General Program

Please note that this program is subject to change without prior notice.

JULY 25, 2018
8:00 am – 5:00 pmRegistration
8:30 am – 6:30 pmExhibition area opening
9:00 am – 9:15 amCYBER 1
OPENING CEREMONY – DAVID SHEARER, CEO, (ISC)² and
Wilson España, President of (ISC)² Chile Chapter
CYBER 1CYBER 2
9:15 am – 9:55 amIdentify/Access Management
The current state of PKI, and its future when used in IoT and with Blockchain
PAUL MANTILLA – United Arab Emirates
Cybercrime
OSINT in Criminal Investigations
MATEO MARTINEZ – Uruguay
9:55 am – 10:15 amCoffee Break
10:20 am – 11:00 amCybercrime
The Art of Deception
GABRIEL BERGEL – Chile
Software Assurance & Application Security
Software Security: The best of times, The worst of times.
CRISTIÁN ROJAS – Chile
11:00 am – 11:40 amGovernance, Regulation and Compliance
The Art of CyberSecurity, based on The Art of War book
JUAN PABLO QUIÑE PAZ – Peru
Critical Infrastructure
Protection of critical infrastructures: treating vulnerabilities, threats and risks
MAXLI CAMPOS – Brazil
11:40 am – 12:40 pmSession Powered by Deloitte
AMPLIANDO LAS CAPACIDADES DEL SOC POR MEDIO DE LA CIBER-INTELIGENCIA
CRISTIÁN GORENA
12:40 pm – 1:50 pmLunch Break
1:50 pm – 2:10 pmSession Powered by Insside
PCI – How to make most secured payments
JONATAN PREGLIASCO
Session Powered by INACAP
Implementing an SGSI ISO27001 in your organization
FERNANDO ORTIZ ROCHA
2:10 pm – 2:50 pmCloud Security
Cloud Security for SMEs
FABIO CERULLO – Ireland
Privacy
Privacy and Information Security in a World of Super Connected Things
CHRISTIANE BORGES SANTOS – Brazil
2:50 pm – 3:50 pmGENERAL SESSION
Keynote Speaker – Greg Thompson (Canada)
A CYBER RISK CULTURE SHIFT – EMBRACING “RED”
3:50 pm – 4:10 pmCoffee Break
4:15 pm – 4:35 pmSession Powered by Cyttek
Insecure by default
ALEXIS SARGHEL – Argentina
Session Powered by (ISC)² Chile Chapter
WILSON ESPAÑA – Presidente del Capítulo
4:35 pm – 5:15 pmMalware
Shield against ransomware
MAURICIO CASTAÑOS – Mexico
Incident Response/Forensics
Operation of a CSIRT and cybersecurity incident management: Practical approach
MARCO RIVADENEIRA – Ecuador
5:15 pm – 6:15 pmTOWN HALL MEETING
Session for (ISC)² members
with DAVID SHEARER, CEO (ISC)² and board members
6:15 pm – 7:00 pmMember Reception
JULY 26, 2018
8:00 am – 4:00 pmRegistration
8:30 am – 6:00 pmExhibition area opening
9:00 am – 9:50 amKEYNOTE
SAI HONIG, CISSP, CCSP (New Zealand)
CAN WE STOP THINKING IN SQUARES? IT MIGHT HELP WITH RECRUITING FOR INFORMATION SECURITY!
CYBER 1CYBER 2
09:50 am – 10:30 amProfessional Development
The power of the CISO
JOSE LAGOS – Chile
Threats
Shoot First, Ask Later: strategies to defend the most phished country in the world
FABIO ASSOLINI – Brazil
10:30 am – 10:45 amCoffee Break
10:50 am – 11:10 amSession Powered by Deloitte
The Evolving Threat Landscape: Nuevas técnicas de compromiso de los adversarios
MARCO DE LA HOZ
Session Powered by CheckPoint
Stepping up to GEN V of cyber security
FRANCISCO DEL REAL
11:10 am – 11:50 amCybercrime
Most Advanced Attacks seen in Banks and Payment Processing Companies in LATAM
RAFAEL REVERT – Panama
Critical Infrastructure
The fundamentals of Industrial Control Systems | Risk Assessment
ALEXANDRO FERNANDEZ – Mexico
11:50 am – 12:30 pmSession Powered by Telefónica Business Solutions
Malware de día 0 – N40
LUIS URZÚA
Malware
Exploring a P2P Transient Botnet – From Discovery to Enumeration
RENATO MARINHO – Brazil
12:30 pm – 1:30 pmLunch Break
1:30 pm – 2:20 pmKEYNOTE
DAVID KENNEDY, CISSP (USA)
WHEN PROTECTION FAILS US: BUILDING ON DETECTION
2:20 pm – 3:00 pmGovernance, Regulation and Compliance
Corporate Governance and Cybersecurity
JOSE LAGOS – Chile
Software Assurance & Application Security
Security and quality of software with managed services,  Sabesp/Brasil results
FRANCISCO BERNABEU – Brazil
3:00 pm – 3:40 pmInternet of Things
IOTA and the whole nine yards (Secure monetization of the Internet of Things)
PATRICIO CARRANZA – Argentina
Professional Development
Getting certified? Why? How?
MIRTHA COLLIN – USA
3:40 pm – 3:55 pmCoffee Break
CYBER 1CYBER 2
4:00 pm – 4:40 pmThreats
Using advanced monitoring tools to detect and prevent complex cyber threats and attacks
KENNETH GONZALEZ and YERED CÉSPEDES – Costa Rica
Governance, Regulation and Compliance
Using PCI DSS to comply with GDPR
FERNANDO FONSECA – Brazil
4:40 pm – 5:40 pmGovernment, Business and Society: Women’s contribution in Cybersecurity
Panel with Sai Honig ((ISC)² board member), María Isabel Hayes (Security Manager, Everis Chile), Karin Quiroga (IT and Telecom Director, INACAP) and Karina Santelices (Information Security Manager, SINACOFI)
5:40 pm – 6:00 pmCLOSING CEREMONY

Executive Platinum Sponsorship

Deloitte

Platinum Sponsorship

Logo-Telefonica-Business-ingles

Gold Sponsorship

insside_logo
inacap
checkpoint

Silver Sponsorship

cybertrustfinal-200x100
cyttek-200x100-

Support

officialchapter-chile
ciab

© Copyright 2018. (ISC)² Inc. All Rights Reserved

(ISC)² Security Congress Latin America
General contact: +55 11 3056-6000
eventslatam@isc2.org

#ISC2congressLATAM