Call for Presentations

Submissions for 2019 are now open

FireEye is seeking presentation submissions for its annual Cyber Defense Summit, being held in Washington DC from October 7-10, 2019. This Call for Presentations (CFP) is specifically for Summit breakout sessions being held on October 9 and 10.

Now in its 10th year, Cyber Defense Summit brings leaders from industry, government and academia together with FireEye experts and others from across the security community to address the challenges of today’s threat landscape. Last year’s Summit was attended by more than 1,200 people from 36 countries and we expect this year’s event to be even better.

Deadlines

Call for Presentations announced
May 1, 2019

Presentation proposals due
June 10, 2019

Proposal selections announced
July 8, 2019

Submissions are now closed

Thank you for your presentation proposals!

All proposals are being evaluated and speakers will be notified whether their proposal has been selected.

Please check back soon for details on selected speakers and Summit agenda details.

cds2018-021

Suggested Topics

Cyber Defense Summit is for you and about you. Your expertise and creativity are welcome in shaping the topics that will be covered and we invite you to propose interesting and relevant presentation topics for Summit breakout sessions.

Breakout sessions are focused around three tracks: Executive, Technical, Solutions.

Breakout session timeslots will be 50 minutes in length, allowing for 10 minutes between sessions. One 50-minute session can have two 25-minute sections, if applicable. Double sessions of 100-minutes will also be considered for extraordinary topics that require additional time. We encourage multi-speaker sessions to both provide different perspectives on the topic and create a more engaging session overall. Please specify the expected duration of your presentation in your proposal (50 min, 25 min, 100 min).

Submissions that include instructional material and take-aways will be given primary consideration.

Below are some of the suggested topics for each track.

Executive Track

What managers, executives, lawyers, and boards of directors need to know about cyber security
  • Cyber risk preparedness for the c-suite and board of directors
  • Considerations when dealing with cyber extortion or disruptive threat actors
  • Emerging security threats and countermeasures
  • Rise of the nation-state cybercriminal and implications to organizations and/or agencies
  • Appropriate uses of attribution and responsible disclosures in cyber defense and deterrence
  • The evolving role of public / private partnerships in developing polices, rules, and defenses to counter cyber threats and crime
  • Implications of operational technology (OT) or Internet of Things (IoT) on cyber security
  • Role of artificial intelligence in cyber security
  • The future state of cyber security
  • Busting the myths and misconceptions of cyber security
  • Strategic, legal and/or operational considerations regarding incident detection and response
  • Managing communications during a cyber breach: the dos, don’ts, and best practices
  • Practical implementations of zero trust principles
  • Elevating women into IT executive leadership
  • Securing information in the cloud era
  • Hidden cyber security risks during M&A
  • 5G: Risk management in an increasingly connected world
  • Implications of cyber security talent shortages

Technical Track

What security practitioners need to know to mitigate, detect, and respond to cyber attacks
  • Tales from the front lines – the latest on security breaches
  • Securing and investigating assets in the cloud
  • New, novel, or challenging adversary tradecraft
  • Red team operation and physical assessment war stories
  • Defending against nation-state sponsors/threat groups
  • Burgeoning malware techniques and analysis conundrums
  • Case studies highlighting unique, real-world intrusion scenarios and investigation and response efforts
  • How to not look like a red team
  • Using good or bad attribution to bolster or subvert an incident response
  • New state-sponsored players to the CNO scene, emerging nation-state APT capabilities
  • Dealing with SOC fatigue
  • Applying the intrusion lifecycle to real life architecture and investigations
  • Methods of improving the signal-to-noise ratio of security alerts you don’t fully control
  • Successes incorporating new data sets to “make lemonade” out of old ones, which combos of data are most valuable for defensive purposes
  • Important digital forensic artifacts leveraged for detection or investigation
  • Behind-the-scenes technical analysis for a public blog or report
  • Use of data science and machine learning approaches to gain efficiencies in analyst operations
  • Nuances of detection and incident response in ICS/OT environments
  • Challenges and successes in SOC analyst task automation
  • Vetted approaches to threat hunting, what works and what doesn’t
  • Practicalities of cyber defense, detection, forensics and response in specific sectors: government, financials, pharma, healthcare etc.

Solutions Track

How FireEye solutions are used on the front lines of cyber security
  • How FireEye helps to protect customer data in the cloud
  • Real-world examples - FireEye offerings leveraged to prevent cyber attacks and protect an organization’s assets
  • The power of partnerships: synergies and advantages of working with the partner ecosystem
  • Best practices on how to gather, share, and use intelligence to stay a step ahead of attackers
  • Insight into the unique nature of regional threats and how to leverage FireEye to mitigate those challenges
  • Lessons learned on addressing the particular challenges of cyber security within your industry (cite examples of what’s unique about your industry’s security challenges and how you leveraged FireEye to address them)
  • Showcase of successful experiences with FireEye Helix, FireEye’s Endpoint Security, Email Security, Network Security and Expertise on Demand. Additionally, Managed Defense, threat intelligence, investigations and incident response offerings.