Connected Devices Summit
Virtual Summit December 8 - 9, 2022
ISMG, the leading media provider to the cybersecurity community, has shown its commitment to education and networking through its series of Global Summits over the last nine years. Our Connected Devices Summit brings leaders and key decision-makers together to connect and learn from each other’s success, as well as challenges, in an interactive educational environment to better combat fraud.

The Connected Devices Summit agenda is designed with a goal of providing actionable education implement back at the office immediately. This year's agenda will cover medical device security, growing cybersecurity issues associated with enterprise IoT, the growing attack surface, modernizing IT and OT and more. As you plan for the coming year, navigate the latest stage in the pandemic, and pivot for unexpected vulnerabilities and ever-changing threat landscape, please join us on August 16th and 17th for the Connected Devices Summit!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
David Pollino
Former CISO
PNC Bank
Craig Barrett
VP Cybersecurity
Kinder Morgan, Inc.
Anna Delaney
Director, ISMG Productions
ISMG
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Chuck Makarian
CISO
PACAAR
Rob Suarez
VP & CISO
BD (Becton, Dickinson & Company)
Roberto (Rob) Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and strategic leader for information security. In this role Rob is responsible for developing...
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Bo Berlas
CISO
U.S. General Services Administration
Bo Berlas is the Chief Information Security Officer (CISO) at the U.S. General Services Administration (GSA) where he leads cybersecurity strategy, policy, operations, and implementation of the agency security program. He has over 21 years of combined Information Technology and...
James DeLuccia
Product Security Chief
Honeywell
James leads the security market strategy for global products across Honeywell on Azure and Amazon. In combination with this role, James is responsible for leading, generating, and commercializing cybersecurity market benefits and independent offerings. Author of two books, the most...
Kevin Fu
Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security
University of Michigan
Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
Lisa Tuttle
CISO
SPX Corporation
Lisa Tuttle has served as an executive leader of global organizations, managing technology teams with her engaging enthusiasm and unique combination of information security, privacy, legal, compliance, project management and business management expertise. As CISO of SPX Corporation, she provides...
Tari Schreider
Analyst
Aite-Novarica Group
Schreider is a strategic adviser at Aite-Novarica specializing in cybersecurity, information assurance, security program architecture and maturity improvement. He has more than 40 years of experience in security, privacy and recovery management. Before joining Aite-Novarica, he was a distinguished technologist...
Alexander Vitruk
Senior Litigation Associate
Baker & Hostetler LLP
At BakerHostetler in Seattle, Vitruk defends and advises companies in complex litigation, with an increased focus on data privacy and cybersecurity matters. He has managed cases through all phases of litigation and arbitration and has secured positive outcomes for clients...
Karen Boyer
SVP Financial Crimes, Fraud Intelligence
M&T Bank
Karen Boyer has over 20 years of diverse banking experience with over 15 in the realm of Fraud. She is currently Vice President of Financial Crimes and Fraud Intelligence, at People’s United Bank, a regional bank in the Northeast with...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
Lana is a motivated and results-oriented leader with international experience (deploying impactful programs, landing global projects, and establishing connections with brilliant people in the US, Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt, Czech Republic). Lana is experienced in...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Denny Prvu
Global Director of Identity & Access Management
RBC
Denny Prvu has worked around the world in the public and private sectors as a strategist, architect and communicator on identity, security and privacy topics for over 20 years. He has worked on standards and made active contributions in areas...
Kristi Wilson
Senior Fraud Manager, Special Investigations
T-Mobile
Wilson is a telecommunications industry professional with 15+years in fraud detection, mitigation, and criminal analytics. Kristi’s passion for Fraud began early in her career as an investigator for Commerce Bank, headquartered in Kansas City, MO. The last 10 years have...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
James Hitchcock
Vice President, Fraud Mitigation
American Bankers Association
Jim Hitchcock is the Vice President for Fraud Mitigation at ABA and serves as the association’s primary expert on fraud mitigation activities and programs. In this role, he identifies and tracks key fraud topics and trends, runs banker committees focused...
View Agenda
Building an IoT Security Roadmap
Bo Berlas, CISO, U.S. General Services Administration

As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing. 

In this fireside chat Bo Berlas, CISO, GSA will discuss:

  • Developing an IoT/OT security roadmap - successes and challenges 
  • Techniques to achieve visibility 
  • Supply chain risk management
  • Software and hardware device testing  


Bo Berlas
  • 09:00 AM
  • 09:29 AM
How is Mobile Phone Fraud Evolving - and What Can We Do About It?
Karen Boyer, SVP Financial Crimes, Fraud Intelligence, M&T Bank
Kristi Wilson, Senior Fraud Manager, Special Investigations, T-Mobile

An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?

This expert panel will share insights and strategies, including:

  • How the past two-plus COVID years have changed the face of fraud;
  • The evolution of unauthorised mobile porting, SIM swapping and account takeover fraud;
  • How the industry can adopt stronger authentication methods such as FIDO.
Karen Boyer
Kristi Wilson
  • 09:30 AM
  • 09:59 AM
Biometrics and IoT- The Golden Ticket of Security?
Lana DeMaria, Director, Data Privacy, Alaska Airlines
Alexander Vitruk, Senior Litigation Associate, Baker & Hostetler LLP

Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks. 

Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.

Lana DeMaria
Alexander Vitruk
  • 10:00 AM
  • 10:29 AM
The 2023 SBOM, Bombshell! Are you Compliant?
James DeLuccia, Product Security Chief, Honeywell
James DeLuccia
  • 10:30 AM
  • 10:59 AM
The Challenge of Zelle Fraud
Karen Boyer, SVP Financial Crimes, Fraud Intelligence, M&T Bank
James Hitchcock, Vice President, Fraud Mitigation, American Bankers Association

Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?

This expert panel will share insights and strategies, where they will:

  • Analyze the Zelle scams and other social engineering trends, and their impact on the overall payment fraud landscape
  • Discuss the challenges for banks, consumers and regulators
  • Evaluate best practices to prevent and reduce the impact of impersonation fraud
Karen Boyer
James Hitchcock
  • 11:00 AM
  • 11:29 AM
Exhibit & Networking Break
  • 11:30 AM
  • 11:59 AM
Medical Device Cybersecurity: Top Priorities
Rob Suarez, VP & CISO, BD (Becton, Dickinson & Company)
Kevin Fu, Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security, University of Michigan

The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:

  • The differences between IT cybersecurity versus OT cybersecurity in dealing with medical devices;
  • How healthcare delivery organizations can prioritize and put into action recommendations contained in guidance materials, vulnerability alerts, white papers and other documents pertaining to medical device cybersecurity;
  • Top medical device lessons emerging from ransomware and other disruptive cyberattacks that have been hitting the healthcare sector;
  • The importance of medical device SBOMs – as well as dealing with the challenges that SBOMs create for some entities.
Rob Suarez
Kevin Fu
  • 12:30 PM
  • 12:59 PM
Securing the People in Our Streets through the Interconnections of Technology
Troy Leach, Chief Strategy Officer, Cloud Security Alliance

Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:

  • Highlight the edge networks, application management systems and highway infrastructure that support our day-to-day living and security
  • Discuss the most innovative technology stacks to reach new capabilities

Assess how security must be addressed to keep our data, lives, and streets safe

Troy Leach
  • 01:30 PM
  • 01:59 PM
Attack Surface Management: Avoiding Device Whack-a-Mole
Tari Schreider, Analyst, Aite-Novarica Group

Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces

Tari Schreider
  • 02:00 PM
  • 02:29 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate

  • Biggest threats based on trending attacks 
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
Matanda Doss
  • 02:30 PM
  • 02:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, December 9th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

ISMG, the leading media provider to the cybersecurity community, has shown its commitment to education and networking through its series of Global Summits over the last nine years. Our Connected Devices Summit brings leaders and key decision-makers together to connect and learn from each other’s success, as well as challenges, in an interactive educational environment to better combat fraud.

The Connected Devices Summit agenda is designed with a goal of providing actionable education implement back at the office immediately. This year's agenda will cover medical device security, growing cybersecurity issues associated with enterprise IoT, the growing attack surface, modernizing IT and OT and more. As you plan for the coming year, navigate the latest stage in the pandemic, and pivot for unexpected vulnerabilities and ever-changing threat landscape, please join us on August 16th and 17th for the Connected Devices Summit!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Ari Redbord
Head of Legal and Government Affairs
TRM Labs
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
David Pollino
Former CISO
PNC Bank

Craig Barrett
VP Cybersecurity
Kinder Morgan, Inc.
Anna Delaney
Director, ISMG Productions
ISMG
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Chuck Makarian
CISO
PACAAR
Rob Suarez
VP & CISO
BD (Becton, Dickinson & Company)
Roberto (Rob) Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and strategic leader for information security. In this role Rob is responsible for developing...
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Bo Berlas
CISO
U.S. General Services Administration
Bo Berlas is the Chief Information Security Officer (CISO) at the U.S. General Services Administration (GSA) where he leads cybersecurity strategy, policy, operations, and implementation of the agency security program. He has over 21 years of combined Information Technology and...
James DeLuccia
Product Security Chief
Honeywell
James leads the security market strategy for global products across Honeywell on Azure and Amazon. In combination with this role, James is responsible for leading, generating, and commercializing cybersecurity market benefits and independent offerings. Author of two books, the most...
Kevin Fu
Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security
University of Michigan
Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
Lisa Tuttle
CISO
SPX Corporation
Lisa Tuttle has served as an executive leader of global organizations, managing technology teams with her engaging enthusiasm and unique combination of information security, privacy, legal, compliance, project management and business management expertise. As CISO of SPX Corporation, she provides...
Tari Schreider
Analyst
Aite-Novarica Group
Schreider is a strategic adviser at Aite-Novarica specializing in cybersecurity, information assurance, security program architecture and maturity improvement. He has more than 40 years of experience in security, privacy and recovery management. Before joining Aite-Novarica, he was a distinguished technologist...
Alexander Vitruk
Senior Litigation Associate
Baker & Hostetler LLP
At BakerHostetler in Seattle, Vitruk defends and advises companies in complex litigation, with an increased focus on data privacy and cybersecurity matters. He has managed cases through all phases of litigation and arbitration and has secured positive outcomes for clients...
Karen Boyer
SVP Financial Crimes, Fraud Intelligence
M&T Bank
Karen Boyer has over 20 years of diverse banking experience with over 15 in the realm of Fraud. She is currently Vice President of Financial Crimes and Fraud Intelligence, at People’s United Bank, a regional bank in the Northeast with...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
Lana is a motivated and results-oriented leader with international experience (deploying impactful programs, landing global projects, and establishing connections with brilliant people in the US, Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt, Czech Republic). Lana is experienced in...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Denny Prvu
Global Director of Identity & Access Management
RBC
Denny Prvu has worked around the world in the public and private sectors as a strategist, architect and communicator on identity, security and privacy topics for over 20 years. He has worked on standards and made active contributions in areas...
Kristi Wilson
Senior Fraud Manager, Special Investigations
T-Mobile
Wilson is a telecommunications industry professional with 15+years in fraud detection, mitigation, and criminal analytics. Kristi’s passion for Fraud began early in her career as an investigator for Commerce Bank, headquartered in Kansas City, MO. The last 10 years have...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
James Hitchcock
Vice President, Fraud Mitigation
American Bankers Association
Jim Hitchcock is the Vice President for Fraud Mitigation at ABA and serves as the association’s primary expert on fraud mitigation activities and programs. In this role, he identifies and tracks key fraud topics and trends, runs banker committees focused...

View Agenda
Building an IoT Security Roadmap
Bo Berlas, CISO, U.S. General Services Administration

As CISO of GSA, the largest real estate company in the world, Bo Berlas monitors, manages and secures thousands of devices. With over 21 years of combined information technology and cybersecurity experience spanning both private industry and the federal government, Bo shares details of how he developed an IoT/OT security roadmap, the challenges he has faced in the process, and how he approaches segmentation, supply chain management and device testing. 

In this fireside chat Bo Berlas, CISO, GSA will discuss:

  • Developing an IoT/OT security roadmap - successes and challenges 
  • Techniques to achieve visibility 
  • Supply chain risk management
  • Software and hardware device testing  


Bo Berlas
  • 09:00 AM
  • 09:29 AM
How is Mobile Phone Fraud Evolving - and What Can We Do About It?
Karen Boyer, SVP Financial Crimes, Fraud Intelligence, M&T Bank
Kristi Wilson, Senior Fraud Manager, Special Investigations, T-Mobile

An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?

This expert panel will share insights and strategies, including:

  • How the past two-plus COVID years have changed the face of fraud;
  • The evolution of unauthorised mobile porting, SIM swapping and account takeover fraud;
  • How the industry can adopt stronger authentication methods such as FIDO.
Karen Boyer
Kristi Wilson
  • 09:30 AM
  • 09:59 AM
Biometrics and IoT- The Golden Ticket of Security?
Lana DeMaria, Director, Data Privacy, Alaska Airlines
Alexander Vitruk, Senior Litigation Associate, Baker & Hostetler LLP

Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks. 

Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.

Lana DeMaria
Alexander Vitruk
  • 10:00 AM
  • 10:29 AM
The 2023 SBOM, Bombshell! Are you Compliant?
James DeLuccia, Product Security Chief, Honeywell
James DeLuccia
  • 10:30 AM
  • 10:59 AM
The Challenge of Zelle Fraud
Karen Boyer, SVP Financial Crimes, Fraud Intelligence, M&T Bank
James Hitchcock, Vice President, Fraud Mitigation, American Bankers Association

Fast, convenient … free! It's not surprising that Zelle is America's most popular payment app. The peer-to-peer (P2P) payment service, created by a consortium of major US banks, lets users transfer funds directly between bank accounts at no charge. Unfortunately it's also proven popular with the fraudsters. Through well-crafted social engineering techniques, criminals are successfully duping consumers to make fraudulent transactions. How can we tackle the new challenge of P2P payment fraud?

This expert panel will share insights and strategies, where they will:

  • Analyze the Zelle scams and other social engineering trends, and their impact on the overall payment fraud landscape
  • Discuss the challenges for banks, consumers and regulators
  • Evaluate best practices to prevent and reduce the impact of impersonation fraud
Karen Boyer
James Hitchcock
  • 11:00 AM
  • 11:29 AM
Exhibit & Networking Break
  • 11:30 AM
  • 11:59 AM
Medical Device Cybersecurity: Top Priorities
Rob Suarez, VP & CISO, BD (Becton, Dickinson & Company)
Kevin Fu, Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security, University of Michigan

The cybersecurity threats and challenges involving medical devices just keep growing, potentially putting patient safety, data confidentiality and security at risk. This session will explore ways healthcare CISO and their teams can better address issues, including:

  • The differences between IT cybersecurity versus OT cybersecurity in dealing with medical devices;
  • How healthcare delivery organizations can prioritize and put into action recommendations contained in guidance materials, vulnerability alerts, white papers and other documents pertaining to medical device cybersecurity;
  • Top medical device lessons emerging from ransomware and other disruptive cyberattacks that have been hitting the healthcare sector;
  • The importance of medical device SBOMs – as well as dealing with the challenges that SBOMs create for some entities.
Rob Suarez
Kevin Fu
  • 12:30 PM
  • 12:59 PM
Securing the People in Our Streets through the Interconnections of Technology
Troy Leach, Chief Strategy Officer, Cloud Security Alliance

Technology has enabled humans to do more than we ever have before. Intelligent systems have reached our cars, bikes, scooters, and skateboards for use in navigation, streaming services, safety, and more. Controlled by critical ingredients, the smart city ecosystem ensures that we are protecting our most valuable assets, the human. Troy Leach, our expert speaker, will share his insights on how technology is being used for everyday living and safety and will:

  • Highlight the edge networks, application management systems and highway infrastructure that support our day-to-day living and security
  • Discuss the most innovative technology stacks to reach new capabilities

Assess how security must be addressed to keep our data, lives, and streets safe

Troy Leach
  • 01:30 PM
  • 01:59 PM
Attack Surface Management: Avoiding Device Whack-a-Mole
Tari Schreider, Analyst, Aite-Novarica Group

Chief information security officers (CISOs) face unseen and unmanaged assets, resulting in poor asset hygiene and exploitable areas of an IT estate. Various cybersecurity solutions attempt to discover computing assets, but few are equipped to identify today’s expansive and complex attack surfaces

Tari Schreider
  • 02:00 PM
  • 02:29 PM
Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate

  • Biggest threats based on trending attacks 
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
Matanda Doss
  • 02:30 PM
  • 02:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, December 9th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

December 8 - 9, 2022

Connected Devices Summit