Future-Proofing Medical Device Security | Oct.23, 2017


Threat Briefing:

Manufacturer View
Ken Hoyme

A boy and his
insulin pump(s)
 Jay Radcliffe

HDO Customer Needs
Dan Lyon
Cyber Risk Assessment
Stephanie Domas

Key Elements in

Secure by Design
Todd Carpenter

Overview of UL 2900
Justin Heyl

Building the Future
Ken Hoyme

Medical Device Cybersecurity

Seth Carmody

Investment Town Hall | Oct.23, 2017

Investor Town Hall
Catharine Trebnick
Next-Gen Techniques Replacing
Legacy Software Tools
Larry Whiteside Jr.
Lessons Learned
Joel Fulton
Discussion on Defense M&A
Jake Omann

Demystifying DevSecOps with Veracode  | Oct.23, 2017

DevOps – Security’s
Big Opportunity

Pete Chestna
Planning for a Responsive 
AppSec Program
Darren Meyer
DevSecOps @ Veracode
Chris Eng

Day 1 – Meet the Threat  | Oct.24, 2017

Collaboration and Capabilities
as Necessary Steps

Matt Loeb
The Dark Web
Scott Sweren
Real Life Lessons Learned
Hala Furst
Compliance Does Not
Equal Security

Rich Banta
Compliance ‘Alone’ is not
a Cybersecurity Strategy

Steen Fjalstad
Breaches and Sensitive
Documents

Evan Wolff
Securing Critical Infrastructure
in an Uncertain World

Massoud Amin
Anatomy of an Attack
Brad Antoniewicz
The Connected Worker and
the Enterprise of Things

Chris Greco

Cyber Security for Small and Mid-Size Businesses  | Oct.24, 2017

Resources to Prepare for
a Possible Cyberattack

Nancy Libersky
Welcome to the Community
Hala Furst
Legal Considerations
and Case Studies

Phil Schenkenberg
DIY Risk Assessments
Yan Kravchenko
Cyber Crisis Communications
Loren Dealy Mahler

Day 2 – Beat the Threat  | Oct.25, 2017

Maintaining Cyber Readiness in
an Evolving Threat Landscape

Brent Benson
Information Sharing to Better
Protect Companies in the U.S.

Drew Evans
Strengthening Your
Cybersecurity Posture

Faisal Bhutto
Running the Defense:
Securing the Super Bowl

Jim Libersky
The Greatest Gift – Making
Attacks Expensive

Bill Swearingen
Combating Short and Long-term
Cyber Threats

Dr. Stacey Dixon