Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Network Breakout [clear filter]
Tuesday, October 17
 

2:30pm EDT

Network Insight Roadmap
Speakers
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Tuesday October 17, 2017 2:30pm - 4:00pm EDT
Ellington Salon A
 
Wednesday, October 18
 

1:00pm EDT

Network Insight--How To Assess Findings--Tier 1 SOC Triage

Speed to respond is critical in fighting cyber threats and cyberattacks. Learning how to quickly assess findings leads to faster response and containment. As users get familiar with the Network Insight, formerly Failsafe, user console and how to read results, quick decisions can be made as to next steps to response. In this session, we will cover how to quickly assess findings in the GUI directly or when pivoting from a SIEM or ITSM in response to a case – including top dashboard widgets for quickly drilling down on pre-filtered lists of assets. This session will cover asset filtering methods to highlight what things are important to each organization. Most importantly you will learn how to drill down on individual assets, what to look for and which sections can quickly decide on next steps. 


Speakers
MG

Mark Gilbert

Threat Researcher, Core Security
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Wednesday October 18, 2017 1:00pm - 1:45pm EDT
Ellington Salon A

1:45pm EDT

Hands on with Network Insight Roadmap

Ever dream of a career in product management? Get hands on experience in stack ranking the real features that you want to see in the product. In this feedback session, users will be broken into two groups and asked to prioritize a selected group of features based on group decided criteria. The groups will then present and discuss which features ranked where and why. This will be a fun and interactive session for users to provide direct input on upcoming features in Network Insight. 


Speakers
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Wednesday October 18, 2017 1:45pm - 2:30pm EDT
Ellington Salon A

3:00pm EDT

Understanding Network Insight Integrations to Automate Containment and Kick Start Response
Whether it’s the revered single plane of glass view in a SIEM or building an auto containment workflow for compromised devices, Network Insight admins can use built-in integrators to take action quickly or build their own with the API. With SIEM for instance, what if the view is wrong or incomplete? This can cause the response teams to spend invaluable time looking and or chasing the wrong things. It’s critical to understand how to ingest the NI outputs into your SIEM to keep things flowing smoothly. In this session we will cover the two different types of feeds and ideas on how to best incorporate them into your SIEM workflow. This session will help responders understand the Network Insight SIEM output so they can quickly understand the output and how to build SIEM workflows and dashboards to get optimal results.  Also covered will be use cases for Next Generation Firewall (NGFW), Network Access Control (NAC) and Proxy integrations.

Speakers
avatar for Stephen Newman

Stephen Newman

SVP Products, Core Security & SecureAuth
Stephen Newman brings over 17 years of technology innovation and leadership to Core Security. He has designed products and product strategies for leading, innovative technologies throughout his career. Most recently as a CTO at Damballa, Stephen’s team successfully built upon the... Read More →


Wednesday October 18, 2017 3:00pm - 3:45pm EDT
Ellington Salon A

3:45pm EDT

The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Threat Research Team

How do you separate the good from the bad actors? Put on your white hat as we go on an adventure to separate the wheat from the chaff; or the good from the bad and not so bad. Join us for a chance to learn from our Threat Research team and how they track and expose threat operators and build that intelligence into Network Insight. Not only that, but discover the different ways our Threat Research team is able to apply their findings. This will be an insightful session for anyone interested in learning more about a day in the life of a threat researcher.


Speakers
avatar for Willis McDonald

Willis McDonald

Threat Research Manager, Core Security


Wednesday October 18, 2017 3:45pm - 4:15pm EDT
Ellington Salon A