The Conference for Web Security Pros
Join the top information security and technology professionals at Security Summit. Learn from industry leaders about the latest trends in security, and network with peers. The private event will be in Las Vegas February 22–24, 2018.
Why You Should Attend
In past years, attendees have said Security Summit gives them incredible
opportunities to network and learn.
|Thursday, February 22nd|
|5:30 p.m. – 7 p.m.
One on One with a Legend
Kevin Mitnick and Jason Sabin
|7 p.m. – 9 p.m.
|Friday, February 23rd|
8:30 a.m. – 9 a.m.
Pinyon 1, 2, and 3
|9 a.m. – 10:15 a.m.
|Pen Testing, Breaching Systems
|10:15 a.m. – 10:45 a.m.
|A New Era in SSL
|10:45 a.m. – 11 a.m.||Break|
|11 a.m. – 12 p.m.
|The Biggest Thing in PKI Since PKI
|12 p.m. – 1 p.m.
Pinyon 1, 2, and 3
|1 p.m. – 1:30 p.m.
|Mining for Raw Water: The Future of Tech in 2018
|1:30 p.m. – 2:30 p.m.||Customer Panel
Q&A: Vegas Style
|2:30 p.m. – 2:45 p.m.||Break|
|2:45 p.m. – 3:30 p.m.
Dean Coclin and Tim Hollebeek
|3:30 p.m. – 4:10 p.m.
Hardenize: Improving Security of Complex Ecosystems
|4:10 p.m. – 4:30 p.m.
|7 p.m. – 10 p.m.||Dinner at Herringbone Restaurant|
|Saturday, February 24nd|
Relive the Experience
Watch speakers from previous years discuss emerging trends, security best practices, and the latest innovations.
Know Your Threat
Learn about the state of corporate network security and common pitfalls organizations experience.
Managing Enterprise PKI
Deploying an enterprise PKI can be daunting and complex. Learn how to manage initial deployment, deploy at a scale, and perform on-going maintenance.
Mismanaging your secrets, including certificates, keys, and database passwords, can lead to fatal consequences, like leaks, outages, and compliance violations.
IoT Security Gets Real:
Provisioning, Managing and
Securing Connected Devices
Gain insight into the complexities of securing connected devices as panelists share use cases of provisioning devices and the obstacles that came with it.
Why Medical Device
Manufacturers are Turning to
Scott and Darin present use cases highlighting four different vulnerabilities for connected medical devices to demonstrate how PKI can be used to mitigate each situation.
Making Better Decisions:
A History Lesson
Learn how to keep your organizations secure in a rapidly evolving threat landscape.