cable multi-service operator. In addition to consulting and architecture, Matt spent several years as CTO at a startup leading a large development, testing and product management team. He has led numerous agile Analytics and Cloud projects, and is a certified SCRUM master.
Abstract
As the Cybersecurity threat landscape evolves at an ever-increasing pace, Predictive Analytics and Machine Learning can help companies detect new threats and respond more effectively. In this session, Tony Sharp and Matt Costello will discuss ways that Booz Allen Hamilton has successfully deployed AI and ML to help their customers:
- Reduce Alert Fatigue by training models on prior incidents to improve and automate prioritization of new alerts
- Detect behavioral anomalies that may be indicative of malicious activity by both people and devices using Big Data
- Automate network segmentation and detection of new malware, botnet, and command & control connections
Bio
Tony Sharp, Senior Vice President, Booz Allen HamiltonTony Sharp has over 25 years of leadership experience across IT, having served across various facets of infrastructure engineering and software development. He recently joined Booz-Allen to lead the Security Architecture and Engineering organization, where he is responsible for developing and delivering security capabilities that assist commercial clients in reducing operational and business risk.
Prior to joining Booz-Allen, he served as Vice-President, Engineering & Solutions at FedEx – responsible for developing and delivering Information Security capabilities globally. His team provided solutions across Cyber, Identity and Access; Application, Data and Network security; OT and IoT security, Host and Endpoint; Cloud and Platform security; Fraud and Cargo security; IT Risk and Compliance.
Prior to that role, Tony served as Vice-President of Corporate Back-Office Development, developing IT systems for Finance, Accounting, Legal, Payroll and Human Resource organizations.
He also served as Director of Enterprise Communications and Collaboration, where his teams delivered IP voice, video, mobile and web communications; conferencing and scheduling systems; enterprise social networking and search; corporate email systems and enterprise directory services.
Prior to that role, Tony was Director of Software Quality Assurance, leading development of SDLC processes and enabling tools, software testing architectures and standards.
Tony began his career as an engineer, leading the design and implementation of large scale IP networks.
He holds an MBA and a B.S.E.E from the University of Memphis.
Abstract
10:25AM-10:45AM Presentation: “Prevent Unknown Threats in Real Time with Machine Learning”
Bio | Abstract | Seminar Replay
Bio
Lawrence Chin, Security Architect, Financial Services, Palo Alto NetworksLawrence has 25+ years of IT experience, and is currently part of the Business and Industry Solutions team at Palo Alto Networks. In his 4+ years at the company, he has focused on security solutions for the financial services industry while also leading a team of security architects covering healthcare, education, federal and state/local governments.
Prior to joining Palo Alto Networks, Lawrence spent 17 years at one of the largest global financial institutions with leadership roles in network architecture and engineering for a worldwide network spanning 100 countries and more than 20 data centers. His experience ranges from branch/campus networks, Internet and 3rd party network perimeter, data center networks, and international backbone network designs. Lawrence started his IT career with Bellcore, which was the research and development arm of the Regional Bell Operating Companies.
Lawrence is based in New York, and has a M.S. in Computer Science from the Stevens Institute of Technology and a B.S. in Computer Science from New York University.
Abstract
Cyberattacks are constantly and automatically morphing. Historically, the focus has been to shorten the time it takes to react to a new attack. Continuing down this path is becoming unproductive. In this session, see how machine learning can be applied to network security and deliver the following benefits:
- Stop new threats instantly, preventing initial infection and potential spread
- Maintain the speed of business as you stop weaponized files, credential phishing, and malicious scripts without sacrificing the user experience
10:45AM-10:55AM Break and Visit to Resource Rooms
10:55AM-12:00PM Panel Discussion: Using AI and Predictive Analytics for Cybersecurity: Practical Guidelines
Bio
Moderator: Johna Till Johnson, CEO & Founder, NemertesJohna Till Johnson is the CEO & Founder of Nemertes Research, an 18-year old research-advisory firm specializing in the business impact of emerging technologies. Ms. Johnson spearheads Nemertes’ security and risk management practice, where she works with Fortune 200 financial services, manufacturing, utility, and other leading organizations.
Ms. Johnson’s career in information security began more than 25 years ago when, as a young engineer, she developed security products for Mosler Security Systems. In the early 1990s, she ran the lab-testing program at Data Communications Magazine, which uncovered vulnerabilities in the then-novel RSA two-factor authentication system. In the mid-1990s, Ms. Johnson ran the Global Networking Strategies Service at the META Group, which included META’s security and risk management offering. Subsequently, she served as the Chief Technology Officer overseeing the security practice for Greenwich Technology Corp., a global consulting and engineering firm that developed and implemented leading-edge security architectures for financial services firms and other global organizations.
Abstract
How should organizations begin and continue adopting AI and predictive analytics? Are they a feature, a property, or an architecture? What are the best steps for embracing AI and predictive analytics for cybersecurity? What are the stumbling blocks? Staffed by veteran technologists and cybersecurity specialists, this must-watch session focuses on the practical do’s and don’t’s of implementing AI and predictive analytics. Attendees will come away with a checklist of next steps and best practices enabling them to move up the maturity model, regardless of starting point. And they’ll obtain practical guidance on avoiding pitfalls and common mistakes.
Bio
Benjamin Dulieu, Vice President, Brown Brothers Harriman & Co.Benjamin Dulieu is a Vice President at Brown Brothers Harriman & Co. and former active duty United States Marine Corps Captain. After completing Officer Candidate School in 2008 and graduating from Suffolk University in 2009, Ben accepted a commission as a Second Lieutenant though the Marine Corps’ Platoon Leaders Class program. As a Command and Control Systems Officer, he reported into 1st Battalion 6th Marines, an infantry battalion stationed in Camp Lejeune, North Carolina. Deploying to Afghanistan, Ben led a platoon of 78 Marines in clear, hold, and build operations in Marjah, Sangin, and Kajaki Afghanistan, during Operation Eastern Storm, Operation Enduring Freedom.
After promotion to Captain, Ben was selected to serve as the Officer Selection Officer for Central Florida, responsible for the recruitment of some of the finest young men and women this country has to offer, as the next generation of Marine Officer Candidates. During his three-year tour of duty in Florida, he selected, mentored, and commissioned over 100 aviation, ground, and law officers into our Marine Corps.
Ben departed active service in May of 2016 with personal awards including the Navy and Marine Corps Commendation Medal, twice awarded, Combat Action Ribbon, and Recruiting Service Ribbon. Ben earned his Masters in Banking and Financial Service Management from Boston University and currently resides in Hingham, Massachusetts with his wife Sarah, daughter Piper, and son Lachlan. He is an active member of Veteran’s advocacy hiring initiatives and programs, such as the Veterans on Wall Street, and strives to be a voice for our country’s vets.
Ben is currently responsible for overseeing second line of defense enterprise-wide Cyber governance, leading technology related ERM efforts, and serving as the head of the Enterprise Risk Management Cyber and Technology pillar. Leveraging the experience gained from cybersecurity training and certifications while working in the Department of Defense, he is responsible for client communications, cyber portfolio management, regulatory analysis, training and awareness, and overall administration and oversight of the firm-wide program.
Abstract
Bio
Andres Mariscal, Data Scientist, CloudflareAndres Mariscal is a Data Scientist currently working in security for Cloudflare’s internal systems. He is an early member of Kamu, now Epic Games Finland, working in machine learning applications to Anti-Cheat software and game-engine in-game behavioral pattern detections and, former senior data scientist for the tech wing of Aller Media Finland working in computer vision and, nlp based curation systems.
Abstract
Bio
Sean O’Dowd, Financial Services Solutions Director, ProofpointSean O’Dowd is the Global Financial Services Director at Proofpoint. In this role, Sean focuses on industry strategy and works with financial services firms to advance their cybersecurity strategies. He has spent over 20 years focused on financial services and capital markets.
He comes to Proofpoint after several years with MapR and Teradata as their Financial Services Director, driving AI/ML, analytic, big data and cloud strategies with financial clients. Before, Sean was IDC Financial Insights’ Director of Global Securities and Investment Management Service responsible for research, consulting and forecasts on the securities and investment management sector. His coverage spanned financials, market structure, regulations and technologies that impact the business models and strategies of financial markets firms (buy-side, sell-side, wealth management, custody, exchanges, and retail brokers).
This was following more than ten years in consulting and research analyst positions within the investment management industry. His experience is in investment research and management, securities valuation and portfolio analysis at his past firms JTC LLC, Ashton Partners, and State Street.
Mr. O’Dowd is a quoted source in such publications as The Wall Street Journal, Forbes, Bloomberg Businessweek, Institutional Investor, Wall Street Letter, Traders Magazine, and Wall Street & Technology among others.
Follow, connect and read more from Sean O’Dowd at www.linkedin.com/in/seanodowd1
Abstract
Bio
Matt Peters, Chief Product Officer (CPO), ExpelMatt Peters is the chief product officer (CPO) at Expel, a cybersecurity firm located in the Washington, DC area. As CPO, Matt focuses on robust dialogue, encouragement of his team as they grow their own careers, and the relationships between all aspects of the business.
He comes to the company with 20 years of experience in the tech world. Before joining Expel, Matt was vice president of worldwide operations at FireEye for the managed services offering, FireEye as a Service.
Before FireEye, Matt was the director of technical operations at Mandiant for Mandiant Managed Defense, one of the first managed detection and response (MDR) services. He was responsible for the design and delivery of the application platform that powered analyst detection and investigation.
Before getting into the managed services space, Matt worked at a number of Silicon Valley computer networking technology startups before joining Check Point Software where he led the security analytics group, which applied machine learning and data science to network and firewall data.
Matt has a B.S. in computer engineering from the University of Kansas
Abstract
Bio
Eugene Stevens, Head of Global Product Innovation, Verizon Business GroupGene has been with Verizon since 2019, joining after Verizon acquired his company, ProtectWise, a network security startup based in Denver Colorado where he was Co-founder and CTO. Having founded multiple startups and participated in successful exits, Gene is passionate about the work of bringing innovative technology from concept through to delivery in the hands of customers, and then to scale in the larger enterprise. Prior to founding ProtectWise, Gene ran Product for a cyber security startup in Japan, was acquired by McAfee where he was a Principal Engineer, and ultimately acquired again by Intel. Gene began his career in financial forecasting and market analysis, focused on predicting future business opportunities. He still writes code in his free time.
Abstract
Bio
Bio
Joe Vittorioso, CISSP, Information Security/Identity Management Architect, Federal Reserve Bank of BostonJoe Vittorioso is a Security Architect at the Federal Reserve Bank of Boston. In this role Joe develops advance security solutions that provide value to business lines as well as other technical organizations within the Federal Reserve System.
He has spent over 30 years in the security field in various roles. Originally focusing on security in the US Navy as a Cryptologic Specialist, Joe took to the civilian marketplace focusing on directory technologies. Once established he provided leadership to smaller organizations, bringing Greater Lynn Mental Health through Y2K. RSA Security was Joe’s last stop before the Federal Reserve System where Joe provided eight years of leadership in developing the RSA Secured program, creating interoperability between hundreds of platforms through partnerships.
Abstract
12:00PM- Event Concludes
Eligible for CPE Credits
Earn up to 3.5 CPE Credits at this event! Click here for more details.
Cancellation
To Cancel your Registration, click here.
Address:
WSTAnywhere
Virtual Event
Join from your computer,