Programa General

Esta agenda no es definitiva y puede sufrir cambios sin previo aviso.

25 DE JULIO DE 2018
08:00 – 16:30Acreditación
08:30 – 18:30Apertura del área de exposición
09:00 – 09:15CEREMONIA INAUGURAL con David Shearer, CEO, (ISC)²
09:15 – 10:05KEYNOTE
Greg Thompson (Canadá)
“A Cyber Risk Culture Shift – Embracing “Red””
10:05 – 10:20Refrigerio
CYBER 1CYBER 2
10:25 – 11:05Cibercrimen
OSINT in Criminal Investigations
MATEO MARTINEZ – Uruguay
Garantía del Software & Seguridad en Aplicaciones
Software Security: The best of times, The worst of times.
CRISTIÁN ROJAS – Chile
11:05 – 11:45Gestión de Identidad/Acceso
The current state of PKI, and its future when used in IoT and with Blockchain
PAUL MANTILLA – Emiratos Árabes Unidos
Cibercrimen
El Arte del Engaño
GABRIEL BERGEL – Chile
11:45 – 12:45Session Powered by
DELOITTE
12:45 – 13:45Almuerzo
13:45 – 14:05Session Powered by Insside
PCI – Cómo hacer los pagos más seguros

Jonatan Pregliasco
Session Powered by INACAP
Implementando un SGSI ISO27001 en su organización
Fernando Ortiz Rocha
14:05 – 14:45Gobernanza, Regulación & Compliance
The Art of CyberSecurity, based on The Art of War book
JUAN QUIÑE PAZ – Perú
Infraestructura Crítica
Protection of critical infrastructures: treating vulnerabilities, threats and risks
MAXLI CAMPOS – Brasil
14:45 – 15:25Internet de las Cosas
5G+IPV6=Internet of Threats?
JORGE MARIO OCHOA – Guatemala
Cibercrimen
Stealing CPU: 2018’s cybercriminals gold rush
RENATO MARINHO – Brasil
15:25 – 15:50Refrigerio
15:55 – 16:15Session Powered by
Cyttek
Session Powered by
(ISC)² Chile Chapter
16:15 – 16:55Seguridad en la Nube
Cloud Security for SMES
FABIO CERULLO – Irlanda
Privacidad
Privacy and Information Security in a World of Super Connected Things
CHRISTIANE BORGES SANTOS – Brasil
16:55 – 17:35Malware
Shield against ransomware
MAURICIO CASTAÑOS – México
Respuesta a Incidentes & Investigación Forense
Operation of a CSIRT and cybersecurity incident management: Practical approach
MARCO RIVADENEIRA – Ecuador
17:35 – 18:30TOWN HALL MEETING
Sesión para miembros (ISC)² con David Shearer,
CEO (ISC)² y miembros del board
26 DE JULIO DE 2018
8:00 – 14:30Acreditación
8:30 – 18:00Apertura del área de exposición
9:00 – 9:50 KEYNOTE
David Kennedy, CISSP (EE.UU.)
“When Protection Fails Us: Building on Detection”
CYBER 1CYBER 2
9:50 – 10:30Desarrollo Profesional
The power of the CISO
JOSE LAGOS – Chile
Amenazas
Shoot First, Ask Later: strategies to defend the most phished country in the world
FABIO ASSOLINI – Brasil
10:30 – 10:45Refrigerio
10:50 – 11:10Session Powered by
Deloitte
Session Powered by
CheckPoint
11:10- 11:50Cibercrimen
Most Advanced Attacks seen in Banks and Payment Processing Companies in LATAM
RAFAEL REVERT – Panamá
Infraestructura Crítica
The fundamentals of Industrial Control Systems | Risk Assessment
ALEXANDRO FERNANDEZ – México
11:50 – 12:30Session Powered by Telefónica Business Solutions
Malware de día 0 – N40
LUIS URZÚA
Malware
Exploring a P2P Transient Botnet – From Discovery to Enumeration
RENATO MARINHO – Brasil
12:30 – 13:30Almuerzo
13:30 – 14:20 KEYNOTE
Sai Honig, CISSP, CCSP (New Zealand)
CAN WE STOP THINKING IN SQUARES? IT MIGHT HELP WITH RECRUITING FOR INFORMATION SECURITY!
14:40 – 15:00Gobernanza, Regulación & Compliance
Corporate Governance and Cybersecurity
JOSE LAGOS – Chile
Garantía del Software & Seguridad en Aplicaciones
Security and quality of software with managed services, Sabesp/Brasil results
FRANCISCO BERNABEU – Brasil
15:00 – 15:40Internet de las Cosas
IOTA and the whole nine yards (Secure monetization of the Internet of Things)
PATRICIO CARRANZA – Argentina
Desarrollo Profesional
Gamification. La nueva forma de aprender para las nuevas generaciones.
JORGE MARIO OCHOA – Guatemala
15:40 – 15:55Refrigerio
16:00 – 16:40Amenazas
Using advanced monitoring tools to detect and prevent complex cyber threats and attacks
KENNETH GONZALEZ e YERED CÉSPEDES – Costa Rica
Gobernanza, Regulación & Compliance
Using PCI DSS to comply with GDPR
FERNANDO FONSECA – Brasil
16:40 – 17:40 “Gobierno, Empresa y Sociedad: El aporte de las mujeres en Ciberseguridad”
Panel con Sai Honig ((ISC)² board member), María Isabel Hayes (Gerente de Seguridad, Everis Chile), Karin Quiroga (Directora del Área de Informática y Telecomunicaciones, INACAP) y Karina Santelices (Gerente de Seguridad de Información, SINACOFI)
17:40 – 18:00CEREMONIA DE CIERRE

Patrocinio Executive Platinum

Deloitte

Patrocinio Platinum

Logo-Telefonica-Business-ingles

Patrocinio Gold

insside_logo
inacap
checkpoint

Patrocinio Silver

cybertrustfinal-200x100
cyttek-200x100-

Apoyo

officialchapter-chile
ciab

© Copyright 2018. (ISC)² Inc. All Rights Reserved

(ISC)² Security Congress Latin America
General contact: +55 11 3056-6000
eventslatam@isc2.org

#ISC2congressLATAM