Category: Conference

Silver Sponsor Feature: Cisco

RVAsec is pleased to announce Cisco as a Silver sponsor for RVAsec 11!

Cisco is building truly effective security solutions that are simple, open and automated. Drawing on unparalleled cloud, endpoint and network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco Security, companies are poised to securely take advantage of a new world of digital business opportunities.

www.cisco.com

@Cisco


Reception Sponsor: Corelight

Corelight

RVAsec is happy to announce Corelight as the Reception sponsor for RVAsec 11!Faster investigations, more effective threat hunts with the world’s best network evidence.

https://www.corelight.com

Twitter @corelight_inc


Hospitality Sponsor: Assura

RVAsec is pleased to announce Assura as a Hospitality sponsor for RVAsec 11!AssuraEverything we do at Assura is designed for you to win against hackers and make you look like a superhero — to your boss, your stakeholders, and your customers. Whether you’re a cyber security novice or have been in the fight as long as we have, Assura has a service that’s right for you.

  • Defense & Response
  • Managed Security Services
  • Project & Advisory Services

https://www.assurainc.com/

Twitter @Assura_Inc


Silver Sponsor: Arctic Wolf

RVAsec is pleased to announce Arctic Wolf as a Silver level sponsor for RVAsec 11!

The Leader in Security Operations–get better security effectiveness for your organization with the Arctic Wolf® Platform and Concierge Security® Team.

https://arcticwolf.com/

Twitter @AWNetworks


Silver Sponsor: Alias Infosec

RVAsec is happy to announce Alias Infosec as a Silver sponsor for RVAsec 11!AliasWe’re cybersecurity and digital forensics consultants dedicated to improving the security and protection of communities, businesses, and individuals. Our core services include security testing, monitoring, assessments, and incident response. Some people know Alias as a penetration testing group, others know us because of our litigation and digital forensics work. The reality is, we’re a cybersecurity business that strives to help our clients understand and improve their operation.

https://aliasinfosec.com/

@AliasInfosec


Gold Sponsor: A10 Networks

RVAsec is pleased to announce A10 Networks as a Gold sponsor for RVAsec 11!A10 Networks

Deliver business-critical applications that are secure, available, and efficient for multi-cloud transformation and 5G readiness. A10 Networks’ portfolio of secure application services solutions are engineered to accelerate and secure the most important enterprise and service providers networks in the world.

https://www.a10networks.com/

Twitter @A10Networks

 


Gold & Keynote Sponsor: Abnormal Security

RVAsec is happy to announce Abnormal Security as a Gold and Keynote sponsor for RVAsec 11!

 

Abnormal Security

Secure email gateways and built-in security within Microsoft and Google struggle to block socially-engineered attacks that pass reputation checks, have no links or attachments, and appear to come from trusted sources.

Abnormal profiles known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines. Only Abnormal precisely blocks all socially-engineered and unwanted emails—both internal and external—and detects and remediates compromised accounts.

https://abnormalsecurity.com/

@AbnormalSec


Speaker Feature: Raymond Canzanese

Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning. He holds a Ph.D. in Electrical Engineering from Drexel University. Most recently, Ray was the CTO of cloud security startup Sift Security.

Malware: Where Does It Come From?

We analyzed more than 100 thousand HTTP/HTTPS malware downloads from the past two years to answer one seemingly straightforward question: Where does malware come from? More specifically, we want to understand exactly what kicked off the chain of events that led to the malware download. Did the malware download originate from social media, phishing emails, compromised websites, unsavory websites, or somewhere else? Was the URL of the malware download somewhere unsavory or seemingly innocuous? Do different malware families tend to come from different places on the web? We will answer these and other related questions and wrap up the presentation by discussing what we can do with all of this information to reduce our own risk as we browse the web.

Come see Ray at RVAsec! Register now!


Speaker Feature: Ian Y. Garrett

Ian Y. Garrett is the CEO and co-founder of Phalanx, which provides human-centric data security through seamless, secure file transfers & storage.

Ian knows that the best security strategy starts with helping the users it will affect. Ian has gained this insight through his experience as a US Army Cyber officer, specializing in offensive operations and capabilities, and his work in the defense sector as a program manager and data scientist. He has spoken at numerous events and conferences on cybersecurity, artificial intelligence, and the effects of the future of work on cybersecurity.

Ian holds a B.S in Computer Science from West Point (United States Military Academy), an M.S in Computer Science from Johns Hopkins University, and conducts research in support of his Ph.D. in Computer Engineering from Virginia Tech with research focused on cybersecurity and artificial intelligence.

To Err is Human: Combating Human Error in the Future of Healthcare Cybersecurity

Healthcare data breaches are on average the most expensive breaches to date and are often caused by human error. The future of cybersecurity must focus on addressing the leading cause of data breaches while not burdening the everyday user. This talk benefits security professionals from all industries while it deep-dives healthcare to highlight the effect of human error on data breaches, how they’re getting worse, why they’re so expensive, what’s being done today, and where we need to go to fix it in the future.

Come see Ian at RVAsec! Register now!


Speaker Feature: Peter Partyka

Peter PartykaPeter Partyka leads Flashpoint’s engineering teams. Peter previously worked in the quantitative hedge fund space in New York City, implementing security and technical solutions around proprietary trading platforms, high-availability cloud deployments, and hardening of applications and infrastructure. Peter leverages more than 16 years of experience in technology specializing in application security, red-teaming, penetration testing, exploit development, as well as blue-teaming. Peter has a long track record of managing tech teams and implementing engineering security best practices. Peter led Flashpoint toward GDPR and CCPA compliance and has been a key architect of Flashpoint’s robust compliance programs. Recently Peter has scaled Flashpoint’s Engineering Team to over 80 engineers and has led the company through acquisition with a Private Equity Group as well as 2 MNA’s. Peter has taught advanced cybersecurity courses at New York University and consulted at various tech startups during his career.

Threat Intelligence 2022 Actionable?

In the early days of threat intelligence feeds we were swamped with domains, IP Addresses, and Hashes that we directly fed into our appliances and hoped that the feed we subscribed to updated IP addresses, etc. appropriately. Today we still have Domains, IP Addresses, Hashes, as well as a plethora of other data. Join me in an interactive session that showcases all the datatypes that fall under Threat Intelligence in 2022 and lets make a determination whether this data is actionable or not. The results may surprise you.

Come see Peter at RVAsec! Register now!