Let’s Talk Security In Practice
Hi, I’m Ed – an engineer by trade, CEO by day, and accidental security expert.
For two decades, I’ve been fortunate to have crossed paths with respected industry luminaries and practitioners. On a regular basis, I invite them to discuss practical approaches to securing the software ecosystem based on today’s realities: complex tech stacks, evolving threats, motivated attackers, mounting regulations, and unsettling skill gaps.
Come join us. You may laugh, cry, reflect, or learn – just like your relationship with security. Either way, Ed Talks will be:
EngagingDiscussion, Debate & Banter |
RealisticGood, Bad & Ugly |
DiverseVaried Topics & Panelists |
Panelists:
-
Edna Conway
VP, Global Security, Risk & Compliance, Azure at Microsoft
-
Octavia Howell
Business Information Security Officer, Equifax
-
Zachary Minneker
Sr. Research Engineer, Security Innovation
SolariGate – Avoiding Supply Chain Burns
Supply chain risk is not going away, especially not software updates that fuels the IT dependent enterprise. The SolarWinds hack has sowed doubts about the fidelity and security of 3rd-party tech. Despite significant damage, some organizations successfully thwarted the attacks despite using the vulnerable SolarWInds Orion appliance – how did they do it and what can we learn from it?
This Ed TALK brings respected cybersecurity and supply chain experts together to discuss what companies that build and use technology can do to protect themselves in this increasingly partner dependent world.
Industry leaders discuss the need for a purpose-driven and security mindset.
With the proliferation of COTS, Open Source Software, libraries, frameworks, APIs, and other components, modern software is increasingly assembled instead of coding from scratch.
There’s no doubt the cloud can deliver on the promises of improved scalability, availability, and security; however, consumers need to do their part.
The payment ecosystem is a complex one that is exposed from multiple points: Data interception, identify theft, and other attacks primarily target insecure software, APIs, and communication protocols that are difficult to lockdown.
Software teams constantly deal with rapid release cycles, dozens of technologies, and relentless threats. They generally want to incorporate security ways but are often unsure how (or why.)
About Ed Adams
Ed is a software quality and security expert with 25+ years of experience. He is a Ponemon Institute Research Fellow, Privacy by Design Ambassador, Forbes Technology Council Member, and recipient of SC Magazine Reboot Leadership Awards.
Ed sits on the board of The International Consortium of Minority Cyber Professionals (ICMCP) and is a BoSTEM Advisory Committee member. He has moderated panels at RSA Conference, BlackHat, Ponemon RIM, and others – and thoroughly loves it.
Interested in being a panelist?
Contact edtalks@securityinnovation.com.