Steve McGregory

Senior Director, Threat Intelligence Ixia, a Keysight Business

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Steve McGregory is the Senior Director of the Application and Threat Intelligence (ATI) Research Center at Ixia, a Keysight Business. The ATI Research Center is responsible for gathering actionable, network application and security, intelligence for Ixia products and customers.

Steve has over 28 years of experience working in the field of Computer and Network Security. During his career, he has created network and security products at IBM, TippingPoint, SolarWinds, BreakingPoint, Ixia, and now Keysight.

Steve’s passion in work is to help educate people about, and protect people from, malicious digital attacks. He applies his passion through engineering, contributing to online publications, and speaking at technology events.

Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses

This session is all about how knowledge of your cybersecurity products, processes, and people will make you more powerful.

We will take a journey through the entire path of an attack scenario, diving into the technologies meant to protect you and how they are meant to work.

Next, we will look at new technologies being engineered to help you perform deep assessment of your deployed security controls and highlight gaps that you can then work to fill. We will explore methodologies that are meant to help you perform these assessments, and track your coverage as you progress.

Your biggest challenge is the ever changing network, new tools, updates, patches, and policy, all of the things that happen every day. We will explore how to continuously monitor what’s currently working, enabling you to quickly identify a change that has had a negative impact on, or introduced a new gap in, your security.

If Equifax were following this methodology, they’d have escaped one of the biggest hacks of this decade. And, no, this isn’t just about patching. As any practitioner of cyber security would know, patching is easier said than done. What you learn from this talk will help you determine what corrective measure is your best option.

This knowledge can be applied no matter how small or large your network, no lab required. The path is one to a greater maturity level, to continuous monitoring and optimizing of your security tools, processes, and people.

The result will reveal a light at the end of the tunnel for all of us in the fight to secure our networks.

Objectives:

  • Gain an understanding of what’s standing in the way of you being most effective in your security defense posture.
  • Gain insight into security in depth, what it really means, how you measure each layer and use that knowledge to make decisions to improve.
  • Use a risk assessment model to help you understand where to prioritize and focus on applying security in depth.
  • Learn a methodology to assess and monitor your defenses continuously, methods that can be utilized by just about anyone.
  • Learn how automation is used to repeatedly validate your baseline coverage, alerting you before the hackers find the gap.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Razvan Bocu

Lecturer and Researcher Transilvania University of Brasov, Romania

SPEAKER INTERVIEW AVAILABLE

Alex “Jay” Balan

Chief Security Researcher Bitdefender

Inbar Raz

Security Architect Argus Cyber Security

SPEAKER INTERVIEW AVAILABLE

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS