To address increasingly sophisticated cyberthreats and protect their growing attack surface (Cloud, mobile, BYOD, IoT trends), more and more organizations – not only the largest ones – are moving to security analytics and automation to enhance the prevention of security breaches, to quickly identify and respond to security incidents and, ultimate goal, to predict them.
This security intelligence marks a step beyond the traditional perimeter security approach and static rules of technologies such as Security Incident and Event Management systems (SIEM) and Identity and Access Management (IAM): a shift from reactive to proactive security.
This new approach relies on a set of real-time advanced analytics revolving around machine learning / AI / User Behaviour Analytics tech foundations associated with a necessary rethink of security management strategies, policies and mindsets for true “cyber resilience” and threat intelligence.
Over 2.5 days, the Predictive Security World conference offers an independent platform to:
– Explore the state-of-the-art advanced analytics technologies for cybersecurity
– Review and assess the tools and platforms shifting from security monitoring to prediction
– Share models and best practices to implement adaptive security architectures
– Think forward threat intelligence to face the new cyberthreat landscape
Predictive Security World will gather security practitioners and innovators from public and private sectors and anyone interested in keeping pace with the latest proactive security trends.
Held in the framework of Smart Security Week,Predictive Security World is complementary to parallel conferences addressing complementary security technologies to block and prevent attacks: Identity & Cybersecurity Innovation World covering access and identification management and Connect Security World covering IoT Security.
Predictive Security World is looking for novel expert-level contributions in the following topics.
We welcome suggestions of topics that presenters feel qualified to address.
● Advanced Analytics Platforms
– Big Data and advanced analytics for cyber security
– Behaviour analytics, user activity monitoring, enterprise threat detection
– Machine Learning for security, Machine Learning-as-a-Service (MLaaS)
– AI Security applications, Cognitive security
– Endpoint Detection and Response (EDR)
● Techniques, methods and models
– Situation/context aware security
– Unified/holistic security analytics
– Formal methods for security analytics
– Formal semantics of security policies
– Analytics of attacks motive and attribution
– Configuration testing, forensics, debugging and evaluation
– Cyber resilience approach
– Attack forensics and automated incident analysis
– Cyberthreats modeling
– Advanced persistent threat techniques detection
– Moving target defense
● Best Practices
– Implementing a risk-based security framework
– Security orchestration best practices
– Moving from SIEM to security analytics
– Automated identity management
– Risk-based authentication (RBA)
– Implementation lessons
● Compliance and Policies
– Risk management and compliance
– Centralised policy management and audit
– Security policy management
– Security metrics, indicators of compromise
– Security awareness policy
– Compliance, Accountability and provenance
– Evaluation and certification schemes and legal frameworks
● Security Strategy
– Automation to solve security talents scarcity
– Aligning security objectives to business strategy
– Manual vs automated monitoring
– Balancing automated and human expertise in a security team
● Cooperation with external partners, cooperation between government/regulation bodies and industry
● Government initiatives status and outlook: US CISA (Cybersecurity Information Sharing Act), EU directive NIS (Network and Information Security), New York State DFS…
● Threat sharing platforms: MISP (Malware Information Sharing Platform), X-Force Exchange…
● Structured threat information standards, implementation and progresses: IDMEF (Intrusion Detection Message Exchange Format), IODEF (Incident Object Description Exchange Format), ISI (Information Security Indicators), STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), CybOX (Cyber Observable Expression)…
Aimed at a broad range of cybersecurity practitioners in businesses (any size) and public organizations as well as professional evolving in data security sensitive environments, the conference will gather:
– Security managers, CISO/CSOs, CRMO/CROs, IT/security analysts, Risk Managers etc.
– Digital Security experts from Academia and Industry
– Data scientists and engineers, Data Warehousing and Business Intelligence experts
– Technology decision makers from Government departments and enterprise
– Regulators and standard bodies, CERTs
– Managed security services providers and implementers, IT/SaaS providers and implementers, Network operators and technology manufacturers
Please send your speaking proposals using the submission template.
Authors are invited to submit their proposals electronically to schanourdie(at)strategiestm.com If authors do not receive acknowledgment within 72 hours, they are kindly invited to contact directly schanourdie(at)strategiestm.com
All speaking proposals must be original ones and should be informative and impartial. The Program Committee will reject commercially-oriented presentations.
Notification of acceptance or rejection will be sent to authors on May 2, 2018
Authors of accepted presentations commit themselves to present their paper at the conference. In case of personal impediment, the speaking person should appoint the backup speaker.
Registration fee is included in the Platinum, & Gold & Silver sponsor packages for one speaker. Regular registration speaker’s registration rate is €550 excl. vat. Speaker registration gives access to the conference & its proceedings, breaks and lunches, networking tool. Speakers’ travel and accommodation expenses are not covered by the organizers.
Proceedings of the conference will be available at the opening of the event. Clear instructions about the proceedings will be sent to the authors of accepted presentations.
The organizers commit themselves not to disseminate the presentations before the conferences.
► Official Program Appearance: June 4, 2018
► Complete presentation for the proceedings: September 7, 2018
► If you are a supplier of security intelligence solutions and expertise, you are also invited to take part in the exhibition.
► SMART SECURITY WEEK AWARDS: Get prepared! The Smart Security Week Awards will spotlight the best trusted techs solutions. Finalists will be invited to the Awards ceremony. The Awards selection process will start in May 2018.
View the PC members list online.