Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Vulnerability Breakout [clear filter]
Tuesday, October 17
 

12:30pm EDT

Vulnerability Roadmap
Speakers
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Tuesday October 17, 2017 12:30pm - 2:00pm EDT
Ellington Salon C
 
Wednesday, October 18
 

1:00pm EDT

How to Defeat the Vulnerability Hydra
Vulnerability Management is like a Hydra, chop off one head and two more grow back. It is impossible to keep up. How do you prioritize? How can you get ahead? Maybe “ahead” is too ambitious - but what about drastically reducing risk? One way to make an impact is with attack path mapping. Allowing VM teams to quickly identify the weak device in the chain on how an attacker could move laterally to the so called “Crown Jewels.” In this session, users will learn the best practices on how to ingest router and firewall data for better attack path mapping and how to quickly break the chain in the attack path, allowing you to sever the head of the Hydra. 

Speakers
avatar for Andy Nickel

Andy Nickel

Sales Engineer, Core Security


Wednesday October 18, 2017 1:00pm - 1:45pm EDT
Ellington Salon C

1:45pm EDT

Vulnerability Insight Tips & Tricks
Everyone loves a good tip, like using a stick of spaghetti to light a hard to reach candle wick or using Doritos to start a fire. In this session VI users will learn the top tips and tricks for both the GUI and configurations. Along with ingesting router data and using it for attack path identification, users will learn how to quickly use the existing Attack Strategy to first prioritize any immediate critical vulnerabilities, how to setup campaigns for critical assets and tips for report usage and customization. There will also be time for users to share their favorite tips with other attendees. The more we all share, the more value everyone can get from the tool.

Speakers
avatar for Magno Gomes

Magno Gomes

SE Manager, Core Security


Wednesday October 18, 2017 1:45pm - 2:30pm EDT
Ellington Salon C

3:00pm EDT

Vulnerability Roadmap Stack Ranking
Ever dream of a career in product management? Get a hands on experience in stack ranking the real features that you want to see in the product! In this feedback session, users will be broken into two groups and prioritize a selected group of features based on group decided criteria. The groups will then present and discuss which features ranked where and why. This will be a fun and interactive session for users to provide direct input on upcoming features in Vulnerability Insight. 

Speakers
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Wednesday October 18, 2017 3:00pm - 3:45pm EDT
Ellington Salon C

3:45pm EDT

Back to the Future - What Keeps You Up at Night? What Else Could We Solve?

The Jetson’s had numerous push-button Space Age-envisioned conveniences that are finally becoming a reality with self-driving cars, IoT and NEST® technology. But with cool tech comes more vulnerabilities and a wider attack surface. What keeps you up at night when you imagine what the future will hold for Vulnerability Management? In this feedback session users will get to share their fears, future predictions and what their dream features are “If Only…” Join us and build the future of VM. 


Speakers
avatar for Chris Scheels

Chris Scheels

Product Management, Core Security
Chris has been aligning people, process and technology to drive companies forward for over 15 years.  He has experience in product management, marketing and IT with an emphasis on technology. His passion is helping businesses succeed through the strategic and effective use of technology... Read More →


Wednesday October 18, 2017 3:45pm - 4:15pm EDT
Ellington Salon C