Illuminating Identity Risk Blindspots: Eliminating the Top Vectors for Attacks

CISO Dinner

October 6, 2022 - Chicago, IL

Visionaries

Ofer Israeli

CEO & Founder

Illusive Networks

Dinner

Having pioneered deception-based cybersecurity, founder and CEO of Illusive Networks Ofer Israeli leads the company at the forefront of the next evolution of cyber defense. Prior to establishing Illusive, Ofer managed development teams based around the globe at Israel’s seminal cybersecurity company Check Point Software Technologies and was a research assistant in the Atom Chip Lab focusing on theoretical Quantum Mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev.

Ken Kazinski

Global Application Security Sr Manager

Abbott

Dinner

Ken Kazinski is the manager of Abbott Laboratories Attack Surface Management team and has over twenty years of experience in the field of cybersecurity. His current cybersecurity focus is in application security, which is enhanced with his substantial knowledge of system security in both government regulated and non-regulated industries. These environments have provided him with a deep contextual understanding on the impact of security in a variety of organizational environments. In his role at Abbott, Ken provides leadership, program vision, and integration guidance on attack surface areas, including Threat and Vulnerability Management, Application Security, Cloud Security, Mobility, and Brand Reputation. As an Air Force veteran with a Master of Science in Cybersecurity, Ken has used both his professional and educational experience to create critical application security programs at multiple Fortune 100 companies. Prior to joining Abbott, Ken managed application security for Johnson Controls, Power Solutions division. His professional and military experience has provided him with the opportunity to work and live in multiple countries around the world.

Cole Sinkford

CISO

GE Energy

Dinner

Cole Sinkford is GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

Igor Volovich

Vice President, Strategy

Qmulos

Dinner

Igor Volovich is the VP of Strategy at Qmulos, a veteran-led cybersecurity and compliance automation firm transforming enterprise risk management through the power of Converged Continuous Compliance™. Igor is an award-winning cybersecurity executive and industry thought leader whose experience includes some of the largest private and public sector enterprises, including CISO roles at Invensys and Schneider Electric, and most recently as a senior enterprise security strategy and architecture advisor to the CISO of the United States Postal Service.

Cole Sinkford

CISO

GlobalFoundries

Dinner

Cole Sinkford the Global CISO at Globalfoundries Inc. Prior to this he was GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

October 6, 2022

Agenda

All times Central Time

5:30 PM-9:00 PM

Illuminating Identity Risk Blindspots: Eliminating the Top Vectors for Attacks

Identity is now the number one attack vector – vulnerable identities are present in every organization. Identity risks are like a residue that remains after the course of normal IT operations. Vulnerable identities persist because of gaps between IT and security teams, and because of gaps within existing identity solutions, such as Privileged Access Management (PAM). Unmanaged and misconfigured identities, such as service accounts and Shadow Admins, make it trivial for attackers to find and then exploit exposed identities. Identity Risk Management proactively identifies and removes these vulnerable credentials and connections, preventing attackers from gaining privileged access. Research from Illusive shows: -1 in 6 enterprise endpoints has exploitable identity risks -87% of local admins are not enrolled in a privileged account management (PAM) solution -Every organization lacks visibility into vulnerable “shadow admins” -More than 1 in 10 endpoints has cached credentials from privileged accounts—the digital equivalent of leaving your password on a sticky note

In Partnership With