Speaker

Dr James Stanger, Chief Technology Evangelist, CompTIA (USA)

James Stanger (Dr)

Chief Technology Evangelist, CompTIA (USA)

Dr. James Stanger has consulted with corporations, governments and educational institutions worldwide about IT security, web development, UX, open source and network administration for over 20 years. Organisations include IBM, NTT Japan, Dell, Tesco, the British Army, NYU Abu Dhabi, Northrop Grumman, Oracle, the Open University (UK), General Dynamics, Symantec, the Scottish Qualifications Authority (SQA), the US Department of State, the United Arab Emirates Cultural Division, the US Navy, Mesei University, and SoftBank. He has also created education programmes and curricula worldwide. His books, articles and blogs have been translated into over a dozen languages. He has spoken worldwide at events such as GITEX (Dubai), RSA San Francisco, Infosecurity Europe, the Brazil Cloud Expo, SITS UK and the Tokyo HR Summit. He also delivers webinars about hands-on, practical skills to a global audience on a regular basis.

Currently, James is Chief Technology Evangelist at CompTIA, the world's largest tech industry association. There, he works with IT professionals, hiring managers and executives worldwide to identify critical skills and to help build CompTIA's education programmes.

James Stanger (Dr) will be speaking on the following topic:

17:00
Arriving at a narrative: a hands-on journey into orchestrating cross-functional cybersecurity teams

Our industry has adopted myriad attack detection tactics, threat intelligence schemes and incident response plans over the past few decades with varying results. But rarely have any of these solutions provided a "big picture" narrative that helps an organisation improve its security. What are some of the more useful strategies, or what Dr Stanger calls "context engines", that have helped certain organisations effectively adjust their strategies and tactics today?
Dr Stanger will provide case studies based on conclusions drawn from CompTIA's cybersecurity research culled from thousands of subject matter experts, as well as his interactions with dozens of managers, executives and security techs from around the world. He will detail key interactions between these teams as they have cooperated to identify and react to indicators of attack and indicators of compromise. By the end of his presentation, you will have gained insights about how to bring value to core security activities, over and above Security Orchestration, Automation and Response (SOAR).

Event Sponsor

Diamond Sponsor

Platinum Sponsors

Security Survey & Executive Roundtable Sponsor

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Display Sponsors

Showcase Sponsor

Sponsor

Endorsed by