Programa Geral

Esta agenda preliminar está sujeita a alterações sem aviso prévio.

25 DE JULHO, 2018
8:00 – 17:00Credenciamento
8:30 – 18:30Abertura da área de exposição
9:00 – 9:15CYBER 1
CERIMÔNIA DE ABERTURA – DAVID SHEARER, CEO, (ISC)² e
Wilson España, President of (ISC)² Chile Chapter
CYBER 1CYBER 2
9:15 – 9:55Gestão de Identidade/Acesso
The current state of PKI, and its future when used in IoT and with Blockchain
PAUL MANTILLA – Emirados Árabes Unidos
Cibercrime
OSINT in Criminal Investigations
MATEO MARTINEZ – Uruguai
9:55 – 10:15Coffee Break
10:20 – 11:00Cibercrime
The Art of Deception
GABRIEL BERGEL – Chile
Garantia de Software & Segurança de Aplicativos
Software Security: The best of times, The worst of times.
CRISTIÁN ROJAS – Chile
11:00 – 11:40Governança, Regulamentação & Compliance
The Art of CyberSecurity, based on The Art of War book
JUAN PABLO QUIÑE PAZ – Peru
Infraestrutura Crítica
Protection of critical infrastructures: treating vulnerabilities, threats and risks
MAXLI CAMPOS – Brasil
11:40 – 12:40Session Powered by Deloitte
AMPLIANDO LAS CAPACIDADES DEL SOC POR MEDIO DE LA CIBER-INTELIGENCIA
CRISTIÁN GORENA
12:40 – 13:50Almoço
13:50 – 14:10Session Powered by Insside
PCI – How to make most secured payments
JONATAN PREGLIASCO
Session Powered by INACAP
Implementing an SGSI ISO27001 in your organization
FERNANDO ORTIZ ROCHA
14:10 – 14:50Segurança na Nuvem
Cloud Security for SMEs
FABIO CERULLO – Irlanda
Privacidade
Privacy and Information Security in a World of Super Connected Things
CHRISTIANE BORGES SANTOS – Brasil
14:50 – 15:50GENERAL SESSION
Keynote Speaker – Greg Thompson (Canadá)
A CYBER RISK CULTURE SHIFT – EMBRACING “RED”
15:50 – 16:10Coffee Break
16:15 – 16:35Session Powered by Cyttek
Insecure by default
ALEXIS SARGHEL – Argentina
Session Powered by (ISC)² Chile Chapter
WILSON ESPAÑA – Presidente del Capítulo
16:35 – 16:15Malware
Shield against ransomware
MAURICIO CASTAÑOS – México
Resposta a Incidentes & Investigação Forense
Operation of a CSIRT and cybersecurity incident management: Practical approach
MARCO RIVADENEIRA – Equador
17:15 – 18:15TOWN HALL MEETING
Sessão para membros (ISC)²
com DAVID SHEARER, CEO (ISC)² e membros do board
18:15 – 19:00Recepção dos Membros
26 DE JULHO, 2018
8:00 – 16:00Credenciamento
8:30 – 18:00Abertura da área de exposição
9:00 – 9:50KEYNOTE
SAI HONIG, CISSP, CCSP (Nova Zelândia)
CAN WE STOP THINKING IN SQUARES? IT MIGHT HELP WITH RECRUITING FOR INFORMATION SECURITY!
CYBER 1CYBER 2
09:50 – 10:30Desenvolvimento Profissional
The power of the CISO
JOSE LAGOS – Chile
Ameaças
Shoot First, Ask Later: strategies to defend the most phished country in the world
FABIO ASSOLINI – Brasil
10:30 – 10:45Coffee Break
10:50 – 11:10Session Powered by Deloitte
The Evolving Threat Landscape: Nuevas técnicas de compromiso de los adversarios
MARCO DE LA HOZ
Session Powered by CheckPoint
Stepping up to GEN V of cyber security
FRANCISCO DEL REAL
11:10 – 11:50Cibercrime
Most Advanced Attacks seen in Banks and Payment Processing Companies in LATAM
RAFAEL REVERT – Panamá
Infraestrutura Crítica
The fundamentals of Industrial Control Systems | Risk Assessment
ALEXANDRO FERNANDEZ – México
11:50 – 12:30Session Powered by Telefónica Business Solutions
Malware de día 0 – N40
LUIS URZÚA
Malware
Exploring a P2P Transient Botnet – From Discovery to Enumeration
RENATO MARINHO – Brasil
12:30 – 13:30Almoço
13:30 – 14:20KEYNOTE
DAVID KENNEDY, CISSP (USA)
WHEN PROTECTION FAILS US: BUILDING ON DETECTION
14:20 – 15:00Governança, Regulamentação & Compliance
Corporate Governance and Cybersecurity
JOSE LAGOS – Chile
Garantia de Software & Segurança de Aplicativos
Security and quality of software with managed services,  Sabesp/Brasil results
FRANCISCO BERNABEU – Brasil
15:00 – 15:40Internet das Coisas
IOTA and the whole nine yards (Secure monetization of the Internet of Things)
PATRICIO CARRANZA – Argentina
Desenvolvimento Profissional
Getting certified? Why? How?
MIRTHA COLLIN – Estados Unidos
15:40 – 15:55Coffee Break
CYBER 1CYBER 2
16:00 – 16:40Ameaças
Using advanced monitoring tools to detect and prevent complex cyber threats and attacks
KENNETH GONZALEZ e YERED CÉSPEDES – Costa Rica
Governança, Regulamentação & Compliance
Using PCI DSS to comply with GDPR
FERNANDO FONSECA – Brasil
16:40 – 175:40Governo, Empresa e Sociedade: A contribuição das mulheres em Cibersegurança
Panel com Sai Honig ((ISC)² board member), María Isabel Hayes (Gerente de Segurança, Everis Chile), Karin Quiroga (Diretora da Área de Informática e Telecomunicações, INACAP) and Karina Santelices (Gerente de Segurança da Informação, SINACOFI)
17:40 – 18:00CERIMÔNIA DE ENCERRAMENTO

Patrocínio Executive Platinum

Deloitte

Patrocínio Platinum

Logo-Telefonica-Business-ingles

Patrocínio Gold

insside_logo
inacap
checkpoint

Patrocínio Silver

cybertrustfinal-200x100
cyttek-200x100-

Apoio

officialchapter-chile
ciab

© Copyright 2018. (ISC)² Inc. All Rights Reserved

(ISC)² Security Congress Latin America
General contact: +55 11 3056-6000
eventslatam@isc2.org

#ISC2congressLATAM