Invalid quantity. Please enter a quantity of 1 or more.
The quantity you chose exceeds the quantity available.
Please enter your name.
Please enter an email address.
Please enter a valid email address.
Please enter your message or comments.
Please enter the code as shown on the image.
Please select the date you would like to attend.
Please enter an email address.
Please enter a valid email address in the To: field.
Please enter a subject for your message.
Please enter a message.
You can only send this invitations to 10 email addresses at a time.
$$$$ is not a properly formatted color. Please use the format #RRGGBB for all colors.
Please limit your message to $$$$ characters. There are currently ££££.
$$$$ is not a valid email address.
Please enter a promotional code.
N/A
Sold Out
Unavailable
Please enter a password with at least 8 characters.
You have exceeded the time limit and your reservation has been released.
The purpose of this time limit is to ensure that registration is available to as many people as possible. We apologize for the inconvenience.
This option is not available anymore. Please choose a different option.
Please read and accept the waiver.
All fields marked with * are required.
Please double check your email address. The email address format does not appear valid.
Please double check your email address. Your emails do not match.
$$$$ requires a number between ££££ and §§§§
US Zipcodes need to be 5 digits.
Postal code may contain no more than 9 letter or number characters.
Please double check your website URL.
All fields marked with * are required.
Your card expiration date is in the past.
Your card CSC needs to be 4 digits.
Please confirm your order: $$$$ You have selected to Pay by Check.
Click OK to confirm your order.
Please confirm your order: $$$$ You have selected to Pay at the Door.
Click OK to confirm your order.
Please confirm your order: $$$$ You have selected to Pay upon Receiving an Invoice.
Click OK to confirm your order.
Your card CSC needs to be 3 digits.
Sofort is only available in Germany and Austria.
Boleto Bancario is only available in Brazil.
OXXO is only available in Mexico.
PagoFacil is only available in Argentina.
Rapipago is only available in Argentina.
Please enter a valid IBAN number.
You need to accept to charge your bank account.
Your billing zip code needs to be 5 digits.
Please double check your CEP info. The CEP format should be something like 12345-678.
Please double check your tax identifier.
There was a problem saving your address.
There was a problem saving your card info.
There was a problem saving your personal information.
Please select the date you would like to attend.
McAfee Secure sites help keep you safe from identity theft, card fraud, spyware, spam, viruses and online scams.
Copying Prohibited by Law - McAfee Secure is a Trademark of McAfee, Inc.
Unknown card type.
No card number provided.
card number is in invalid format.
Wrong card type or card number is invalid.
card number has an inappropriate number of digits.
Please enter numbers here.
Please enter an integer value.
Numbers must be less or equal to $$$$
All the required fields have not been filled out. Click OK to proceed without all the required information, or click Cancel to finish entering the missing data.
Job titles must be less than 50 characters.
There is currently an issue with card submission on Safari with iOS7. Please try again with a different browser or device.
Sorry, invalid event registration form.
Sorry, invalid event or database error.
Sorry, quantity must be a positive integer.
Sorry, you did not select a valid ticket.
Sorry, invalid event organizer email address.
Your order was canceled.
Thank You. Your order has been successfully completed. Your name and email address have been added to the list of event attendees.
Sorry, that option is sold out.
Sorry, that option is no longer available.
Sorry, there are only 7 tickets of that type still available.
Sorry, you entered an invalid quantity. Please enter a quantity of 1 or more next to the type or types of tickets you would like to purchase.
Sorry, you did not select any tickets to purchase. Please enter a quantity of 1 or more next to the type or types of tickets you would like to purchase.
Sorry, there are no tickets left for this event.
The tickets, ticket quantity or date and time you've requested are no longer available, due to previous sales. Please choose a different date, time or number of tickets and place your order again.
Sorry, one or more of the tickets you requested are no longer available for purchase.
Sorry, you need to select the date you want to attend.
Sorry, the promotional code you entered is not valid yet.
Sorry, the promotional code you entered has expired.
Sorry, the promotional code you entered is not valid.
Your session has expired. Try ordering again.
Sorry, your requested ticket quantity exceeds the number provided by your promotional code.
Richard Stiennon (Special Guest) - Book Release - Secure Cloud Transformation: The CIO's Journey International Cybersecurity Dialogue / Senior Fellow IT-Harvest / Chief Research Analyst Fortinet / CMO Gartner / VP Research @stiennon | LI
Matt Swann - Intrusion Detection with Graph Analytics Microsoft / Office 365 SharePoint & OneDrive / Principal Engineering Manager / Senior Security Lead @mswannmsft | LI
Victor Fang - Graph Mining to Detect the World's 1st Blockchain APT AnChain.ai / CEO Mandiant/FireEye / Director Data Science Awake Security / Founding data scientist @vicfcs | LI
John Bambenek - Visualizing Nazis, Sextortion, and Bombers in the Blockchain ThreatSTOP / VP Security Research & Intel UIUC / Lecturer Fidelis / Senior Researcher @bambenek | LI
LeoMeyerovich - Scaling Attack Visualizations with GPUs & Design Graphistry / CEO UC Berkeley @lmeyerov | LI
Sarah Fender - Building a Virtual Graph Using APIs Microsoft / Intelligent Security Graph / Principal Group Program Manager PhoneFactor / VP Product & Marketing
Rodrigo Aramburu - Lightning Fast NetFlow Traffic Analysis: GPU acceleration with RAPIDS AI & BlazingSQL BlazingDB / CEO @rodaramburu | LI
Sherrie Caltagirone - TBA Global Emancipation Network / Founder & Executive Director The Protection Project / Director of Finance and Administration American University / Economics Researcher
GRAPH THE PLANET 2019 brings together security practioners to share graph practices. From killchain analysis, auditing authority, and powering automated detection, to segmentation, attribution and research, an open secret in security is graph techniques. They often require employing a mix of practices that are not well-documented. Attendees and speakers span frontline incident responders and secops to data scientists and startups. GRAPH THE PLANET brings everyone together to foster conversations and share lessons that are often hard to have beyond a SOC or data team.
Sample topics
IR, Hunt, Intel, Research, Red Team, Network Security, SecOps
Richard Stiennon (Special Guest) - Book Release - Secure Cloud Transformation: The CIO's Journey International Cybersecurity Dialogue / Senior Fellow IT-Harvest / Chief Research Analyst Fortinet / CMO Gartner / VP Research @stiennon | LI
Bio: Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. He writes columns for Forbes, CSO Magazine, and Axios. He is a member of the advisory board at the Information Governance Initiative and sits on the Responsible Recycling Technical Advisory Board, the standard for electronic waste. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London.
Matt Swann - Intrusion Detection with Graph Analytics Microsoft Principal Engineering Manager / Senior Security Lead @mswannmsft | LI
Abstract: The Office 365 intrusion detection team uses graphs to link alerts and incorporate low-fidelity observations without overwhelming our analysts. In this talk, we will describe how we represent alerts in the graph, how we use the structure of the graph to determine which alerts should be reviewed by our analysts, and how we rank subgraphs to ensure that the most important activity is reviewed first. We will also discuss approaches we will investigate next to get even more value out of our alert graph.
Bio: Matt Swann leads the engineering team focused on defending customer content in OneDrive and SharePoint. A 13-year veteran of the SharePoint team at Microsoft, he is passionate about intrusion detection, incident response, and digital forensics. Outside of work, you can find Matt playing with his kids or hiking in the Cascades.
Victor Fang - Graph Mining to Detect the World's 1st Blockchain APT AnChain.ai / CEO Mandiant/FireEye / Director Data Science Awake Security / Founding data scientist @vicfcs | LI
Abstract: AnChain.ai recently discovered the first Blockchain APT (BAPT) hacker group in history. Using AnChain.ai's AI powered Situational Awareness Platform (SAP), we found the sophisticated group has been targeting vulnerable DApp smart contracts: Fomo3D, LastWinner, etc. As of Aug 2018, they have stolen ~$4 million Ethereum. AnChain.ai, partnering w/ SECBIT Lab and Graphistry, was able to track down the BAPT hacking tactics. This talk shares how we combine behavior-based machine learning, knowledge graph, bytecode reverse engineering, visual graph investigation, etc.
You will learn more about our quest: “APT is the worst nightmare in Cyber Security. Does Blockchain APT even exist in Blockchain era? What does that mean to all of us?”
Bio: Dr. Victor Fang is the Founder and CEO of AnChain.ai, AI powered blockchain security, based in San Jose. Before AnChain.ai, he ran the AI initiatives at FireEye Mandiant and was responsible for company's AI product strategic roadmap. Under his leadership, various of ML models have been successfully introduced into millions of endpoints and various services that improves On-Execution dynamic detection and efficiency. He also initiated FireEye's AutoML platform that has delivered hundreds of ML models to network and email security products. He's recognized as the face of FireEye AI. Prior to FireEye, Dr. Fang has 10+ years of ML practice and 5 years of enterprise data science leadership experience at top VC backed startup and Fortune 500 companies. Dr. Fang holds more than 15 US patents, and published more than 20 research papers around AI, Big Data, Fraud and Threat detection. He’s a contributor of “MIT Technology Review 2017”. First Prize Winner of 2017 FireEye Global Hackathon.
John Bambenek - Visualizing Nazis, Sextortion, and Bombers in the Blockchain ThreatSTOP / VP Security Research & Intel UIUC / Lecturer Fidelis / Senior Researcher @bambenek | LI
Bio: John Bambenek is the Vice President for Security, Research and Intelligence with ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 19 years of experience in information security and leads several international investigative efforts tracking cybercriminals, some of which have led to high profile arrests and legal action. He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.
LeoMeyerovich - Scaling Attack Visualizations with GPUs & Design Graphistry / CEO UC Berkeley @lmeyerov | LI
Bio: Leo Meyerovich founded Graphistry to supercharge the visual investigation process through end-to-end GPU acceleration, workflow automation, & graph analytics. It builds on his research at UC Berkeley. His most referenced work is in language-based security. Past projects include the first functional reactive web language, first parallel web browser, GPU visual analytics, and sociological foundations of programming languages. These ideas received various research awards, including SIGPLAN Best of Year and best papers, and are now in most popular browsers and web frameworks.
Sarah Fender - Building a Virtual Graph Using APIs Microsoft / Intelligent Security Graph / Principal Group Program Manager PhoneFactor / VP Product & Marketing
Abstract: The Microsoft Graph Security API offers a new approach to connecting security data from across a customer’s security tools and workflows. It’s not a literal graph database – but that’s by design. In this talk, we’ll introduce the concepts driving the Graph Security API and how you use queries to pivot among related entities using the Microsoft Graph. We’ll walk through real-world examples that you can quickly apply in your own organization.
Bio: Sarah Fender leads product management for the Microsoft Intelligent Security Graph. Prior to that, she led security initiatives for Microsoft Azure, including the launch of Azure Security Center. Sarah joined Microsoft following its acquisition of PhoneFactor, where she served as Vice President of Product Management. Sarah has extensive experience in security and compliance having written and spoken on the topic during her more than 15 years in the industry.
Rodrigo Aramburu - Lightning Fast NetFlow Traffic Analysis: GPU acceleration with RAPIDS AI & BlazingSQL BlazingDB / CEO @rodaramburu | LI
Sherrie Caltagirone - TBA Global Emancipation Network / Founder & Executive Director The Protection Project / Director of Finance and Administration American University / Economics Researcher
Share GRAPH THE PLANET 2019
Email Share Tweet