Trustwave Event

RSA Conference 2019

Moscone Center, San Francisco, CA
March 4 - 8, 2019

Come visit us at booth N 5565 in the Expo

Join us in San Francisco for RSA Conference 2019, where experts, leaders, and industry movers come together to discuss the most pressing issues in digital security today.

Listen to informative sessions with industry leaders
Speak one-on-one with solution specialists
Play SolveIT trivia for great prizes
Take a virtual reality tour of our Fusion Center

 

Trustwave Schedule of Events


  • date_range Tuesday, March 5
  • schedule 1:00 PM
  • place North Briefing Center

Hunting the Hunters: Going Behind Enemy Lines

Learn about top government sponsored threat actors targeting the US. Trustwave will demonstrate attacks and how to defend against them via threat hunting, endpoint and network security services.

Brian Hussey
Brian Hussey

VP of Cyber Threat Detection & Response at Trustwave


  • date_range Tuesday, March 5
  • schedule 11:30 AM
  • place Trustwave Booth - N 5565

Vulnerability Management in the Coming Decade

Why are organizations of all sizes still making the news for data breaches? Defenders have come a long way helping organization better mitigate cyber risk. However, it is not that easy for the defenders to keep up with advancements in technology and the vulnerabilities they introduce. From IoT, Cloud, Mobile technologies, Applications, Networks, Databases, Social Media, new protocols, etc., hear from the Director of SpiderLabs Americas and Global Director VMS how organizations need to adapt to keep pace with vulnerabilities and risk in their organization as we approach the next decade.

Mark Whitehead
Mark Whitehead

SpiderLabs Director, North America at Trustwave


  • date_range Wednesday, March 6
  • schedule 3:30 PM
  • place Trustwave Booth - N 5565

What Does a Major Breach Investigation Really Look Like?

Mike will explore what really happens when a organization has to respond to a major breach, spanning multiple countries, hundreds of locations and thousands of systems. When responding to a breach every second counts, in order to effectively prepare you really need to understand both what the attacker is doing and what potential traces they are leaving behind. This talk will look at how different sources of evidence can be leveraged in order to rapidly identify and contain compromised systems.

Mike Wilkinson
Mike Wilkinson

Global Director SpiderLabs Digital Forensics and Incident Response at Trustwave


Trustwave Hackathon Happy Hour - Test your skills and see if you have what it takes!

Trustwave is teaming up with Security Innovation to provide a fun night of hacking at RSA with their "find the vulnerabilities" game, CMD+CTRL Cyber Range. Food and beverages will be provided, all you need to bring is your computer and your inner evil-doer and you are ready to hack away! Space is limited, register today!

  • date_range Monday, March 4
  • schedule 5:00 PM - 7:00 PM

Trustwave Booth is Open

Be sure to stop by for a virtual reality tour of our state-of-art Fusion Center, a 6,000 square foot cybersecurity command center located in Chicago that has the ability to monitor for, detect, and instantly kill threats anywhere inside an organization’s environment down to individual endpoints, a feat unprecedented in managed security.


  • date_range Monday, March 4
  • schedule 5:30 PM - 6:00 PM
  • place Trustwave Booth - N 5565

Proactive Threat Hunting – Making the Actual Sausage

Everybody is talking about Threat Hunting but few actually know what it is and how to do it, much less what should you expect from one? This session will explore Trustwave’s approach, starting with threat modeling human-based adversaries, to endpoint data collection on a massive scale, big-data analytics, enrichment with cyber threat intelligence, and expert analysis. In the end, you should absolutely know if an advanced attacker is dwelling within your network, but you will also gain visibility into your network on a scale that you’ve likely never seen before, enabling real change and security improvement action plans.

Brian Hussey
Brian Hussey

VP of Cyber Threat Detection & Response at Trustwave


  • date_range Monday, March 4
  • schedule 6:15 PM - 6:45 PM
  • place Trustwave Booth - N 5565

Using an MSSP for Advanced Threat Protection

RSA is seemingly filled with service and technology providers touting effective defense against cyber-threats. How can you determine which is most effective and appropriate for your environment? This session provides quick insight into effective advanced threat protection strategies.

Scott Stevens
Scott Stevens

Product Management, MDR and DFIR at Trustwave

  • date_range Tuesday, March 5
  • schedule 10:00 AM - 6:00 PM

Trustwave Booth is Open

Be sure to stop by for a virtual reality tour of our state-of-art Fusion Center, a 6,000 square foot cybersecurity command center located in Chicago that has the ability to monitor for, detect, and instantly kill threats anywhere inside an organization’s environment down to individual endpoints, a feat unprecedented in managed security.


  • date_range Tuesday, March 5
  • schedule 10:30 AM
  • place Trustwave Booth - N 5565

What Does a Major Breach Investigation Really Look Like?

We will explore what really happens when a organization has to respond to a major breach, spanning multiple countries, hundreds of locations and thousands of systems. When responding to a breach every second counts, in order to effectively prepare you really need to understand both what the attacker is doing and what potential traces they are leaving behind. This talk will look at how different sources of evidence can be leveraged in order to rapidly identify and contain compromised systems.

Mike Wilkinson
Mike Wilkinson

Global Director SpiderLabs Digital Forensics and Incident Response at Trustwave


  • date_range Tuesday, March 5
  • schedule 11:30 AM
  • place Trustwave Booth - N 5565

Vulnerability Management in the Coming Decade

Why are organizations of all sizes still making the news for data breaches? Defenders have come a long way helping organization better mitigate cyber risk. However, it is not that easy for the defenders to keep up with advancements in technology and the vulnerabilities they introduce. From IoT, Cloud, Mobile technologies, Applications, Networks, Databases, Social Media, new protocols, etc., hear from the Director of SpiderLabs Americas and Global Director VMS how organizations need to adapt to keep pace with vulnerabilities and risk in their organization as we approach the next decade.

Mark Whitehead
Mark Whitehead

SpiderLabs Director, North America at Trustwave


  • date_range Tuesday, March 5
  • schedule 1:00 PM
  • place Trustwave Booth - N 5565

Building More Effective Cyber Use Cases

SIEM, SOAR, UEBA, Threat Intelligence, Big Data, Cloud, Endpoint, Deception base technologies and many more… These are great tools, but buying tools often does not lead to success without a well-defined use case strategy. We will talk about adopting a use case framework and how to leverage use cases to prioritize investments and align your security program with your business.

Kory Daniels
Kory Daniels

Global Managing Partner at Trustwave


  • date_range Tuesday, March 5
  • schedule 1:30 PM
  • place Trustwave Booth - N 5565

Top Database Security Issues for 2019

Attacks from the inside, outside, and everywhere in between. Every second of the day there are attacks unleashed to steal your data. Almost every attack vector ultimately leads to the database. In this session we will take a look at what the threat landscape has in store for us in 2019. From Privileges, Patches, and Passwords to Compromise and Cloud lets dig in and see how we can protect ourselves.

Thomas Patterson
Thomas Patterson

Senior Product Manager at Trustwave


  • date_range Tuesday, March 5
  • schedule 2:30 PM
  • place Trustwave Booth - N 5565

Proactive Threat Hunting – Making the Actual Sausage

Everybody is talking about Threat Hunting but few actually know what it is and how to do it, much less what should you expect from one? This session will explore Trustwave’s approach, starting with threat modeling human-based adversaries, to endpoint data collection on a massive scale, big-data analytics, enrichment with cyber threat intelligence, and expert analysis. In the end, you should absolutely know if an advanced attacker is dwelling within your network, but you will also gain visibility into your network on a scale that you’ve likely never seen before, enabling real change and security improvement action plans.

Brian Hussey
Brian Hussey

VP of Cyber Threat Detection & Response at Trustwave


  • date_range Tuesday, March 5
  • schedule 3:30 PM
  • place Trustwave Booth - N 5565

Office 365: Don’t Throw Your Secure Email Gateway Out the "Windows"

The world is moving to the cloud and to Microsoft Office 365. Office 365 offers a significant and useful set of productivity, collaboration, and other services, but is it secure? Find out why and how organizations need to protect their Office 365 and to supplement with complete coverage for their archiving, data security, encryption, eDiscovery, backup/recovery and other critical email requirements.

Jenny Chen
Jenny Chen

Senior Product Manager, Email Security at Trustwave

Graeme Slogrove
Graeme Slogrove

Senior Director of Product Engineering at Trustwave


  • date_range Tuesday, March 5
  • schedule 3:30 PM
  • place Trustwave Booth - N 5565

Anatomy of a Database Attack

Discussion of database vulnerabilities chained together to get control of the database host. Why they happen, what can you do about them to limit your database exposure. Highly technical.

Martin Rakhmanov
Martin Rakhmanov

Senior Product Manager at Trustwave

  • date_range Wednesday, March 6
  • schedule 10:00 AM - 6:00 PM

Trustwave Booth is Open

Be sure to stop by for a virtual reality tour of our state-of-art Fusion Center, a 6,000 square foot cybersecurity command center located in Chicago that has the ability to monitor for, detect, and instantly kill threats anywhere inside an organization’s environment down to individual endpoints, a feat unprecedented in managed security.


  • date_range Wednesday, March 6
  • schedule 10:30 AM
  • place Trustwave Booth - N 5565

Anatomy of a Database Attack

Discussion of database vulnerabilities chained together to get control of the database host. Why they happen, what can you do about them to limit your database exposure. Highly technical.

Martin Rakhmanov
Martin Rakhmanov

Senior Product Manager at Trustwave


  • date_range Wednesday, March 6
  • schedule 11:30 AM
  • place Trustwave Booth - N 5565

What do I need? Do I need a Red Team, Purple Team, Penetration testing, Vulnerability Assessment?

"Red teams sound cool, I want one." "Our previous Penetration Test didn’t find anything." "We need something for XYZ compliance." "I am not sure of all the assets I own in this organization." "I bought this product, but it doesn’t seem to be working." "I want to train our defenders." These are conversations the SL team have daily. Hear from the Director of SpiderLabs Americas and Global Director VMS on how to navigate this maze of testing services and what questions to ask to make sure you are getting what you need whether in-house or from a trusted partner.

Mark Whitehead
Mark Whitehead

SpiderLabs Director, North America at Trustwave


  • date_range Wednesday, March 6
  • schedule 1:00 PM
  • place Trustwave Booth - N 5565

TBD

TBD

Steven Baer
Steven Baer

VP of Systems Engineering at Trustwave


  • date_range Wednesday, March 6
  • schedule 1:30 PM
  • place Trustwave Booth - N 5565

Building the Threat Intelligence Program

Threat intelligence is everywhere we look these days - and for good reason. Threat intelligence capabilities are an invaluable part of your cybersecurity program, but it is necessary it is used for more than just to simplify a 'feed'. Hear a case for why you should prioritize maturing your threat intelligence program and the requirements to consider, whether your building a new capability or maturing what you already have in place.

Kory Daniels
Kory Daniels

Global Managing Partner at Trustwave


  • date_range Wednesday, March 6
  • schedule 2:30 PM
  • place Trustwave Booth - N 5565

Office 365: Don’t Throw Your Secure Email Gateway Out the "Windows"

The world is moving to the cloud and to Microsoft Office 365. Office 365 offers a significant and useful set of productivity, collaboration, and other services, but is it secure? Find out why and how organizations need to protect their Office 365 and to supplement with complete coverage for their archiving, data security, encryption, eDiscovery, backup/recovery and other critical email requirements.

Jenny Chen
Jenny Chen

Senior Product Manager, Email Security at Trustwave

Graeme Slogrove
Graeme Slogrove

Senior Director of Product Engineering at Trustwave


  • date_range Wednesday, March 6
  • schedule 3:30 PM
  • place Trustwave Booth - N 5565

What Does a Major Breach Investigation Really Look Like?

We will explore what really happens when a organization has to respond to a major breach, spanning multiple countries, hundreds of locations and thousands of systems. When responding to a breach every second counts, in order to effectively prepare you really need to understand both what the attacker is doing and what potential traces they are leaving behind. This talk will look at how different sources of evidence can be leveraged in order to rapidly identify and contain compromised systems.

Mike Wilkinson
Mike Wilkinson

Global Director SpiderLabs Digital Forensics and Incident Response at Trustwave


  • date_range Wednesday, March 6
  • schedule 4:30 PM
  • place Trustwave Booth - N 5565

Top Database Security Issues for 2019

Attacks from the inside, outside, and everywhere in between. Every second of the day there are attacks unleashed to steal your data. Almost every attack vector ultimately leads to the database. In this session we will take a look at what the threat landscape has in store for us in 2019. From Privileges, Patches, and Passwords to Compromise and Cloud lets dig in and see how we can protect ourselves.

Thomas Patterson
Thomas Patterson

Senior Product Manager at Trustwave


Trustwave Hackathon Happy Hour - Test your skills and see if you have what it takes!

Trustwave is teaming up with Security Innovation to provide a fun night of hacking at RSA with their "find the vulnerabilities" game, CMD+CTRL Cyber Range. Food and beverages will be provided, all you need to bring is your computer and your inner evil-doer and you are ready to hack away! Space is limited, register today!

  • date_range Thursday, March 7
  • schedule 10:00 AM - 3:00 PM

Trustwave Booth is Open

Be sure to stop by for a virtual reality tour of our state-of-art Fusion Center, a 6,000 square foot cybersecurity command center located in Chicago that has the ability to monitor for, detect, and instantly kill threats anywhere inside an organization’s environment down to individual endpoints, a feat unprecedented in managed security.


  • date_range Thursday, March 7
  • schedule 10:30 AM
  • place Trustwave Booth - N 5565

Top Database Security Issues for 2019

Attacks from the inside, outside, and everywhere in between. Every second of the day there are attacks unleashed to steal your data. Almost every attack vector ultimately leads to the database. In this session we will take a look at what the threat landscape has in store for us in 2019. From Privileges, Patches, and Passwords to Compromise and Cloud lets dig in and see how we can protect ourselves.

Thomas Patterson
Thomas Patterson

Senior Product Manager at Trustwave


  • date_range Thursday, March 7
  • schedule 11:30 AM
  • place Trustwave Booth - N 5565

Using Cyber Risk to Simplify Compliance Headaches

Cybersecurity has become a common part of executive discussions, but infrastructure and security practitioners are challenged with how to shift from a historically compliance-focused organization to one that prioritizes risks. Hear how organizations globally are simplifying their compliance initiatives through establishing a risk-based cyber program in order to better enable infrastructure and security to work together to meet the needs of the overall organization.

Kory Daniels
Kory Daniels

Global Managing Partner at Trustwave


  • date_range Thursday, March 7
  • schedule 1:00 PM
  • place Trustwave Booth - N 5565

Using an MSSP for Advanced Threat Protection

RSA is seemingly filled with service and technology providers touting effective defense against cyber-threats. How can you determine which is most effective and appropriate for your environment? This session provides quick insight into effective advanced threat protection strategies.

Scott Stevens
Scott Stevens

Product Management, MDR and DFIR at Trustwave


  • date_range Thursday, March 7
  • schedule 1:30 PM
  • place Trustwave Booth - N 5565

Office 365: Don’t Throw Your Secure Email Gateway Out the "Windows"

The world is moving to the cloud and to Microsoft Office 365. Office 365 offers a significant and useful set of productivity, collaboration, and other services, but is it secure? Find out why and how organizations need to protect their Office 365 and to supplement with complete coverage for their archiving, data security, encryption, eDiscovery, backup/recovery and other critical email requirements.

Jenny Chen
Jenny Chen

Senior Product Manager, Email Security at Trustwave

Graeme Slogrove
Graeme Slogrove

Senior Director of Product Engineering at Trustwave


  • date_range Thursday, March 7
  • schedule 2:30 PM
  • place Trustwave Booth - N 5565

Proactive Threat Hunting – Making the Actual Sausage

Everybody is talking about Threat Hunting but few actually know what it is and how to do it, much less what should you expect from one? This session will explore Trustwave’s approach, starting with threat modeling human-based adversaries, to endpoint data collection on a massive scale, big-data analytics, enrichment with cyber threat intelligence, and expert analysis. In the end, you should absolutely know if an advanced attacker is dwelling within your network, but you will also gain visibility into your network on a scale that you’ve likely never seen before, enabling real change and security improvement action plans.

Brian Hussey
Brian Hussey

VP of Cyber Threat Detection & Response at Trustwave

 

Trustwave Speakers

Brian Hussey

Brian Hussey

VP of Cyber Threat Detection & Response at Trustwave

Brian leads operations for cyber-investigation engagements across the world. His team specializes in assisting corporations to recover from and remediate network attacks and data breaches and they assist law enforcement agencies with computer forensic investigations and malware analysis.

Scott Stevens

Scott Stevens

Product Management, MDR and DFIR at Trustwave

Scott leads product management activities for Trustwave’s SpiderLabs Digital Forensics & Incident Response (DFIR) team and Managed Detection & Response (MDR) Security Services.  He has over 25 years of experience managing IT in the public and private sectors as well as developing, marketing, and implementing products & services to meet complex security needs.

Mike Wilkinson

Mike Wilkinson

Global Director SpiderLabs Digital Forensics and Incident Response at Trustwave

Mike has been working in the IT industry since the late 90’s and has been practicing digital forensics since he joined the NSW Police, State Electronic Evidence Branch (SEEB) in 2003. He currently leads the Incident Response team helping clients prepare for, investigate and remediate IT security incidents.

Mark Whitehead

Mark Whitehead

SpiderLabs Director, North America at Trustwave

Mark is the Director of SpiderLabs Americas for Trustwave. His responsibilities include setting strategy and directing delivery for all Trustwave’s portfolio of testing services for Canada, the United States, as well as Latin and Central America. Mark possesses over 16 years total in the cybersecurity field with 10 years of leadership and management experience.

Kory Daniels

Kory Daniels

Global Managing Partner at Trustwave

Kory is an innovator and leader in cyber threat detection program transformation. Over the last 15 years Kory has overseen and supported the evolving requirements in helping organizations define, measure, and accelerate achieving their security maturity targets with fast growing midmarket firms to F500 global enterprises.

Thomas Patterson

Thomas Patterson

Senior Product Manager at Trustwave

Thomas is responsible for the product management of the Database Security Product Line at Trustwave. He has over 10 years’ experience in Databases and Database Security with both government & private sector consulting and implementation.

Jenny Chen

Jenny Chen

Senior Product Manager, Email Security at Trustwave

Jenny Chen is Senior Product Manager at Trustwave, responsible for the Secure Email Gateway (SEG) product line. With a passion for technology and the customer experience, she has been working with enterprise security software and cloud solutions for over 15 years.

Martin Rakhmanov

Martin Rakhmanov

Security Research Manager at Trustwave

Martin is a Security Research Manager at Trustwave SpiderLabs where his focus is database vulnerability research and product development.

Steven Baer

Steven Baer

VP of Systems Engineering at Trustwave

Steven Baer is the VP of Systems Engineering for the WW Channels and Partners organization. Steven (known as just ‘Baer’ to most) has been in the InfoSec industry for over 20 years starting out in banking and e-commerce then moving on to specialized technologies at RSA, Trustwave, and Dell-SecureWorks.

Graeme Slogrove

Graeme Slogrove

Senior Director of Product Engineering at Trustwave

Graeme is the Senior Director of Product Engineering at Trustwave for the Secure Email Gateway (SEG) product line. An internet veteran of 25 years, he has worked on SEG solutions for over 19 years. Creating one of the first multi-tenanted cloud email security solutions in the market, he is well versed in email security challenges and solutions across multiple deployment platforms.