Cornerstones of Trust Conference to Brainstorm IT Security Issues With Luminary Pros and Industry Practitioners

Share Article

COT Attendees Join Forces to Discuss and Help Resolve The Most Difficult of Today's IT Security Challenges

A conference that focuses on the real-world practical applications of security which I believe offer the highest potential return on investment for the attendees.

In its 16th year of existence, Cornerstones of Trust (COT) is a regional IT security conference taking place on June 14th, 2016, in the center of Silicon Valley near San Mateo, California. More unique than the huge traditional tradeshow where vendors compete for the most attention with the prettiest booths, COT is the Bay Area's premier, community-driven conference dedicated to helping Silicon Valley’s security professionals raise their thought-levels to better balance technology risks against business opportunities. The conference is co-hosted by the San Francisco Bay Area and Silicon Valley chapters of the Information Systems Security Association (ISSA), a not-for-profit, volunteer organization that provides a forum for education, publications and peer interaction opportunities. San Francisco Bay Area InfraGard, a unique national partnership between the private sector and the Federal Bureau of Investigation (FBI), also co-hosts COT. From the world’s geographic center of technology, COT encourages contrarian thinkers and practitioners that serve on the front-line of the IT Security world to network and share experiences.

COT’s inspirational speakers present and lead discussions on how to solve the most critical day-to-day security issues faced by enterprises, government agencies, and critical infrastructure professionals. Issues such as how to prepare for the coming “Internet of Everything” (IOT) explosion as well as challenging how today’s IT security groups must operate due to new infrastructural challenges are hotly debated. In fact, one of the morning keynote speakers Ira Winkler said “I'm excited to be speaking in the Bay Area which has the most diverse security professionals working on the most diverse set of security problems. It's even more exciting that I’ll be speaking at a conference that focuses on the real-world practical applications of security which I believe offer the highest potential return on investment for the attendees.”

Ira Winkler, CISSP, CISM is Co-Founder and President of Secure Mentem, Inc. and President of the Internet Security Advisors Group. Described as a modern day James Bond by CNN and other media, Winkler began his career at the National Security Agency and is recognized as an expert in Internet security and cybercrime. He is the author of Spies Among Us, a book about how people and companies fall victim to corporate hacking, cracking and other criminal activity. He is co-presenting with Araceli Treu Gomes, co-host of The Irari Report and a cybersecurity strategist and subject matter expert for Dell SecureWorks, counseling global organizations on how to prevent advanced attacks. Together, Gomes and Winkler will open the event, speaking after the morning registration and breakfast is served at 8:45 am. (See entire schedule here.) Titled Advanced Persistent Security to Fight Advanced, and Not So Advanced, Persistent Threats, the two will dissect recent attacks and reveal how these attacks could have been prevented.

The other keynote speaker right after lunch is Jack Jones, Research & Development Executive Vice President and cofounder of RiskLens. He will be discussing Just Secure What? Because it isn’t feasible to secure everything to the maximum extent, it has become crucial to identify what matters most and how to communicate the value proposition to get executive board support. Jones will demonstrate and share the Factor Analysis of Information Risk (FAIR) open standard that enables Chief Information Risk Officers (CIROs) to quantify and properly manage cyber risk from a business perspective. Used to strengthen, rather than replace existing risk analysis processes, FAIR is an up-and-comer technology that complements other existing methodologies. Consistent with an international standard Value at Risk (VaR) risk model for cybersecurity and enterprise technology, there is also a free 2.5 hour training that evening at 6:15 pm that teaches how to conduct FAIR computations.

In addition to these keynotes, COT is also hosting a number of sessions covering some of the most pressing topics in today’s industry such as alignment with business executives, best response to breaches, facing up to what the cloud has done to the revered security triad of confidentiality, integrity and availability and finally, where in the heck are those endpoints now? There will also be a very interesting afternoon keynote panel on Personal Privacy vs. Legal Access at 2:20 pm. The topic resonates with the recent Apple vs. FBI debate with the FBI demanding that a back-door be built into an iPhone to help them track a terrorist. Apple refused which began huge industry-wide discussions (not to mention Sir Edward Snowden’s revelations.) This panel consists of Jack Bennett – FBI SF Special Agent in Charge, Mark Van Divner – CISO, First Republic Bank. Edward Kraus – Attorney, Silicon Valley Law Group and Shahid Buttar – Grassroots Advocacy Director, Electronic Frontier Foundation (EFF)

COT also includes the following speakers in four tracks consisting of Technology, Process, People and the Future:

  • Dean Sysman, CTO, Cymmetria: Breaking Honeypots for Fun and Profit
  • Araceli Treu Gomes , Cyber Security Strategist, Dell SecureWorks : How Improved IR Strategies, Advanced Endpoint and Network Protection Can Enhance Your Security Environment
  • Derek Chowaniec, Senior Solutions Architect, Veracode: Do AppSec Shortcuts exist?
  • Anshu Gupta, InfoSec Director, HelloSign Inc: Amazon Web Services Security, a Primer
  • Tim Mather, CISO, Cadence Design Systems, Logically Securing a Public Cloud Service
  • Ted Heiman, Key Account Manager, Thales e-Security: Digital Certificates: Today’s Doomsday Defense (PKI and its Ever Increasing Role in the Emergence of the IoT)
  • Dr. Peter Neuman, Sr. Principal Scientist, SRI International, Computer Science Laboratory: Personal Reflections on the Past, Present, and Future of Cybersecurity
  • Allen Marin, Venafi: Lessons from the Human Immune System (creating a more resistant future)
  • Tim O'Brien, The Road to Hiring is Paved in Good Intentions, (as both interviewer and interviewee and how to get the best of both sides)
  • Michelle Fleury, Chief Data Protection Officer, Cisco Systems: The Data Protection Imperative (Case Study: effective data protection, getting it up and running quickly.)
  • Lee Neely, Senior Cyber Analyst, Lawrence Livermore National Laboratory: Mobile Security for the Rest of Us (Reduce your susceptibility to compromise, data loss or embarrassment.)
  • Roy Katmor, Co-founder and CEO, EnSilo (Gartner “Cool Vendor” 2016 winner): We Lost the Battle Against Intrusions – Are We Left to Raise our Hands in Defeat?
  • Stuart Cianos, CISSP, Infrastructure Engineering, YAHOO! (not speaking on behalf of YAHOO!): Securing the Supply Chain: Best Practices when Evaluating Third Party Technology Acquisition, (insights when implementing new systems procured from third parties.)
  • Lawrence Dietz, General Counsel & Managing Director of Information Security, Global Corporation: Best Legal and Security Practices for BYOD
  • Rob Fry, Sr. Information Security Architect, Netflix, Inc , Gaining Visibility from the Security Stack: Leveraging APIs and Integrations to Get More Out of Your Investment
  • Shimon Modi, Director of Product/Technology, TruSTAR Tech.: Mind the “Sharing” Gap – Can Incident Sharing Deliver Real Value?, (The Cybersecurity Act of 2015 impact)
  • Mike Jerbic, SJSU professor, Factor Analysis of Information Risk (FAIR) Framework Training at 6:20 pm.

For more information on any of these speakers, please go here.

Pricing goes from $30 to $100 and advanced registration is highly suggested. To snag one of the few sponsor positions left open, sponsorship information is available here.

Media Contact:
Robin Lutchansky
Lutchansky Communications

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Robin Lutchansky