Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
EDGE EMEA - Save the Date!

Tenable’s Inaugural
EMEA User Conference is Here!


November 6 - 7, 2018


The May Fair Hotel, London

Over 18 keynotes and educational sessions. A full day of hands-on labs and training. Meet the Tenable Experts.

We’re arming you - our industry’s cybersecurity leaders - with the edge. Learn how Cyber Exposure is reimagining how organizations of all sizes understand and reduce cyber risk.

Registration for Tenable Edge and Tenable University is now closed. If you would like to be placed on a waitlist, please email Lianne Johnson at [email protected].

Calling All Tenable Customers!Share Your Story and Receive A Complimentary Amazon Gift Certificate

Learn More

November 6Tenable University

A full day of hands-on labs where the Tenable experts go deep into our solutions to help you hone your skills and take your deployment to the next level.

November 7Tenable Edge

Our user conference will demonstrate – through thought leadership, inspirational keynotes and hands-on sessions – that Cyber Exposure represents one of the most strategic advantages available to organisations today.

Tenable Edge Agenda

8:30 - 17:30
Registration Open
Tenable University
Session Topic:
Tenable.io
SecurityCenter
10:00 - 10:45
Data Acquisition with Tenable.io

Tenable.io offers several approaches to security data acquisition, including active scanning, passive monitoring and locally hosted agents. We will discuss different approaches to data acquisition, the advantages and challenges of each and data integration into Tenable.io.

SecurityCenter Advanced Scanning Techniques

SecurityCenter can perform scans that do not interfere with your IT infrastructure. We will discuss creating scan blackout windows, scans that chain together in sequence to avoid excessive bandwidth utilisation, importing partial scan results and handling incomplete scans. We will also talk about configuration of scan zones and repositories to efficiently scan geographically diverse deployments.

11:00 - 11:45
Tenable.io Asset Categorisation

With Tenable.io, you can organise computing infrastructure into meaningful groups for scanning, analysis and visibility of data. We will discuss Tenable.io’s unique approach to asset identification, the benefits of that approach, and how to group assets for scanning, analysis and permissions.

SecurityCenter Scan Policy Tuning

SecurityCenter provides the capability of performing scans that acquire security data beyond a typical credentialed scan. We will discuss how to maximise scan performance, fine-tune discovery, adjust for low bandwidth and scan fragile environments.

12:00 - 12:45
Tenable.io Cloud Security

In the modern IT environment, acquiring security data on cloud services can be challenging. We will discuss the challenges in securing cloud assets and how to gather and scan data from various cloud environments.

SecurityCenter Custom Reporting

SecurityCenter’s reporting features include the ability to generate complex reports with data organised in some new and useful ways. We will discuss how to perform Host-by-Host security data reporting, how to generate warning indicator dashboards and alerts and how to measure Key Performance Indicators in your infrastructure with Assurance Report Cards.

12:45 - 13:30
Lunch
Lunch
13:30 - 14:15
Tenable.io Web Application Scanning

Tenable.io provides automatic scanning of your web infrastructure for vulnerabilities commonly exploited in web applications. We will discuss how to use Tenable.io’s layered approach to web application scanning to identify vulnerabilities in your web infrastructure.

Policy and Compliance Auditing with SecurityCenter

Every organisation has security policies, hardening practices and standardised configurations that can be verified through running compliance scans. Additional considerations include audit requirements like PCI, HIPAA, NIST 800-53, or ISO 27000. We will discuss how to perform compliance scanning, how to evaluate the results and tips to make these scans work effectively.

14:30 - 15:15
Tenable.io Container Security

Many organisations utilise pre-configured host images for rapid deployment. We will discuss how Tenable.io can scan container images for vulnerabilities prior to their deployment in a live environment.

Managing Agents with SecurityCenter

Nessus Agents are the best way to manage devices for a mobile workforce, scanning while offline, and reporting the results when the device is available on the network. Importing those results into SecurityCenter puts all vulnerabilities in a central location for the most meaningful analysis. We will discuss how to set up agent scans using either Nessus Manager or Tenable.io, import those results into SecurityCenter and manage that data.

15:30 - 16:15
Industrial Security

One of Tenable’s newest offerings, Industrial Security provides the capability to passively monitor network activity and thus identify assets and vulnerabilities in Industrial Control Systems (ICS) networks.

Complementing SecurityCenter with Tenable.io

Tenable.io adds to your existing SecurityCenter solution in several significant ways - visibility of cloud assets, agent management, PCI ASV, container security and more. We will discuss leveraging Tenable.io’s unique capabilities to support your cyber security programme. Additionally, you will learn how to set up Tenable.io within SecurityCenter in order to scan cloud-facing assets and import Agent scan results.

Times are subject to change
18:00 - 21:00
Welcome Reception - The May Fair Terrace

May Fair Terrace is a sleek, open-air enclave in the heart of luxury Mayfair. An intimate setting, perfect for drinks, conversation, and welcoming attendees to Edge! Be sure to join us for an evening of surprises.

7:30 - 8:30
Breakfast
8:30 - 8:45
Doors Open
8:45 - 9:00
Opening Remarks: David Cummins, Vice President of Sales | EMEA
David Cummins, Vice President of Sales | EMEA

David Cummins has over 15 years of technology sales experience. As Tenable’s Vice President of International Sales for the EMEA region, David and his team are shaping strategy, creating opportunities, building sustainable partner relationships and driving growth. Prior to joining Tenable, David served as EMEA Sales Director for AirMagnet, where he was responsible for developing and managing all strategic relationships with customers, partners and alliances across EMEA. He also ensured the successful transition of the EMEA business to Fluke Networks following its acquisition of AirMagnet. Over the years, David has held a variety of positions within multinational corporations including IBM, where he contributed to the successful development of its SMB business and he supported the strategy and execution for a number of start-up companies.

9:00 - 9:30
Keynote: Amit Yoran, Chairman and CEO
Amit Yoran, Chairman and Chief Executive Officer | Tenable

As Chairman and Chief Executive Officer, Amit Yoran oversees the company’s strategic vision as Tenable works to empower organisations to understand and reduce their cyber security risk. Amit brings to Tenable a unique blend of leadership in the private and public sectors. Previously, he served as president of RSA, leading its transformation into one of the most successful global security companies. Amit joined RSA through the acquisition of NetWitness, the network forensics company he founded and led as CEO.

9:30 - 10:00
Keynote: Dave Cole, Chief Product Officer and Gavin Millard, Vice President of Product Marketing
Dave Cole, Chief Product Officer | Tenable

As chief product officer, Dave Cole leads initiatives in continued technology innovation and product excellence. He is an accomplished security veteran with a history of leading product innovation and building highly scalable systems, including product design and development for SaaS and cloud.

Gavin Millard, Vice President of Product Marketing | Tenable
10:00 - 10:30
Fireside Chat with Jennifer Johnson, Chief Marketing Officer and Mike Koss, Head of IT Security & Risk | N Brown Group
Mike Koss, Head of IT Security & Risk | N Brown Group

Mike is a seasoned and extremely passionate IT Security professional. With over 22 years of experience in the industry, he has worked across many different sectors, starting out in Central Government then moving to Media and more recently Finance and Retail. Mike has spent the majority of his time working in offensive security. Currently, Mike is delivering a significant IT Security Transformation project to N Brown Group, a FTSE 250-listed retailer headquartered in the North West. In addition, Mike provides cyber security leadership advisory services and also continues to work on a number of other personal side projects related to offensive security and security research.

Jennifer Johnson, Chief Marketing Officer | Tenable
10:30 - 11:00
Break
Track Session A
Track Session B
11:00 - 11:30
Tips and Tricks from the Trenches
Session Abstract

Get vulnerability scanning tips and tricks from a seasoned Nessus and SecurityCenter pro. Presenter Frederic Coene will share learnings collected from 10+ years of experience – as a Nessus home user, security consultant, cyber war games participant, and vulnerability assessment team leader in Afghanistan, as well as using SecurityCenter in his role as the former head of NATO's Cyber Security Hygiene Indicator programme. Get practical advice on how to scan large networks, avoid outages, and create continuous, actionable insight into your network vulnerability posture.

Frederic Coene - Cyber Security Engineer | Beosec
Building an Effective Cyber Exposure Programme
Session Abstract

In this session, presenter Andy Herrington will discuss the importance of reviewing security processes when deploying supporting technologies – and how to truly adopt a business-focused approach. He’ll provide a point of view on common processes impacted by Cyber Exposure. Finally, he’ll cover a supporting maturity model that provides insight into your current and target future states.

Andy Herrington - Director of Professional Services | Tenable
11:40 - 12:10
Data Science - Leveraging Machine Learning for Effective Vulnerability Prioritisation
Session Abstract

Tenable has invested heavily in data science to effectively harvest and utilise the vast amounts of data generated on the platform. In combination with relevant third-party data and powered by artificial intelligence, we have enormous potential to solve some of the biggest challenges in cyber security faced by our customers. In this talk, presenter Vincent Gilcreest will focus on Tenable's risk-driven prioritisation strategy. We will propose Tenable's new vulnerability score (TVS), that is an adaptation of CVSS to incorporate a machine learning derived threat score. The threat score dynamically responds to the changing threat landscape. We will highlight the advantages TVS has over CVSS in terms of vastly more efficient prioritisation and its overall responsiveness to changing threat levels.

Vincent Gilcreest - Head of Data Science | Tenable
How to Manage the Convergence of OT and IT With Siemens and Tenable
Session Abstract

Curious about how to manage the convergence of OT and IT? Presenters Ian Bramson and Eitan Goldstein will cover: the top pain points around securing OT environments, how you can start addressing OT cyber security challenges and – importantly – how to gain a holistic view of your converged IT/OT environment.

Ian Bramson - Head of Global Cybersecurity Sales and Strategy | Siemens
Eitan Goldstein - Senior Director, Strategic Initiatives | Tenable
12:20 - 12:50
Research - Zero Day Hunting and Plugin Creation
Session Abstract

In this talk, Tom Parsons will provide an overview of the Tenable Research team. Tenable Research is a global cyber security team most strongly associated with plugin development driving most of Tenable’s product, such as Nessus, SC and Tenable.io. The team also made news this year with the discovery of the Peekaboo vulnerability, a major flaw in global surveillance software. The team consists of many exceptional researchers and focuses on key issues affecting how organizations defend themselves. This session will give a broad overview of the diverse work the team is doing to address the full scope of vulnerability management, including asset coverage, plugin development, primary research and discovering zero-days. For example, in 2018 Tenable Research has discovered and disclosed 30 vulnerabilities and published three Whitepapers based on real-world defender behavior. The work by Tenable Research is instrumental in the effort to reduce the Cyber Exposure Gap, this session will explore how that work is accomplished.

Tom Parsons, Senior Director Product Management | Tenable
Closing the Cyber Exposure Gap with Automation and Orchestration
Session Abstract

Major data breaches are headline news, but those well-publicised breaches are only the tip of the iceberg. To better understand why large-scale breaches continue to occur, ServiceNow surveyed more than 2,900 security professionals involved in vulnerability response. This survey uncovered that manual processes are slowing security teams down and putting their organisations at risk. Learn how you can close the Cyber Exposure gap by combining Tenable and ServiceNow to make identification, prioritisation and patching of vulnerabilities more efficient with workflows and automation.

Janene Casella, Director, Product Marketing, Security & Risk | ServiceNow
13:00 - 14:15
Lunch
14:30 - 15:00
Research - Vulnerability Trends and Insights
Session Abstract

Leveraging anonymised telemetry data, Tenable Research has conducted and published three major studies this year. The research is quantitative and data-driven, providing real-world insights into how cyber defenders are actually behaving. Presenter Oliver Rochford will walk through the findings of each report:

  • Quantifying the Attacker’s First-Mover Advantage: Comparing the time it takes for enterprises to assess for a vulnerability versus the time attacker’s need to obtain a working exploit
  • Cyber Defender Strategies: Looking at enterprise vulnerability discovery and assessment maturity – and the four maturity styles organisations display
  • Upcoming report (will be announced on November 7).

Oliver Rochford - Research Director | Tenable
Make Your SOC Rock with Splunk, Phantom and Tenable
Session Abstract

This session will focus on best-of-breed SOC use cases based on leading platform offerings from Splunk, Phantom and Tenable. Learn how to better leverage Splunk's security nerve center to drive efficiency within your security operations center (SOC). See how analytics-driven security combined with security automation and orchestration can enhance and accelerate Tenable SecurityCenter’s ability to evaluate vulnerability data, prioritise security risks and provide a clear view of your security posture. Also see how this group of technologies can better defend against threats by accelerating the cycle from incident detection to vulnerability assessment to faster automated response.

Don Leatham, Global Strategic Alliances - Security Markets | Splunk
Wissam Ali-Ahmad, Technical Lead - Global Strategic Alliances | Splunk
15:10 - 15:40
Avoid Getting Lost in Translation: How to Substantiate SecurityCenter Results in Splunk Custom Dashboards
Session Abstract

Hear the security success story behind the Holcim and Lafarge merger, executed in July 2015. You’ll learn how they orchestrated a global project to manage security vulnerabilities using SecurityCenter. Additionally, see how a custom global dashboard helps LafargeHolcim optimise resources allocated to vulnerability management.

Jose Maria Labernia, Head of IT Security and Internal Control, European IT Services | LafargeHolcim
Managing a Vulnerability Management Programme
Session Abstract

Join Laurence Bentley, information security operations manager for a global healthcare organisation, as he discusses deploying Tenable to quantify and assess their cyber exposure. Laurence will share lessons learned and insights from operationalising a vulnerability management program in a large, disparate network.

Laurence Bentley - Information Security Operations Manager | A Leading Health & Insurance Company
15:50 - 16:20
The Complete Vulnerability Management Approach
Session Abstract

Presenter Matej Saksida will address the complete vulnerability management approach needed to run a successful security department and thus diminish the risk of cyber exposure. Understanding your environment through live discovery methods - such as scanning, a good asset management programme based on best-of-breed security practices and partnering with the IT department - are all essential to maintaining a strong awareness of your environment. Having a good understanding of your assets within the attack surface is crucial, and priority remediation on critical security infrastructure is needed to maintain a safe environment. Continuous visibility is imperative, but so is strategic insight and the validation of success through effective security metrics, reporting and open communication with the senior management and risk management teams. Security is complicated, but with knowledge and understanding of the complete vulnerability management approach, you can reduce the risk of cyber attacks.

Matej Saksida - Director, Information Security | Global Payments
Vulnerability Management in a Highly Heterogeneous and Agile Environment
Session Abstract

The transformation of enterprise into Agile often means DevOps can choose and configure their own systems. Presenter Maciej Wrobel will discuss how to handle the many technical issues related to vulnerability assessment and secure configuration monitoring.

Maciej Wrobel - Security Expert | ING
16:30 - 17:00
Securing DevOps and Cloud Without Slowing Down
Session Abstract

In this session, Presenters Daniel Grice and Jonathan Fernandes will examine the security issues caused by dynamic modern assets and discuss ways Tenable can help you secure them – without slowing down business-critical processes like DevOps. Learn how to understand the vulnerabilities and the actions you can take to keep these cloud assets safe.

Daniel Grice - Security Engineer | Tenable
Jonathan Fernandes - Security Engineer | Tenable
Customise Your Way to Success with SecurityCenter
Session Abstract

One of the key reasons organisations choose SecurityCenter is its extensive customisable reporting and dashboard capabilities. Every team is different, with unique data analysis and reporting needs. In this session, Presenter David Bradley will walk through customisation approaches – and why it’s critical to consider the data before reporting on it to improve accuracy and minimize frustration.

David Bradley - Security Engineer | Tenable
17:10 - 17:30
BBC Click's Dan Simmons in Fireside Chat with Renaud Deraison
Dan Simmons, Technology Reporter | BBC Click

Presenter and technology reporter on the BBC's weekly flagship TV tech show, Click. Dan specialises in mobile tech, cyber hacks and security. After getting his starting as a BBC radio journalist, Dan moved to TV News in 2001 before joining Click in 2004. Dan does a lot of the tweeting for @bbcclick. While not the biggest geek, he is on a mission to determine if and why new technologies should matter to the rest of us. Between texts, Dan enjoys snow sports, sailing and good wine - which thankfully is a year-round sport.

Renaud Deraison, Chief Technology Officer & Co-Founder | Tenable
17:30 - 18:30
Closing Reception

About our Location

The May Fair Hotel is our home base for Tenable Edge 2018 London. We have reserved rooms at special, discounted rates for all registered attendees.

Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs
Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security