Thursday, October 13, 2022

1:00 PM -
2:00 PM

Guest arrival and networking lunch

2:00 PM -
2:15 PM

Welcome and introduction to Attack Resistance Management

Colin Glenn, HackerOne

Digital expansion dictates that modern orgainizations deliver instant response and unfettered convenience to their customers. However, with this expansion comes the spread of unknown or unmanaged assets that expose a wide range of valuable targets for bad actors to exploit. There’s a gap between the assets that organizations currently know about and the ones they need to defend. Join HackerOne to learn how closing the gap will help you achieve attack resistance.

2:15 PM -
3:00 PM

Innovating the Attack Resistance Management Platform

Nick Emanuel, HackerOne

HackerOne is on a mission to simplify and innovate our platform to help our customers achieve their security goals. Join us to learn about the evolution of our roadmap and get a peek at the Attack Resistance Management platform in action.

3:00 PM -
4:00 PM

Breakout Sessions

Track A: What are you overlooking? How to measure and close the gaps in your attack resistance

Laurie Mercer, HackerOne

What are you overlooking? How to measure and close the gaps in your attack resistance 

Digital transformation has a downside: It causes a gap between the attack surface your organization knows about and protects, and your actual attack surface with assets that are beyond your security team's scope and therefore left unprotected.

In this workshop, we’ll explore the ways to measure that gap and how HackerOne’s platform can help close it. Participants will come away with a new approach to gaining full visibility across their attack surface, driving down risk, and increasing attack resistance across applications and cloud assets.

Specifically, you'll learn how to:

-Stay ahead of threats in a fast-changing changing application landscape
-Measure and close the gaps in cyber-risk identification
-Find risks that scanners, automation, and AI miss
-Use real-world vulnerabilities to educate and train developers
-Fill security skills shortages on demand

Track B: Strengthen Your Security Posture with a Continuous Cycle of Vulnerability Intelligence

Session abstract to follow

Track C: OpenASM Series: Modernising Attack Surface Management with Hadrian

Attack Surface Management has gained a lot of momentum in today’s digital world. With organisations growing their presence online, it is harder to track and have visibility into an organisation's digital footprint.

Whether you are on the defensive or offensive side, join Hadrian's VP of Research & Community, Ben Sadeghipour, also known by his Twitter handle, NahamSec, in this session to understand the modern attacker’s perspective on approaching a company's digital assets and finding vulnerabilities within them. Additionally, he’ll demonstrate the ways you can implement a comprehensive attack surface management program to reduce your organization’s risk by leveraging Hadrian and HackerOne.

4:00 PM -
4:30 PM

Networking Break

4:30 PM -
5:15 PM

How The Most Innovative CISOs Close Their Attack Resistance Gap

Colin Glenn, HackerOne  |  Stu Hirst, Trustpilot  |  Christine Maxwell, Ministry of Defence

Hear top security priorities and how organisations are harnessing the creativity of hackers to find critical vulnerabilities that scanners miss.

Key takeaways:

- Understand the diverse security challenges facing different organisations
- Learn top CISOs' strategies for closing the attack resistance gap
- Get advice on developing your own Attack Resistance Management approach

5:15 PM –
6:00 PM

Ask the Hackers

Roni Carta, Ethical Hacker  |  Adam Gray, HackerOne  |  Katie Paxton-Fear, Ethical Hacker

In this session, have the opportunity to ask some of Europe's top ethical hackers everything you've ever wanted to know. Hear about their most exciting find, learn about their strategies for identifying the most critical bugs to your organisations, and find out about what makes a successful ethical hacking program from their point of view.

Key takeaways:

-Understand what motivates ethical hackers
-Learn their strategies for identifying the most business critical bugs
-Get the tips for running a program that top ethical hackers will want to work on

6:00 PM -
6:15 PM

Closing Remarks

6:15 PM -
8:00 PM

Networking and Drinks

*Agenda subject to change.