Introduction to Cribl with Nick Heudecker

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Nick Heudecker

Cribl’s mission is to unlock the value of all observability data – the logs, events, metrics, and traces comprising your monitoring and security environment. This session provides an introduction to Cribl’s approach to restore choice and control over observability data with Cribl Stream, its leading observability pipeline. We’ll also explore Cribl Edge and the newly announced Cribl Search. Finally, we’ll wrap up with a look at Cribl’s freely available certification programs.


Swimlane Good (SecOps) Defense is Having a Good Offense

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

Every security organization, team, and individual is trying to get ahead of everything on their plate but seldom do we have the time to do everything we need to get to everything. Many teams have immense backlogs of processes, activities, and programs that, given enough manpower, would help reduce the risk to their organization. In this section, we will demonstrate how organizations can move beyond reactionary and become proactive in protecting their organization and how that doesn’t have to be relegated to only SOC teams.


Doing Security Incident Response in Your Sleep with Swimlane

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

As we all know, security operations is an around-the-clock job, but building automation response systems is a way to drastically reduce the impact of a potential breach, as well as human error and much of the fatigue that teams are plagued with daily. In this section, we will show you how to measure your readiness for automated response and how to leverage it now that you have a solid SecOps automation foundation in place.


Building a SecOps Automation Foundation with Swimlane

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

The SecOps Automation Maturity Model is a framework for helping organizations better understand where they are on the security automation maturity spectrum. In this section, we will discuss and demonstrate what both a foundational and enriched SecOps automation state should look like and how to better measure and prepare your team for an automation journey.


Single Pane of Glass Can’t Fix Security Tools

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

Security tools are so numerous it’s hard to keep track of them. So many, in fact, that no one solution can even manage them all. Is Single Pane of Glass really the best way to stay on top of the burgeoning dearth of solutions? Or should you be looking elsewhere? In this roundtable discussion featuring the Security Field Day delegates, learn how you may need to lower your expectations and find a few more windows to enjoy.


Insider Threats Are The Biggest Infosec Problem

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

The biggest threat to your organization is working inside of it. The growing number of disgruntled employees selling access to internal resources is climbing higher than you can imagine. What are some good steps to take to prevent this from opening you up to attack? How can you spot potential insider issues before they spiral out of control? Learn more in this roundtable featuring the Security Field Day delegates.


Will We Be Forced to Live with Ransomware?

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

Ransomware is a constant threat that is only growing larger. The shift to making it a criminal enterprise is only making the job of the security team harder. In this roundtable discussion, the Security Field Day delegates discuss the motivations of attackers and steps you can take to protect yourself from them. Even if we’re forced to live with ransomware that doesn’t mean we must be impacted by it.


HashiCorp Boundary Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. In this presentation, Rob Barnes will demo how HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don’t require managing credentials or exposing your entire network.


HashiCorp Consul Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Consul enforces authentication between applications by ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using service mesh. Rob Barnes, Developer Advocate at HashiCorp will demo how Consul enables machine-to-machine access as a key pillar of zero trust security.


HashiCorp Vault Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Vault provides the foundation for modern multi-cloud security. It was purpose-built in the cloud era to authenticate and access different clouds, systems, and endpoints, and centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest. In this presentation HashiCorp Developer Advocate, Rob Barnes will demonstrate how Vault’s machine authentication and authorization capabilities are a key pillar of zero trust security.


HashiCorp Zero Trust Security Overview

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Megan LaFlamme

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.


Micron Secure Device Configuration Demo using Triathlon Platform

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Ari Singer

One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force to unify the two species. We are thus left with a DIY approach for the vast majority of products and services today. Enter the Authenta Triathlon platform. We will demonstrate how this platform enables standard JEDEC memories to unite to speak the same security language for any cloud platform, greatly simplifying and securing the device lifecycle from design to deployment of services.


Micron Device Identities on ICAM – IT Meets OT

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Chuck White

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.


Micron Authenta Customer Blueprints

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Ari Singer

Authenta Cloud Platform customers are some of the industry’s most pioneering companies pushing forward the next generation of connected products and services at the edge. This ranges from the data centers lowering operation costs and deploying innovative business models, like Bare-Metal-as-a-Service, to the auto OEMs supporting Mobility-as-a-Service trends. All of these use cases require foundational trust layers for the secure assembly and manufacturing of final products and systems. We will walk through these customer blueprints, or use cases, and explore how customers are leveraging Authenta Cloud Platform with their solutions’ architectures to secure the edge.


Micron Silicon Trust in the Subscription Economy

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Luis Ancajas

Customers are no longer satisfied with static product ownership as we lean into the subscription economy. The digital transformation is forcing every industry to build products that can evolve, giving them access to dynamic revenue streams, but this introduces new manufacturing and cybersecurity gaps that are hard for most companies to deal with. Micron has built Authenta, the silicon-to-cloud trust platform that can scale across industries, cloud platforms and hardware systems — transforming the cybersecurity risks into revenue for modern brands.


How to Use FortiCNP, Fortinet’s Cloud-Native Application Protection Platform, to Help Manage Cloud Risk

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Louie Aberra, Maristelle Bagis Hosaka

FortiCNP is Fortinet’s cloud-native application protection platform (CNAPP) that simplifies cloud security operations through native integrations with Cloud Service Providers’ security services and Fortinet Security Fabric solutions to provide unified and contextualized risk visibility across cloud resources and cloud environments.  FortiCNP provides resource risk prioritization and scalable workflows to help security teams prioritize risk management activities.


How to use FortiDeceptor – Fortinet’s Deception Technology, to Help Protect OT and IT Networks

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Moshe Ben Simon

FortiDeceptor, Fortinet’s innovative, non-intrusive, agentless OT/IT/IoT deception solution is a force multiplier to current security defenses, providing early detection and response to active in-network threats. The FortiDeceptor decoys generate high-fidelity, intelligence-based alerts that result in an automated incident response to help stop zero-day attacks. In this session, VP Product Management, FortiDeceptor, Moshe Ben Simon, provides valuable tips and insights on how to use deception for early breach detection and protection against cyber threats across the IT/OT environment.


How to use FortiRecon – Fortinet’s Digital Risk Protection service, to Help Detect, Prevent, and Respond to External Threats

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Carl Windsor

FortiRecon provides organization-specific, expert-curated and actionable External Attack Surface (EASM) intelligence, identifies threat actors’ activity and brand infringement, and monitors ransomware data leaks, to proactively help remediate and execute takedowns or purchase the stolen data on an organization’s behalf. In this session, SVP Product Technology & Solutions, Carl Windsor, introduces FortiRecon, Fortinet’ Digital Risk Protection (DRP) service, using key case studies and real-life business scenarios.


Does Hardware Matter in the Cloud?

Event:

Appearance: Intel Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Alastair Cooke

The narrative that hardware does not matter in the cloud is driven chiefly by the growing importance of software. In this Tech Field Day Showcase, presented to you by Intel, Alastair Cooke, cloud provider course teacher and co-author of Digital Infrastructure at Datacenter Scale zooms into this perception to provide an understanding of what created it in the first place and the truth of it. Asking what’s more important – the hardware or the software – is like the chicken or egg paradox. But the reality is, software that occupies the centerstage needs the hardware to exist. Without hardware, innovation at software level is not possible.


The Perfect Configuration

Event:

Appearance: Intel Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Ather Beg

The fastest processors do not necessarily guarantee the highest performance in a datacenter. In this Tech Field Day Showcase presented to you by Intel, Solutions Architect and co-author of Digital Infrastructure at Datacenter Scale, Ather Beg highlights a section of the whitepaper he wrote – The Perfect Configuration, where he debunks the hype around processors. Ather argues that a processor alone cannot deliver ultimate levels of performance without the support of other components. In fact, the secret to unlocking high levels of performance is getting the configuration right, and the perfect configuration is one in which all the components in the server are equally optimized.