Dave Lewis
[Duo Security]
Dave Lewis is the Global Advisory CISO at Duo Security and has 25 years of experience in IT security operations and management including a decade dealing with critical infrastructure security.
He is the founder of the security site Liquidmatrix Security Digest and cohost of the Liquidmatrix podcast as well as the host of the Plaintext and Murder Board podcasts. Lewis writes columns for Daily Swig, Forbes and several other publications
I Was Promised A Jetpack
How did we get here?
This talk will begin with a historical walk through as to how we got to our present state of security. The discussion will look at the promises that were made of a security future that we’re still in search of today. This is analogous to the personal jetpack that we were promised in the early days of science fiction.
The talk will then proceed to subject matter areas of user management, device management, policies to govern activity, control for accessing applications and the need to effectively search for anomalies in the access control analytics. There will be case studies presented to help demonstrate the need to better protect the workforce, workplace and workload. As well there will be a data driven element to further illustrate the benefit of zero trust.
He is the founder of the security site Liquidmatrix Security Digest and cohost of the Liquidmatrix podcast as well as the host of the Plaintext and Murder Board podcasts. Lewis writes columns for Daily Swig, Forbes and several other publications
I Was Promised A Jetpack
How did we get here?
This talk will begin with a historical walk through as to how we got to our present state of security. The discussion will look at the promises that were made of a security future that we’re still in search of today. This is analogous to the personal jetpack that we were promised in the early days of science fiction.
The talk will then proceed to subject matter areas of user management, device management, policies to govern activity, control for accessing applications and the need to effectively search for anomalies in the access control analytics. There will be case studies presented to help demonstrate the need to better protect the workforce, workplace and workload. As well there will be a data driven element to further illustrate the benefit of zero trust.