This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Black Hat - Omdia Analyst Summit
Monday, August 2, 2021
2020 brought about a sea-change in how organizations operate and engage with their customers. Journeys to the cloud were turbo-charged. Digitization plans that might have taken years to come to fruition were delivered in weeks. We found ways of doing things that we didn't know we could.
Yet this was only the beginning; organizations are continuing to evolve both front-office and back-office capabilities in today's "reset normality". Join the inaugural Omdia Analyst Summit at Black Hat for exclusive analyst insights into the security impacts of this change and what security functions and the wider business must consider to maintain and enhance security posture faced with this continuing organizational evolution.
Application Portal is Now closed
The registration window is now closed, thank you for your interest.
All applications will be reviewed by Black Hat management, and notifications will be sent to applicants by July 23.
- Have a cybersecurity focus or equivalent job title, be involved with cybersecurity technology or approaches to addressing cybersecurity issues, or otherwise have responsibility to ensure that cybersecurity is addressed in their organization (including board level).
- To contribute to an interactive, cooperative atmosphere; we are unable to accept employees of other industry analyst firms.
*The final determination of participants in the OMDIA Analyst Summit rests with Black Hat & Omdia show management
Monday, August 2
Click or press a title for more information.
|9:00 - 9:30 AM||
Welcome and Keynote
Security Has Gone Haywire: Surviving and Thriving Amid Organizational Evolution
Developments in the use of technology has been turbo-charged in the past 18 months. Organizational engagement with customers and citizens has been reimagined. Running an enterprise, irrespective of size, has evolved dramatically. The pace of change shows little sign of slowing, and organizations are battling to keep up with and get ahead of demand and what their competition is capable of.
The security function has had to turn on a sixpence (or a dime) and security has gone "haywire" in attempts to match the pace of organizational change. What are the biggest concerns of security professionals and CISOs as they navigate the changes they must make as their organizations look to survive and thrive in the new world? What is keeping them awake night? And what can they do to get ahead of the game?
|9:35 - 10:05 AM||
Ransomware: The New Terrorism
While encryption serves as a fundamental element of data security, when it is used by an adversary to deny organizations access to their own data, the consequences can be devastating. Recent security incidents directed at critical infrastructure have resulted in the United States DOJ and FBI elevating the severity of ransomware to considered on par with terrorism. Ransomware gangs, with ties to criminal organizations worldwide, have been tied to some of the most destructive attacks in recent years. Omdia will outline some of the challenges that organizations face in their ability to prepare for and respond to ransomware attacks and highlight best data security practices to help mitigate the hurdles of this evolving threat.
|10:10 - 10:20 AM||
Tanner Johnson talks to Israel Barack of Cybereason
|10:25 - 10:45 AM||
Identity, Authentication, Access:
Is Continuous Authentication All It's Cracked Up to Be?
Even before the 2020 coronavirus pandemic forced millions of knowledge workers worldwide to work from home, it had long been a truism that identity had become "The Perimeter". Continuous authentication is a method of identity confirmation on an ongoing basis. In this session we will look at the various types of CA and also explore the pros, the cons, and the challenges of utilizing these technologies over the next few years.
|10:45 - 11:05 AM||Break|
|11:05 - 11:35 AM||
The Decaying Corpse of the Hardware Security Market Gives Life to Cloud-Native and Cloud-Delivered Infrastructure Security
Proprietary hardware-based security solution deployed behind the safe walls of enterprise-owned HQs, data centers, and campuses are flagging, they just don't know it yet…a bit like the famous "I'm not dead" scene in Monty Python and the Holy Grail. And while the vendors who deliver those solutions are coming off record-breaking 2020 sales numbers yelling "I feel happy", the cloud providers and their enterprise customers who are rapidly moving data, applications, and infrastructure into the cloud are standing right behind them with a cudgel. Fear not though, because many of those same vendors, and a slew of new ones, have been migrating existing technology and developing new solutions that are cloud-native, cloud-delivered, or both. In this session we'll look at how Infrastructure security solutions like firewall, DDoS mitigation, web/application security and more will manage the move to the cloud.
|11:40 - 11:50 AM||
Curt Franklin talks to Anand Oswal of Palo Alto Networks
|11:55 AM - 12:05 PM||
Snapshot Session: Emerging Security Technologies
Beyond CWPP and CSPM: Cloud Permissions Management brings a Zero Touch approach by curtailing entitlements
Cloud workload protection platforms provide runtime security for cloud-based code and data, while cloud security posture management checks for compliance or security drift in apps in the cloud. Both can be considered reactive technologies, but now CPM arises to reduce attack surfaces before any attack happens.
|12:10 - 12:20 PM||
Rik Turner talks to Kevin Keh of ISACA
|12:25 - 12:55 PM||
Rebuilding the SOC Stack: SecOps Priorities & Technologies for 2021 and Beyond
Enterprise cybersecurity operations (SecOps) technology architectures have remained surprisingly static over the past decade. Today, a confluence of long-awaited technology advancements and unexpected global events are ushering in a new generation of SOC capabilities, and with them dramatic ramifications. This presentation will not only examine how industry changes are affecting SecOps business and technical priorities, but also how solutions are evolving to realign and even remake the SOC technology stack.
Specific areas of focus will include:
|12:55 - 1:35 PM||Lunch|
|1:35 - 2:00 PM||
Enterprise Security Management:
Turning Users into Cybersecurity Allies: Pushing, Pleading, or Punishing?
Users are never neutral. They are either vulnerabilities to be managed or part of your cybersecurity defenses. What does it take to turn them into allies? Traditional approaches have relied on a triumvirate of threats, rewards, and responsibility to move employees into the "ally" column. But do new technologies mean that the makeup of that trio needs to change? What can technology do for increasing cybersecurity awareness and helping employees move from awareness to ally? Are there technologies that make the employees' role less important? And what are the implications to cybersecurity and your organization's culture of choosing one strategy over another? This session will pack a lot into a few minutes, but you'll come away with a better understanding of what technologies and strategies can (and cannot) do together, or one at a time.
|2:05 - 2:15 PM||
Maxine Holt talks to Adam Bromwich of Broadcom
|2:20 - 2:30 PM||
Snapshot Session: IoT Cybersecurity
Now a Matter of Life and Death: The Expanding IoT Threat Landscape in Healthcare
The IoT in healthcare is an attack vector and attackers have a choice. Option 1: Use the IoT to access PII and/or compromise the systems that run the healthcare organization. Option 2: Render IoT devices inoperable to disrupt healthcare provision. Neither of these options is acceptable to the healthcare organization, but they are a risk that must be assessed and addressed. Join this Omdia snapshot session to hear about the significant rise in IoT devices in healthcare and what organizations must consider to protect the health and well-being of their patients.
|2:35 - 2:45 PM||
Snapshot Session: Emerging Security Technologies
Zero Trust Access: The VPN replacement technology becoming the tail that wags the SASE dog
When the SASE paradigm, in which networking and security technologies are bundled and delivered from the cloud, was announced in 2019, it looked like Zero Trust Access was added as an afterthought after the network, SD-WAN, firewalls, secure Web gateways, and CASBs. 18 months and on pandemic later, and ZTA has become the key component that no SASE worth its salt can do without.
|2:45 - 3:05 PM||Break|
|3:05 - 3:30 PM||
IT Security Services:
Building an Interlaced Security Armour Through the Fabric of Security Services
End to end cybersecurity for large enterprises and government is complex, and a rapidly evolving advanced threat landscape raises the stakes. But not all CISOs and CIOs are well prepared for tough challenges ahead. Now, more than ever, organizations need help to build critical internal security capabilities, augment these with a third-party security provider, and consider partnering for longer term success.
Attend this session to hear about the key organizational cybersecurity challenges facing every CISO and what to expect from a global leader in cybersecurity services.
|3:35 - 3:45 PM||
Adam Etherington talks to Theresa Lanowitz of AT&T
|3:50 - 4:30 PM||
Live Q&A with Omdia Analysts
Join this live Q&A session with some of today’s analysts to ask any questions that you might have from today’s presentations or indeed anything else #cybersecurity that you might want to ask!
Become a Sponsor