Washington University in St. Louis
cart_icon-1
Cybersecurity Data | Project Managmetn-1-1

Vulnerability Vanguards: Using Data Driven Defense Models

Join us for an insightful roundtable session focused on advancing cybersecurity through the power of data-driven strategies. Industry-leading experts will discuss the latest methods for building resilient defense models, optimizing Security Operations Centers (SOCs), conducting comprehensive audits and reports, and sourcing top-tier threat intelligence. This session is designed to equip cybersecurity professionals with actionable insights and cutting-edge techniques to stay ahead of evolving threats.

 
October 17, 2024
8:30 a.m. – 3:30 p.m.
Purchase a Seat

Roundtable Topics & Presenters:

Eric Hlutke
CISO
Arise

Topic: Global Insights on Data-Driven Defense

This session will be led by a seasoned global CISO with extensive experience in both manufacturing and technology sectors. The speaker will discuss the development and implementation of data-driven defense models, highlighting the importance of data analytics in identifying vulnerabilities and mitigating risks. Attendees will learn about the challenges and best practices for integrating data-driven approaches within diverse organizational contexts.

Alley Frame
Head of SOC
Netskope
 

Topic: Managing a Cutting-Edge SOC

The head of a Security Operations Center (SOC) for a leading cybersecurity vendor will lead this session, focusing on the operational aspects of managing a SOC. The discussion will cover the latest tools and technologies used in SOCs, strategies for effective incident response, and the role of data in enhancing SOC capabilities. Participants will gain insights into optimizing SOC performance and ensuring rapid detection and response to security incidents.

Audrey Katcher

Contributing Author of SOC 2 Report Guidelines and Cybersecurity Auditor RubinBrown

 

Topic: Auditing and Reporting: Standards and Best Practices

This session will be presented by a long-time contributing author of SOC 2 report guidelines and a cybersecurity auditor for a major accounting firm. The speaker will provide an overview of SOC 2 report guidelines, discussing the standards and best practices for auditing and reporting in the cybersecurity space. Attendees will learn how to prepare for audits, ensure compliance with industry standards, and use audit findings to improve their security posture.  This year we will discuss Artificial Intelligence (AI) considerations.

To Be Determined
 
 

Topic: Sourcing Elite Threat Intelligence

The final session will feature a senior leader from an Israeli intelligence firm who will share expertise on sourcing the best threat intelligence. The discussion will cover methods for gathering high-quality threat intelligence, evaluating intelligence sources, and integrating threat intelligence into defense strategies. Attendees will learn how to leverage threat intelligence to proactively defend against emerging threats and enhance their organization's overall security resilience.

Roundtable Host:

AJ-Eads-Headshot

AJ Eads - Security Advisor Alliance:

The Security Advisor Alliance was founded in 2013 by a group of 35 dedicated information security leaders. The organization was built on a foundation of helping each other, growing the space and giving back to their working and living communities. Today the Alliance has over 400 members, on 3 continents.

The Security Advisor Alliance is led by an advisory board of CISOs and Senior Leaders at the most influential companies in the world and are committed in time and energy to the Alliance's mission of Aligning, Growing and Giving.