Free-To-Attend Cyber Security Digital Summit!

April 13 - 14, 2021

Day 2 | Wednesday, 14 April 2021

9:00 am - 10:00 am EST Leveraging Risk Management Principles To Support IoT Functions: A Panel Discussion

Fred Kwong - CISO, Delta Dental
Dan Bowden - CISO, Sentara Healthcare

IoT and OT cyber security is truly here. That fact became all the more apparent when a water treatment plant in Oldsmar, Florida was hacked to attempt to poison the water source. While that hack was unsophisticated, the US has a power grid backdoor which a nation state walked through. It is time for cyber security executives to sound the alarm around IoT security.

  • Realizing the scope of change and how you treat the solution
  • Scanning for the complete network traffic and segmenting network infrastructure accordingly
  • Engaging nuanced controls in the face of the changing landscape
  • Examining the new and ever-changing reality of TPRM
  • Realizing that IoT is not a technology issue, it’s a governance issue
  • Marrying together people, process and tools
  • Understanding that risk changes, but your control for risk should remain the sa
img

Fred Kwong

CISO
Delta Dental

img

Dan Bowden

CISO
Sentara Healthcare

img

Michael Gregory,

Information Security Officer
Community Foundation of NW Indiana Inc.

img

James Brady

CISO, VP, Information Security, Infrastructure/Operations
Fairview Health Services

11:00 am - 12:00 pm EST Verify then Trust - Real-Time Zero Trust Network Communications

Glen Gulyas - Founder and CSO, Onclave Networks

Real-time Zero Trust Network Access is increasingly becoming an enterprise-wide requirement. As recently as Q4 2020, 75% of the Cyber Security community utilized VPN for myriad reasons, with the principle logic being that the total timeline and cost for implementation of a ZTNA (outside of the technology itself) is remarkably high. The reality is, a VPN environment is costly, designed for built-in obsolescence through licensing and software updates, cannot encompass protections for IoT and most importantly, leaves the network it is supposed to protect inherently vulnerable to a breach. This session will elucidate attendees to state of the art commercial technologies brought over from the defense and intelligence communities to operate on a “Verify then Trust” principle for the world of devices in the IT/IoT.

img

Glen Gulyas

Founder and CSO
Onclave Networks