Loading…
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, October 17
 

7:00am

Breakfast
Tuesday October 17, 2017 7:00am - 8:00am
Overlook East

7:00am

Registration
Tuesday October 17, 2017 7:00am - 8:00pm
Ellington Ballroom Pre-Function Area

8:00am

Company Vision
Tuesday October 17, 2017 8:00am - 8:30am
Ellington Salon D

8:30am

Product Vision
Tuesday October 17, 2017 8:30am - 9:30am
Ellington Salon D

9:30am

Customer Case Study
Tuesday October 17, 2017 9:30am - 10:00am
Ellington Salon D

10:00am

Break
Tuesday October 17, 2017 10:00am - 10:30am
Ellington Ballroom Pre-Function Area

10:30am

Identity Customer Case Study
Tuesday October 17, 2017 10:30am - 11:00am
Ellington Salon D

11:00am

11:30am

Lunch
Tuesday October 17, 2017 11:30am - 12:30pm
Overlook East

12:30pm

Identity Roadmap
Tuesday October 17, 2017 12:30pm - 2:00pm
Ellington Salon A

12:30pm

Vulnerability Roadmap
Tuesday October 17, 2017 12:30pm - 2:00pm
Ellington Salon C

2:00pm

Break
Tuesday October 17, 2017 2:00pm - 2:30pm
Ellington Ballroom Pre-Function Area

2:30pm

Impact Roadmap
Tuesday October 17, 2017 2:30pm - 4:00pm
Ellington Salon C

2:30pm

Network Insight Roadmap
Tuesday October 17, 2017 2:30pm - 4:00pm
Ellington Salon A

4:00pm

Brian Krebs Keynote
Speakers

Tuesday October 17, 2017 4:00pm - 5:00pm
Ellington Salon D

5:00pm

 
Wednesday, October 18
 

7:00am

Breakfast
Wednesday October 18, 2017 7:00am - 8:30am
Overlook East

7:00am

Registration
Wednesday October 18, 2017 7:00am - 5:00pm
Ellington Ballroom Pre-Function Area

8:30am

Housekeeping & Announcements
Wednesday October 18, 2017 8:30am - 8:45am
Ellington Salon D

8:45am

CISO Panel
Wednesday October 18, 2017 8:45am - 9:15am
Ellington Salon D

9:15am

9:45am

10:15am

Break
Wednesday October 18, 2017 10:15am - 10:45am
Ellington Ballroom Pre-Function Area

10:45am

What is Core Labs?
Wednesday October 18, 2017 10:45am - 11:45am
Ellington Salon D

11:45am

Product Roadmaps Feedback Lunch
Wednesday October 18, 2017 11:45am - 1:00pm
Overlook East

1:00pm

Access Assurance Suite Tips & Tricks
Everyone loves a good tip, like using toothpaste to clear up hazy car headlights.  In this session, Identity users will learn from the master, our lead architect, Lisa Lombardo, as she goes through tips and tricks to make sure you’re getting the most out of your IAM deployment. Come with your questions about Core Access, Core Compliance and Core Password.

Speakers
avatar for Lisa Lombardo

Lisa Lombardo

Principal Architect of Identity Product and Technology Solutions, Core Secuirty
Hello. | My name is Lisa Lombardo and I have been with Core Security (and earlier Courion) for 21 years with responsibilities in the product and support areas. I have lived, breathed, bled, sweated, cried, laughed, and existed in the Identity and Access Management world for... Read More →


Wednesday October 18, 2017 1:00pm - 1:45pm
Ellington Salon A

1:00pm

Core Impact Tips & Tricks
Everyone loves a good tip, like turning on your seat warmer to keep a pizza hot while driving home. In this session Identity users will walk through cool and lesser known functionality of the product and highlight different ways to apply well-known features. 

Speakers
MG

Martin Gallo

Core Security


Wednesday October 18, 2017 1:00pm - 1:45pm
Ellington Salon B

1:00pm

Network Insight--How To Assess Findings--Tier 1 SOC Triage

Speed to respond is critical in fighting cyber threats and cyberattacks. Learning how to quickly assess findings leads to faster response and containment. As users get familiar with the Network Insight, formerly Failsafe, user console and how to read results, quick decisions can be made as to next steps to response. In this session, we will cover how to quickly assess findings in the GUI directly or when pivoting from a SIEM or ITSM in response to a case – including top dashboard widgets for quickly drilling down on pre-filtered lists of assets. This session will cover asset filtering methods to highlight what things are important to each organization. Most importantly you will learn how to drill down on individual assets, what to look for and which sections can quickly decide on next steps. 


Speakers
avatar for Chris Scheels

Chris Scheels

Product Manager, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of tec... Read More →


Wednesday October 18, 2017 1:00pm - 1:45pm
King

1:00pm

How to Defeat the Vulnerability Hydra
Vulnerability Management is like a Hydra, chop off one head and two more grow back. It is impossible to keep up. How do you prioritize? How can you get ahead? Maybe “ahead” is too ambitious - but what about drastically reducing risk? One way to make an impact is with attack path mapping. Allowing VM teams to quickly identify the weak device in the chain on how an attacker could move laterally to the so called “Crown Jewels.” In this session, users will learn the best practices on how to ingest router and firewall data for better attack path mapping and how to quickly break the chain in the attack path, allowing you to sever the head of the Hydra. 

Wednesday October 18, 2017 1:00pm - 1:45pm
Ellington Salon C

1:45pm

Core Connector API Demo
Did you know that we released a new way to integrate Core Access with your target systems without a custom connector? Did you know it’s free? Join us to learn about how to use the Core Connector API to tie into your web-services or API enabled target systems.

Speakers

Wednesday October 18, 2017 1:45pm - 2:30pm
Ellington Salon A

1:45pm

Storytime with Core Impact
Let’s write a story, not a short story or a novel, but a “Product” User Story related to Impact. Grammar not your strong suit? No worries, an easy template will be provided, just fill in the blanks. It’s kind of like Mad Libs but with the purpose of creating a new product feature, and maybe a few laughs in the process. In this hands on session, users will be separated into small groups. Groups will select one of three new product features or they can develop their own. Using a simple template, groups will create a user story for this feature on how they would want it to work and the purpose of the feature. User Stories are used by Product Management to convey a feature idea to the developers so they understand the end goal of the design. Please join us to create a new Impact User Story.

Wednesday October 18, 2017 1:45pm - 2:30pm
Ellington Salon B

1:45pm

Hands on with Network Insight Roadmap

Ever dream of a career in product management? Get hands on experience in stack ranking the real features that you want to see in the product. In this feedback session, users will be broken into two groups and asked to prioritize a selected group of features based on group decided criteria. The groups will then present and discuss which features ranked where and why. This will be a fun and interactive session for users to provide direct input on upcoming features in Network Insight. 


Speakers
avatar for Chris Scheels

Chris Scheels

Product Manager, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of tec... Read More →


Wednesday October 18, 2017 1:45pm - 2:30pm
King

1:45pm

Vulnerability Insight Tips & Tricks
Everyone loves a good tip, like using a stick of spaghetti to light a hard to reach candle wick or using Doritos to start a fire. In this session VI users will learn the top tips and tricks for both the GUI and configurations. Along with ingesting router data and using it for attack path identification, users will learn how to quickly use the existing Attack Strategy to first prioritize any immediate critical vulnerabilities, how to setup campaigns for critical assets and tips for report usage and customization. There will also be time for users to share their favorite tips with other attendees. The more we all share, the more value everyone can get from the tool.

Speakers

Wednesday October 18, 2017 1:45pm - 2:30pm
Ellington Salon C

2:30pm

Break
Wednesday October 18, 2017 2:30pm - 3:00pm
Ellington Ballroom Pre-Function Area

3:00pm

TBA
Wednesday October 18, 2017 3:00pm - 3:45pm
Ellington Salon A

3:00pm

Threat Dissection

Anatomy 101 of how and what threats actually do in your network.  In this session we will pick a well-known threat and go through the cycle of how actors behave and how security teams can deter, detect, respond and validate using Core Security products. 


Wednesday October 18, 2017 3:00pm - 3:45pm
Ellington Salon B

3:00pm

Understanding Network Insight Integrations to Automate Containment and Kick Start Response
Whether it’s the revered single plane of glass view in a SIEM or building an auto containment workflow for compromised devices, Network Insight admins can use built-in integrators to take action quickly or build their own with the API. With SIEM for instance, what if the view is wrong or incomplete? This can cause the response teams to spend invaluable time looking and or chasing the wrong things. It’s critical to understand how to ingest the NI outputs into your SIEM to keep things flowing smoothly. In this session we will cover the two different types of feeds and ideas on how to best incorporate them into your SIEM workflow. This session will help responders understand the Network Insight SIEM output so they can quickly understand the output and how to build SIEM workflows and dashboards to get optimal results.  Also covered will be use cases for Next Generation Firewall (NGFW), Network Access Control (NAC) and Proxy integrations.

Speakers

Wednesday October 18, 2017 3:00pm - 3:45pm
King

3:00pm

Vulnerability Roadmap Stack Ranking
Ever dream of a career in product management? Get a hands on experience in stack ranking the real features that you want to see in the product! In this feedback session, users will be broken into two groups and prioritize a selected group of features based on group decided criteria. The groups will then present and discuss which features ranked where and why. This will be a fun and interactive session for users to provide direct input on upcoming features in Vulnerability Insight. 

Wednesday October 18, 2017 3:00pm - 3:45pm
Ellington Salon C

3:45pm

Identity Roadmap Feedback
Make your mark on the future of IAM! Join Michael Marks, Core Security’s Product Manager for Identity, and tell him what you want to see in the next releases of Core Security’s identity products.

Speakers

Wednesday October 18, 2017 3:45pm - 4:15pm
Ellington Salon A

3:45pm

Core Impact Roadmap Feedback
Ever dream of a career in product management (perhaps this is what is keeping you up at night)?  Get hands on experience in stack ranking the feature backlog. Review the high points/prioritized features of the roadmap and help us stack rank their importance and ensure our ideas align with your needs.

Speakers

Wednesday October 18, 2017 3:45pm - 4:15pm
Ellington Salon B

3:45pm

The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Threat Research Team

How do you separate the good from the bad actors? Put on your white hat as we go on an adventure to separate the wheat from the chaff; or the good from the bad and not so bad. Join us for a chance to learn from our Threat Research team and how they track and expose threat operators and build that intelligence into Network Insight. Not only that, but discover the different ways our Threat Research team is able to apply their findings. This will be an insightful session for anyone interested in learning more about a day in the life of a threat researcher.


Wednesday October 18, 2017 3:45pm - 4:15pm
King

3:45pm

Back to the Future - What Keeps You Up at Night? What Else Could We Solve?

The Jetson’s had numerous push-button Space Age-envisioned conveniences that are finally becoming a reality with self-driving cars, IoT and NEST® technology. But with cool tech comes more vulnerabilities and a wider attack surface. What keeps you up at night when you imagine what the future will hold for Vulnerability Management? In this feedback session users will get to share their fears, future predictions and what their dream features are “If Only…” Join us and build the future of VM. 


Wednesday October 18, 2017 3:45pm - 4:15pm
Ellington Salon C

4:15pm

5:00pm

6:00pm

Customer Appreciation Event
Wednesday October 18, 2017 6:00pm - 11:00pm
TBA
 
Thursday, October 19
 

TBA

Additional Training Opportunities (Conference Pass + Training Ticket Required)
Additional Training Opportunities available after the main conference session. Be sure select the full conference pass + the appropriate training ticket when registering for the conference. 

Thursday October 19, 2017 TBA
TBA

9:00am

Core Access Assurance Suite Training Day 1
You need this ticket from Eventbrite to sign up: Full Conference + Core AAS Training.
Thursday October 19, 2017 9:00am - 5:00pm
Ellington Salon B

9:00am

Core Impact Certified Professional (CICP) Training Day 1
You need this ticket from Eventbrite to sign up: Full Conference + CICP Training.
This two (2) day course delivers the knowledge and practical experience necessary to successfully use and manage the Core Impact solution. 

Thursday October 19, 2017 9:00am - 5:00pm
Ellington Salon A
 
Friday, October 20
 

9:00am

Core Access Assurance Suite Training Day 2
You need this ticket from Eventbrite to sign up: Full Conference + Core AAS Training.
Friday October 20, 2017 9:00am - 5:00pm
Ellington Salon B

9:00am

Core Impact Certified Professional (CICP) Training Day 2
You need this ticket from Eventbrite to sign up: Full Conference + CICP Training.
This two (2) day course delivers the knowledge and practical experience necessary to successfully use and manage the Core Impact solution. 

Friday October 20, 2017 9:00am - 5:00pm
Ellington Salon A