Programa General

Esta agenda no es definitiva y puede sufrir cambios sin previo aviso.

25 DE JULIO, 2018
8:00 – 17:00Acreditación
8:30 – 18:30Apertura del área de exposición
9:00 – 9:15CYBER 1
CEREMONIA INAUGURAL – DAVID SHEARER, CEO, (ISC)² e
Wilson España, President of (ISC)² Chile Chapter
CYBER 1CYBER 2
9:15 – 9:55Gestión de Identidad/Acceso
The current state of PKI, and its future when used in IoT and with Blockchain
PAUL MANTILLA – Emirados Árabes Unidos
Cibercrimen
OSINT in Criminal Investigations
MATEO MARTINEZ – Uruguay
9:55 – 10:15Coffee Break
10:20 – 11:00Cibercrimen
The Art of Deception
GABRIEL BERGEL – Chile
Garantía del Software & Seguridad en Aplicaciones
Software Security: The best of times, The worst of times.
CRISTIÁN ROJAS – Chile
11:00 – 11:40Gobernanza, Regulación & Compliance
The Art of CyberSecurity, based on The Art of War book
JUAN PABLO QUIÑE PAZ – Perú
Infraestructura Crítica
Protection of critical infrastructures: treating vulnerabilities, threats and risks
MAXLI CAMPOS – Brasil
11:40 – 12:40Session Powered by Deloitte
AMPLIANDO LAS CAPACIDADES DEL SOC POR MEDIO DE LA CIBER-INTELIGENCIA
CRISTIÁN GORENA
12:40 – 13:50Almuerzo
13:50 – 14:10Session Powered by Insside
PCI – How to make most secured payments
JONATAN PREGLIASCO
Session Powered by INACAP
Implementing an SGSI ISO27001 in your organization
FERNANDO ORTIZ ROCHA
14:10 – 14:50Seguridad en la Nube
Cloud Security for SMEs
FABIO CERULLO – Irlanda
Privacidad
Privacy and Information Security in a World of Super Connected Things
CHRISTIANE BORGES SANTOS – Brasil
14:50 – 15:50GENERAL SESSION
Keynote Speaker – Greg Thompson (Canadá)
A CYBER RISK CULTURE SHIFT – EMBRACING “RED”
15:50 – 16:10Coffee Break
16:15 – 16:35Session Powered by Cyttek
Insecure by default
ALEXIS SARGHEL – Argentina
Session Powered by (ISC)² Chile Chapter
WILSON ESPAÑA – Presidente del Capítulo
16:35 – 16:15Malware
Shield against ransomware
MAURICIO CASTAÑOS – México
Respuesta a Incidentes & Investigación Forense
Operation of a CSIRT and cybersecurity incident management: Practical approach
MARCO RIVADENEIRA – Ecuador
17:15 – 18:15TOWN HALL MEETING
Sesión para miembros (ISC)²
con DAVID SHEARER, CEO (ISC)² y miembros del board
18:15 – 19:00Recepción de los Miembros
26 DE JULIO, 2018
8:00 – 16:00Acreditación
8:30 – 18:00Apertura del área de exposición
9:00 – 9:50KEYNOTE
SAI HONIG, CISSP, CCSP (Nova Zelândia)
CAN WE STOP THINKING IN SQUARES? IT MIGHT HELP WITH RECRUITING FOR INFORMATION SECURITY!
CYBER 1CYBER 2
09:50 – 10:30Desarrollo Profesional
The power of the CISO
JOSE LAGOS – Chile
Amenazas
Shoot First, Ask Later: strategies to defend the most phished country in the world
FABIO ASSOLINI – Brasil
10:30 – 10:45Coffee Break
10:50 – 11:10Session Powered by Deloitte
The Evolving Threat Landscape: Nuevas técnicas de compromiso de los adversarios
MARCO DE LA HOZ
Session Powered by CheckPoint
Stepping up to GEN V of cyber security
FRANCISCO DEL REAL
11:10 – 11:50Cibercrimen
Most Advanced Attacks seen in Banks and Payment Processing Companies in LATAM
RAFAEL REVERT – Panamá
Infraestructura Crítica
The fundamentals of Industrial Control Systems | Risk Assessment
ALEXANDRO FERNANDEZ – México
11:50 – 12:30Session Powered by Telefónica Business Solutions
Malware de día 0 – N40
LUIS URZÚA
Malware
Exploring a P2P Transient Botnet – From Discovery to Enumeration
RENATO MARINHO – Brasil
12:30 – 13:30Almuerzo
13:30 – 14:20KEYNOTE
DAVID KENNEDY, CISSP (USA)
WHEN PROTECTION FAILS US: BUILDING ON DETECTION
14:20 – 15:00Gobernanza, Regulación & Compliance
Corporate Governance and Cybersecurity
JOSE LAGOS – Chile
Garantía del Software & Seguridad en Aplicaciones
Security and quality of software with managed services,  Sabesp/Brasil results
FRANCISCO BERNABEU – Brasil
15:00 – 15:40Internet de las Cosas
IOTA and the whole nine yards (Secure monetization of the Internet of Things)
PATRICIO CARRANZA – Argentina
Desarrollo Profesional
Getting certified? Why? How?
MIRTHA COLLIN – Estados Unidos
15:40 – 15:55Coffee Break
CYBER 1CYBER 2
16:00 – 16:40Amenazas
Using advanced monitoring tools to detect and prevent complex cyber threats and attacks
KENNETH GONZALEZ e YERED CÉSPEDES – Costa Rica
Gobernanza, Regulación & Compliance
Using PCI DSS to comply with GDPR
FERNANDO FONSECA – Brasil
16:40 – 175:40Gobierno, Empresa y Sociedad: El aporte de las mujeres en Ciberseguridad
Panel con Sai Honig ((ISC)² board member), María Isabel Hayes (Gerente de Seguridad, Everis Chile), Karin Quiroga (Directora del Área de Informática y Telecomunicaciones, INACAP) y Karina Santelices (Gerente de Seguridad de Información, SINACOFI)
17:40 – 18:00CEREMONIA DE CIERRE

Patrocinio Executive Platinum

Deloitte

Patrocinio Platinum

Logo-Telefonica-Business-ingles

Patrocinio Gold

insside_logo
inacap
checkpoint

Patrocinio Silver

cybertrustfinal-200x100
cyttek-200x100-

Apoyo

officialchapter-chile
ciab

© Copyright 2018. (ISC)² Inc. All Rights Reserved

(ISC)² Security Congress Latin America
General contact: +55 11 3056-6000
eventslatam@isc2.org

#ISC2congressLATAM