Register Now
November 8-11, 2021
ExCel London / United Kingdom

Black Hat Executive Summit

Virtual-Only Event

Tuesday, November 9, 2021


Black Hat Executive Summit offers CISOs and other cybersecurity executives an opportunity to hear from a variety of industry experts who are helping to shape this next generation of information security strategy. The program dissects the latest technologies designed to stay ahead of sophisticated adversaries and provide a peek into future platforms; we'll outline the next-level skills and strategies CISOs need to bolster their relevance and we'll discuss the latest techniques for maintaining a proactive approach to data protection.

For CISOs and executives looking to transform from a mere manager of information into a corporate champion of business growth, it's imperative to stay on top of the latest insight. That journey begins at the Black Hat Executive Summit.

Apply Now

*Please note: In order to create an open and candid environment that promotes the sharing of ideas, thoughts, and discussion, the Executive Summit will follow Chatham House Rule; neither media nor event coverage is permitted. This program is designed for executive security practitioners. Solution providers, consultants, and vendor attendees are not permitted, with the exception of event sponsors.


Agenda

Time Session Theme
9:00 - 9:15 AM Welcome and Introductions
  • Jeff Moss, Founder, Black Hat + DEF CON
  • Steve Wylie, General Manager, Black Hat
9:15 - 9:30 AM

Stamping Out "Repeat Offenders"

Cyber security awareness, behaviour and culture have risen up the industry agenda over the last few years. More and more security leaders recognise the need to shape a positive security culture in their organisations. But when it comes to effectively managing human risk, how do we deal with colleagues who repeatedly click links in phishing emails or lose their laptops? In this session, Dr Jessica Barker will:

  • Explore the link between security culture and consistently insecure behaviours
  • Provide actionable takeaways on more effectively engaging those who routinely practice insecure behaviours
  • Address why the last thing we should do is refer to these colleagues as "repeat offenders"
  • Dr. Jessica Barker

    Dr. Jessica Barker is an award-winning global leader in the human side of cyber security, named one of the top 20 most influential women in cyber security in the UK. She is Co-Founder and co-CEO of Cygenta, where she follows her passion of positively influencing cyber security awareness, behaviour and culture in organisations around the world. She has delivered cyber security awareness sessions to over 40,000 people in over 23 countries. She is the Former Chair of ClubCISO, a non-commercial community of senior information security leaders with over 400 members.

    She is a popular keynote speaker, including keynoting RSA San Francisco in 2020. Jessica is the go-to cyber security expert for many media outlets, appearing on BBC News, Sky News, Channel 4 News, BBC radio and much more. In September 2020, Jessica's book Confident Cyber Security was published by Kogan Page and became a number one Amazon best-seller within hours of publication.

9:30 - 9:45 AM Live Panel Discussion: Stamping Out "Repeat Offenders"
9:50 - 10:20 AM

Live Breakout Sessions:

Modern Spartans of the Internet - How to Recruit, Develop, and Retain for Excellence

While the cybersecurity skills gap continues to grow and more and more jobs remain unfilled, how and where do we as leaders look for the talent we need? Just as there is no "silver bullet" for security technology, there is no "silver bullet" for recruiting, developing, and retaining the talent you need. Industry certifications, education, and real-time training all play a role. Is there a way for universities, industry, and organizations alike to work together to make an impact? This breakout discussion, led by Cybrary's CEO Kevin Hanes, will dive into these topics through open dialogue with fellow cybersecurity leaders.

  • Kevin Hanes

    Kevin Hanes is the chief executive officer of Cybrary and serves on its board of directors. Cybrary is a company dedicated to building the world's leading cybersecurity professional development platform. The company aspires to be THE destination for individuals and teams to develop, deepen, measure, and prove their cybersecurity skills. Cybrary is driven to positively impact learners' lives while helping organizations solve their cybersecurity skills gaps, succeed against ever-evolving threats, and keep their companies safe from cyberattacks.

    Before joining Cybrary in June 2021, Kevin spent 8 years as COO of Secureworks. In that role, he helped transform Secureworks into a recognized global market leader in cybersecurity, he built one of the most respected cybersecurity operations teams in the world, and he led his organization through hyper-growth and an IPO.

    Kevin began his career at Dell Technologies in custom software integration and moved into leadership roles with increasing responsibilities and global scope over his 15 year tenure. The experience he gained in the early years at Dell were especially invaluable and formative as the company was pioneering e-commerce and social media strategies, launching products into the datacenter markets for the first time, and expanding globally. Kevin learned the massive power of having clear goals paired with a compelling vision of the future. He also learned how to innovate, invent, find product market fit, and execute with excellence. While working full-time at Dell, Kevin earned his Bachelor's from St. Edward's University in Austin in 2003, graduating magna cum laude, and also earned his Master's at The University of Texas at Austin 2006.

    Kevin and his wife Amanda have been married for over 20 years and have three children. When not watching one of his children's sporting events, Kevin especially enjoys sailing and is motivated by opportunities to learn and grow.


Bug Bounties or Beg Bounties

The first security technology bug bounty predated the Internet by over one hundred years: Alfred C Hobbs breaking an unbreakable lock at the Great Exhibition of 1851 for the princely sum of 200 Guineas. With the acceleration of technology adoption, unintended consequences, our adversaries, and the need to quickly understand how "unhackable" things really are, it's safe to say that things have escalated since then.

In 2021, there as many who benefit from engaging the good-faith hacker community as there are folks who find themselves lost in a mish-mash of term confusion, unclear expectations, and general reservations - in spite of the increasingly obvious truth that "it takes an army of allies to overcome an army of adversaries". This breakout is for both.

Casey John Ellis, the Founder, Chairman, and CTO of Bugcrowd, pioneer of the crowdsourced security as-a-service category, and co-founder of The Disclose.io Project will unpack the "family tree" of vulnerability disclosure, bug bounty, and crowdsourced security testing, frame up how we got here, and facilitate a discussion from the group about where it all goes next.

  • Casey John Ellis

    Casey is the Founder, Chairman, and CTO if Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pentester, security and risk consultant and solutions architect, then most recently as a career entrepreneur. Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the disclose.io vulnerability disclosures standardization project in 2016. A proud ex-pat of Sydney Australia, Casey lives with his wife and two kinds in the San Francisco Bay Area. He is happy as long as he’s passionately pursing potential.


Risk Management and Why We're Doing it Wrong in Security

The security industry adopted risk as a key approach to managing security two decades ago but while security risk practices were formalised into security risk frameworks the broader risk community has been innovative and has developed multiple improvements and new approaches. The security risk community is only now waking up to some of the issues with currently implemented security risk practices with new standards, and new tools emerging.

Phil Huggins, the National CISO for Health & Social Care and one of the primary authors of the Open Information Security Risk Universe will describe some of the common pitfalls in current common security risk practices before leading a discussion to discover how attendees have handled these in their own work or what they would like to do and what's holding them back.

  • Phil Huggins

    Phil Huggins is a delivery-focused, chartered, security and risk professional with extensive experience of governance, management, system engineering and practical architecture across a wide range of disciplines and technologies. Phil is experienced in briefing and presenting cybersecurity risk concepts to boards and training NEDs. Phil has designed and operated security for critical national infrastructure and sensitive government. Phil has advised and managed global financial services organisations and advised national regulators on cyber resilience and cybersecurity.

10:25 - 10:55 AM

Confessions of a Recovering CISO: What I didn't Know About Cyber Insurance

After nearly 20 years as a CISO, I made a big career jump, moving to the cyber underwriting-side of the business. Cyber security expertise plays a integral role in underwriting cyber insurance and I was excited to contribute. But I slowly came to realise that I never really understood cyber insurance as a CISO. During this session, I will share what I discovered in my CISO to underwriter transition. To raise awareness of cyber insurance basics and the very active role CISO can play, we'll address several key topics:

  • What can you insure for;
  • What factors go into pricing insurance;
  • What role can CISOs can play in controlling business' premiums;
  • How do a CISO help its business position itself to take advantage of cyber insurance;
  • What questions should you ask your insurance broker in buying cyber insurance;
  • How should CISOs and internal insurance risk managers work together; and
  • What happens when something happens. How are cyber insurance claims handled?
  • Attendees should come ready to ask questions and actively participate.

  • Michael Colao

    Michael currently serves as the Global Chief Underwriting Officer, direct and indirect cyber risks for AXA XL. Michael previously worked for AXA Group Security as the Corporate Chief Security Officer responsible for Information Security, Physical Security and Operational Resilience for AXA's businesses in the US, UK & Ireland, AXA Investment Managers, AXA XL, Architas, and AXA Global Health. Prior to that, he has been the CISO for several insurance companies, global investment banks, and other financial services firms. Michael became involved with cyber security when working with the Marijuana virus in 1988, and has been working with it since. He graduated from the Massachusetts Institute of Technology where he studied Mathematics and Computer Science. Since then, he has lived in three continents and has lectured globally on cybersecurity and technology issues.

11:00 - 11:35 AM

Live Group Discussion

Be a part of the conversation! Join Black Hat Advisory Board members for a moderated discussion on the following:

  1. What does "moving at the speed of the threat" really mean? Is it possible?
  2. Supplier security is broken – how do we fix it?
  3. With more security solutions moving to the cloud, opex costs rising faster than ever – how can we regain control of the security budget and ensure the business stays aligned?

Attendees should come ready to ask questions and actively participate.

11:35 - 11:50 AM

SOC in the Spotlight, See What's Possible With Google Cloud Chronicle

Google Cloud is taking a radically different approach to solve modern security challenges of the SOC. Our decades of experience pioneering differentiated approaches to security inform our most powerful security offerings like Chronicle.

Learn how you can leverage a new solution-driven approach to transform your SOC and hear lessons learned from our customers like BBVA and Viacom/CBS who are implementing Chronicle and our security models in complex environments.

  • Anton Chuvakin

    Head of Solutions Strategy, Google Cloud
    Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance.

11:55 AM - 12:25 PM

Lessons From a Global DevSecOps Transformation Initiative

The integration of security into the software development process is the latest evolution step of the DevOps process and concept, with an emphasis on collaboration and everyone working towards the same goal. Nevertheless, security remains the remit of a separate function, with direct impacts to code quality, delivery timelines and costs. In the upcoming presentation, I will share lessons from global DevSecOps transformation initiative at a large multinational, with quantifiable effects of having security champions and architects embedded within development teams. Whilst tooling is an important aspect of process, having the right mindset, organisation structure and change controls will ensure investments made can be sustained in the organisation. I shall be sharing lessons learnt as well as technical and process controls which can be applied to safeguard code quality, productivity and agility in a post pandemic world.

  • Dr. Wendy Ng

    Wendy is OneWeb's Cloud Security Architect Lead and subject matter expert. OneWeb is a communications company, leveraging Leo Earth Orbit (LEO) satellites for egalitarian broadband connectivity for all. She defined the strategy for Experian's global DevSecOps transformation initiative. With a background in infrastructure and cloud security, she is a keynote speaker and thought leader with over 70 articles published. Wendy honed her technical consulting skills from experiences in a number of industries, including aerospace, healthcare, financial services, telecommunications, transport logistics, and critical national infrastructure. She started her commercial career as a technical consultant at Cisco, before experiences at PwC and Deloitte. A trained medical and data scientist with practical experience in statistics, machine learning and AI algorithms. Wendy completed her doctoral studies at the University of Oxford in medical genetics and has contributed to the scientific community through peer-reviewed publications.

    Articles and Blogs: www.linkedin.com/in/wendyng1/detail/recent-activity/posts

12:25 - 12:40 PM Break in content
12:40 - 1:10 PM

Fear, Uncertainty and Clout: Cybersecurity's Image Problem and What We Can Do About It.

Those of us who work in cybersecurity have become immune to the ways we tend to represent threats: military and fantasy imagery, acronyms, and fancy animals among them. How do these representations play out for so-called 'ordinary' people who don't share our specialist knowledge? Based on new research into the rhetoric of cybersecurity, this talk combines a light-hearted critique of security jargon with serious analysis of its impact on protection from threats, and even who gets to work in cybersecurity. It doesn't have to be this way, and Victoria has ideas for how we might empower people to protect themselves and help solve our recruitment issues.

  • Dr. Victoria Baines

    Dr Victoria Baines is a leading authority in the field of online trust, safety and cybersecurity. She frequently contributes to major broadcast media outlets on digital ethics, cybercrime and the misuse of emerging technologies, including Virtual Reality and Artificial Intelligence. Her areas of research include electronic surveillance, cybercrime futures, and security rhetoric. She also provides research expertise to a number of international organisations, including Interpol, UNICEF and the Council of Europe.

    Victoria is co-host of the award-nominated Cyber Warrior Princess podcast, demystifying cybersecurity for a popular audience. She regularly addresses both specialist and non-specialist audiences, and has been named as one of the top 25 women in cybersecurity (IT Guru & SC Magazine).

    For several years Victoria was Facebook's Trust & Safety Manager for Europe, Middle East and Africa. Her work focused on operational support to law enforcement, and strategic engagement with policy makers on criminal activity online. Before joining Facebook, Victoria led the Strategy team at Europol's European Cybercrime Centre (EC3), where she was responsible for the EU's cyber threat analysis. She designed and developed the iOCTA, Europe's flagship threat assessment on cybercrime, and authored 2020, scenarios for the future of cybercrime that were the basis for a successful short film series of the same name.

    Prior to this, Victoria was Principal Analyst at the UK Serious Organised Crime Agency (SOCA), the forerunner of the National Crime Agency. She began her career in law enforcement in 2005 as a Higher Intelligence Analyst for Surrey Police. In 2008, the International Association for Law Enforcement Intelligence Analysts recognised Victoria's work with a global award for outstanding achievement.

    Victoria serves on the Advisory Boards of cybersecurity provider Reliance ACSN and the International Association of Internet Hotlines (INHOPE), and is a trustee of the Lucy Faithfull Foundation. She is a graduate of Trinity College, Oxford and holds a doctorate from the University of Nottingham, UK. She is a Visiting Fellow at Bournemouth University's School of Computing, a former Visiting Research Fellow at Oxford University, and was guest lecturer at Stanford University in 2019 and 2020.

1:15 - 1:45 PM

Black Hat Briefings Preview

Daniel Cuthbert, a member of the Black Hat Advisory Board, will provide a review of the hottest topics being covered during the Black Hat Briefings to give summit attendees a leg up on what to attend and what to look for during the conference. This conversation will set the premise for audience conversation and offer a framework for post-event action items for attendees.

1:45 - 2:15 PM

Locknote

At the close of the Executives Summit, join Black Hat Advisory Board members for an insightful conversation on the most pressing issues facing the InfoSec community. This Locknote will feature a candid discussion on the key takeaways from the Executive Summit and how these trends will impact future InfoSec strategies.

2:20 - 3:30 PM Closing Reception

Advisory Board

Dr. Jessica Barker
Daniel Cuthbert
Jane Frankland
Phil Huggins
Darrin Johansen
Quentyn Taylor

Sponsors

Premium Sponsor

Google Cloud provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.


Foundation Sponsor

Cybrary is the leading cybersecurity professional development platform that brings the collective knowledge of the industry's top experts to both you and your organization. Cybrary combines courses on the most in demand cybersecurity skills with real, hands-on learning experiences and guidance from a community of dedicated cybersecurity professionals. Cybrary enables its more than 3 million learners, small businesses, and Fortune 1000 organizations to earn industry certifications, work with cutting edge tools and technologies, and advance their cybersecurity goals.

Learn how Cybrary is helping to build a cybersecurity-enabled workforce at www.cybrary.it.


Reception Sponsor

Elastic builds real-time, scalable enterprise search, observability, and security solutions on a single free and open technology stack that can be deployed anywhere. Thousands of organizations worldwide use Elastic to instantly find actionable insights from any type of data and power mission-critical systems. Learn more at elastic.co.