Breakout Sessions

MPOWER 19 will feature a comprehensive agenda packed with targeted, highly technical breakouts. You’re guaranteed to gain valuable, tangible knowledge to help you maximize your security solutions and tackle today’s greatest security challenges. If you have already registered - Create your Own Agenda Here and map out your daily schedule of sessions and events you most want to attend through the MPOWER 19 My Event site by entering your registration login information and then clicking on "My Schedule" to create your personalized agenda.



Track Sessions

MPOWER 19 features targeted, highly technical sessions. Breakouts will offer insights and best practices to help you optimize your security and compliance initiatives. Click on track titles below to reveal breakout session titles for each track. Select title to view session details.


TRACK 1
Advances in Threat Defense

Are you prepared for today’s threats? Global businesses and the systems they use daily are under siege. This track will take a deep dive into modern threats, from malware attacks to nation-state actors to vulnerabilities in the very products and systems themselves, exploring what it all means for your business. For example, how do you respond to a ransomware attack? How can you utilize the latest cyber threat intelligence to anticipate and mitigate today's threats? What advances in artificial intelligence are being utilized by adversaries and what methods are most effective to protect against them? Learn more about protecting your business with a look at the cyberthreat landscape first-hand through the eyes of threat researchers.


Internet of Threats – The Current State of IoT Device Security

It’s tough to name a modern device without an IP address. From smart toasters to industrial control systems, everything comes connected. While we celebrate the automation connectivity brings, we need to reflect on the dangers and whether or not the IoT has kept cybersecurity in mind. Spoiler Alert: it hasn't! Hacking a coffee pot may not seem like a significant event. For a cybercriminal, however, a connected-device is often the easiest entry point to a network. This talk will feature real demos of compromised devices using zero-day vulnerabilities and cover the corresponding impact of exploitation in consumer and enterprise environments.

Session Room: Level 3 - Starvine 10-11
Session Code: ATD_34
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Steve Povolny, Head of Advanced Threat Research, McAfee

Deep Dive: Advances in Machine Learning: Generative Adversarial Networks

Generative Adversarial Networks (GANs) are a fundamentally significant advancement in machine learning. Capable of generating lifelike outputs that are virtually indistinguishable from reality, GANs show great potential as an effective method to compete with evolving threats. In this talk, we will review the application of GANs in cybersecurity, including securing steganography, detecting malware and both attack & defense scenarios in adversarial machine learning. We will discuss McAfee’s research on GAN-based attacks targeting a facial recognition system and the latest advances in GAN-based malware detection.

Session Room: Level 3 - Juniper 2
Session Code: ATD_31
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Catherine Huang, Principal Engineer, McAfee
Amanda House, Data Scientist, McAfee

Ransomware: An Enterprise Survival Guide

This is the talk you MUST attend. We will cover not only how to defend against the current state of ransomware variants targeting organizations, but also what do in the event of a breach. The threat of ransomware is becoming more aggressive and targeted, make sure you are ready to fight back.

Session Room: Level 3 - Juniper 2
Session Code: ATD_76
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Marc Rivero Lopez, Threat Researcher, McAfee
Raj Samani, Chief Scientist, McAfee

Beyond the Endpoint: Creating a Fabric for Enterprise Security

Security requires an enterprise-wide approach but, all too often, security teams are stuck in reactive mode and focused on the legacy controls of the past. In this presentation, we’ll cover how to approach security in a way that creates a culture of information security throughout the enterprise and how McAfee acts as a foundation of that program.

Session Room: Level 1 - Pinyon 8
Session Code: ATD_133
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

John Childs, Sr. Principal Architect, DynTek

Deep Dive: Techniques to Defend Against Fileless Malware: Powershell Edition

Fileless malware, where no file is written to disk, has become rampant. Specifically, the pre-installed and versatile Windows PowerShell has become one of the most popular choices in cybercriminal's arsenals. Using PowerShell, an attacker can fully access Windows features, which makes it the perfect tool to launch an attack. This talk will cover how to correlate behaviors such as environmental parameters and exploitative techniques to identify suspicious patterns and uncover fileless threats.

Session Room: Level 3 - Starvine 10-11
Session Code: ATD_56
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Mohana Shyam P, Manager QA Engineering, McAfee
Pradeep Bhandary Mangalore, SDET, McAfee

Intelligence Preparation for the Cyber Battlefield, “The Use of Advanced Cyber Threat Intelligence”

While cybersecurity involves mostly technical means to protect people, processes, and Intellectual Property (IP), the proper application of Cyber Threat Intelligence (CTI) is far more critical than ever before.  Intelligence, properly utilized, ensures organizations are tactically and strategically prepared to both anticipate and mitigate today’s threats before they become detrimental to the organization affected.  CTI is not just the collection of data utilizing open, closed, propriety sources, social media and human intelligence or data collected from the “dark web.”  It is  dedicated processes with established methodologies that create intelligent products which empower people to make better decisions. These processes and methodologies are applied against areas such as cybercrime, hactivism or cyber espionage (APTs) allowing for both tactical and long-term strategic planning and actions.  This panel will explore the use of CTI, specifically around advanced collection methodologies and how to apply them against today’s current threats. The panel members are reflective of large governmental institutions who utilize CTI and collaborate with industry partners to help develop new methodologies to evolve/adapt to this rapidly changing environment.

Session Room: Level 3 - Juniper 3
Session Code: ATD_195
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Tim Kosiba, Chief of Network Operations, NSA
Trent Teyema, Senior Vice President and Chief Technology Officer, Parsons Corporation
Shawn Johnson, Senior Intelligence Analyst, U.S. Army Cyber Command
Patrick Flynn, Head, Advanced Programs Group, McAfee

HVACKING: Understanding the Delta Between Security and Reality

The McAfee Advanced Threat Research team discovered a 0-day vulnerability in the Delta enteliBUS™ Manager; a BACnet™ Building Controller designed to manage building operations. Exploitation of this vulnerability leads to complete remote control of the building. This presentation will demonstrate a critical attack on a real data center and how McAfee solutions protect your business from this threat.

Session Room: Level 3 - Juniper 4
Session Code: ATD_13
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Douglas McKee, McAfee Senior Security Researcher, McAfee

Securing Digital Transformations and Reducing Incident Response Time using a Foundational, Precision Based Approach

The traditional network perimeter is dissolving with digital transformations like SD-WAN, IoT, BYOD and hybrid cloud. This shift makes securing your infrastructure, applications and data complicated.  Remote branches are moving to direct internet connections, but they don’t have the ability to replicate a full security stack deployed in the data center. IoT leads to an explosion of non-standard devices using non-standard protocols, adding additional security complexities. But every new change shouldn’t equal need for a new security tool. What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is ubiquitous in networks, can scale to the size of the Internet, and provides precise “crime scene DNA” that can help speed up response time when an incident does occur.

Session Room: Level 3 - Juniper 2
Session Code: ATD_257
Session Time: Thursday, October 3, 2019 at 4:40 PM to 5:30 PM

Anthony James, VP of Product Marketing, Infoblox


TRACK 2
CISO Priorities and Perspectives

Organizations are fundamentally transforming with technology. The rapid move to cloud and mobility is ushering in almost unimagined innovation, agility and speed-to-market for LOBs. Managing true business risk in this environment requires complete visibility over a disjointed playing field. However, the inherent complexity of security itself can easily outweigh its intended benefits if not implemented with optimization in mind. Join us in the CISO track as we discuss operational simplification as a means to drive better security and business outcomes and learn from your peers as they share valuable insights and benchmarks from their own journeys.


Cloud Security Story-Crafting: Getting InfoSec Back in the Cloud Game

“What unites people? Armies? Gold? Flags? Stories. There’s nothing in the world more powerful than a good story. Nothing can stop it. No enemy can defeat it.”  -Tyrion Lannister Huge cloud programs are failing due to InfoSec concerns. And InfoSec isn’t getting much of that cloud funding either.  Why is this happening? How do you get InfoSec back in the game as part of critical decision processes, and how do you secure the InfoSec funding to help your company’s cloud program succeed?  We will discuss objective critical issues, provide outlines on how to craft the story to both objectively support and emotionally back your credibility, and talk about the art and science of making your case. The bad guys are leveraging the emotional impact of stories, which is proven since Aristotle’s time, and the good guys must be empowered to use this impactful aspect of human decision-making.  You’ll learn the importance of impactful, business-aligned narratives to secure funding, support, and momentum to protect what matters in complex cloud transformations.

Session Room: Level 3 - Starvine 1-2
Session Code: CISO_78
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Brooke Noelke, Cloud Transformation Architect, McAfee

China as a New Russia? Analyzing Similarities and Differences

The Chinese underground cyber crime profits exceeded $15.1 billion in 2017, while causing more than $13.3 billion worth of damage relating to data loss, identity theft and fraud. This panel will compare and contrast the differences between Chinese and Russian underground activities, and their effects across the globe.

Session Room: Level 3 - Juniper 3
Session Code: CISO_85
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Stacy Stevens, Special Assistant to Assistant Director, Cyber Division FBI
Patrick Flynn, Head, Advanced Programs Group, McAfee
Anne An, Senior Security Researcher, McAfee

Security Implications of Emerging Data Privacy Compliance Initiatives

Data privacy in the midst of digital transformation is a huge issue. Organizations are dealing with increasing quantities of data crossing their networks, data centers and cloud environments. At the same time, a mountain of data privacy compliance initiatives-- such as GDPR and the California Consumer Privacy Act -- are regulating the privacy of that data. This session will cover the implications of these laws on how you implement security in your environments.

Session Room: Level 3 - Starvine 10-11
Session Code: CISO_196
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Pieter Siedsma, CISO & CCERT, ING Bank
Flora Garcia, Director, Legal, McAfee

McAfee's Take on EXplainable Artificial Intelligence (XAI)

Explainable Artificial Intelligence (XAI) creates explainable models while maintaining a high level of learning performance, thereby enabling users to understand, appropriately trust the underlying models. The session will provide a comprehensive overview of XAI concepts along with usecase demonstrations in both malware and non-malware applications.

Session Room: Level 1 - Pinyon 3
Session Code: CISO_102
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Sherin Mathews, Senior Data Scientist, Mcafee
Celeste Fralick, Chief Data Scientist, McAfee

Eliminating Silos Starts with the CISO

Join us for a discussion with the CISO of NCR as he uncovers the secret to their culture of collaboration. In a corporate infrastructure that is truly as diverse as they come, NCR is a unicorn given the success they have with working seamlessly between various internal teams.

Session Room: Level 3 - Juniper 3
Session Code: CISO_95
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Robert Varnadoe, CISO, NCR
Rachel Powell, Customer Success Manager, McAfee

Deep Dive: Panel Discussion - Secure Tomorrow In 2020s within the Healthcare Industry

Only 3 months left at this decade, we will embrace 2020s decade soon. In this panel speaker session, our Healthcare Industry Cyber Security Leaders will share their insights about their strategic and tactic planning for 2020s including but not limited to Cloud Security, Data Privacy, Evolving Threats from endpoints and IOT mitigation plan.

Session Room: Level 1 - Pinyon 3
Session Code: CISO_26
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Mitchell Greenfield, Director, Cyber Innovation and R&D, Humana
Andrea Daugherty, Sr. Director, IS Security and Innovation, MemorialCare Health System
Nemi George, Vice President, Pacific Dental Services
Sumit Sehgal, Chief Healthcare Technical Strategist, McAfee

Panel: Moving Beyond Compliance Check Boxes to a Holistic, Proactive Approach to Security

Customers from various industries share their experiences moving from a band-aid tactic to a methodical security strategy. McAfee’s Aneel Jaeel, SVP of CSG, leads a panel discussion with leaders who provide their playbook going from security woes to accomplishments. Learn how they're leveraging an "easy button" to achieve product adoption, monitor and track priorities, and expedite issues and accelerate remediation.

Session Room: Level 3 - Starvine 1-2
Session Code: CISO_211
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Dawn St Amand, SVP - Infrastructure Defense Engineering, Citi
Michael Blanchard, Lead Endpoint Security Engineer, Dell Technologies
Robert Varnadoe, CISO, NCR
Prashanth M J, Senior Vice President, Sutherland
Bob Bruce, Assistant Vice President and Sr. Technology Strategist, US Bank
Aneel Jaeel, SVP, Customer Success Group, McAfee

The Perfect Cyberstorm - Leveraging A Complete View Across IT & OT Ops

A confluence of trends have resulted in making the security of critical infrastructure and industrial operation a top priority. The convergence of IT and OT operations, migration of once isolated OT environments to IIoT, are just a few. With these emerging trends, there is an even greater for 100% visibility, security and control.

Session Room: Level 3 - Starvine 10-11
Session Code: CISO_9
Session Time: Thursday, October 3, 2019 at 4:40 PM to 5:30 PM

Michael Rothschild, Senior Director of Product Marketing, Indegy
Maurice Cashman, Principal Engineer, Director, Security Architects EMEA, McAfee


TRACK 3
Cloud Security

According to the State of the Cloud Report by Right scale, 81% of enterprises plan to put a cloud team in place within the next year. Why? Enterprises already run 40% of their workloads in the cloud and that is expected to grow to 83% by 2020. Sixty-six percent of IT professionals cite security as the number one concern in adopting a cloud computing strategy. Security technologies have evolved to meet the unique needs of private and public cloud environments. Whether you’re trying to ascertain which cloud applications hold sensitive data, inspecting workload configurations within infrastructure-as-a-service (IaaS) providers, or inspecting lateral threat movement to, from, and between cloud resources, it's important to understand and effectively leverage the shared security responsibility models promoted by cloud service providers. MVISION Cloud is a platform that encourages and explores solutions that ease challenges associated with securing the dynamic nature of private, public, and multi-cloud environments.


Inside Securing MGM Resorts International Digital Transformation

Scott Howitt, SVP, CIO & CISO of MGM Resorts International is a security visionary who is leading the digital transformation of one of the world’s largest gaming and entertainment companies with over 27 resorts globally. In this session, Scott will discuss how leveraging cloud technology is accelerating their digital transformation and how McAfee’s Device to Cloud solutions are ensuring they operate with both agility and security as they build the entertainment powerhouse of the future.

Session Room: Level 3 - Juniper 2
Session Code: CLD_184
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Scott Howitt, SVP, CIO and CISO, MGM Resorts International
Kaushik Narayan, CTO, Cloud Business Unit, McAfee

Deep Dive: Threat Assessment in the Cloud - IaaS Security

Threats in IaaS often don’t look like the malware-based infiltration attacks we defend against in our datacenters, networks, and endpoints. More often, these cloud-native breaches are the result of weakly configured or unprotected resources native to the cloud platform, which are exploited for access to sensitive data. Defending against these requires cloud-native security. Learn how these attacks occur, how to defend against them, and preview where IaaS defense is headed in the future as we move to container security and beyond.  

Session Room: Level 3 - Juniper 4
Session Code: CLD_136
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Danny Manuel, Product Manager, McAfee
Amit Agrawal, Senior Product Manager, McAfee Cloud Business Unit, McAfee
Sekhar Sarukkai, Chief Scientist, McAfee Cloud Business Unit, McAfee

Cloud Security: New Risks, New Rules

Cloud security has evolved as quickly as the cloud itself with 90% of sensitive data now in services like Microsoft Office 365, Salesforce and AWS. These trends are leading to a platform approach that optimizes visibility and control, no matter where data resides. Learn how cloud security is evolving and where McAfee is investing in the next year. We’ll outline future best practices for cloud security and how we’ve already combined the power of MVISION Cloud with other solutions to create “Cloud Security Nirvana.”

Session Room: Level 3 - Juniper 4
Session Code: CLD_173
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Stephen Deasy, Head of Engineering, Atlassian
Kaushik Narayan, CTO, Cloud Business Unit, McAfee

Lead Your Company to the Cloud: Success Strategies

There has never been a time when security has shifted as much as it has today, cloud is changing everything we do in security. You have two choices as a security or IT professional, be left behind or secure the cloud. In this talk we will share best practices and lessons learned with helping a Fortune 100 company secure cloud services.

Session Room: Level 3 - Juniper 2
Session Code: CLD_36
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Mitchell Greenfield, Director, Cyber Innovation and R&D, Humana
Jeff Jarecki, Senior Security Architect, Humana

Data Security in a Borderless Enterprise

Learn how to set consistent DLP policies that protect data from any leakage vectors – corporate endpoints, unmanaged devices, in the network, or in cloud applications. With the latest integration, MVISION Endpoint DLP customers can easily extend existing enterprise DLP policies to the cloud in minutes. Also learn about how Cloud Application Controls enables granular control policies.

Session Room: Level 3 - Starvine 10-11
Session Code: CLD_185
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Jeff Lund, Shared Services CISO, Marsh & McLennan Companies
Suhaas Kodagali, Senior Product Manager, McAfee Cloud Business Unit, McAfee
Arun Kumar, Director, Product Management, McAfee Cloud Business Unit, McAfee

CISOs In the Boardroom: Winning a Seat at the Big Table

Headlines are cluttered with news of the latest data breaches and cyber-attacks. As a result, security is top of mind for business executives now more than ever. Yet CISOs in any organizations still struggle to get time with the board of directors. Those that are able to present their perspectives often fail to deliver a message the resonates with the business leaders. How can security professionals establish a credible presence that gets the board to sit up and listen? What techniques can a CISO leverage to ensure a powerful and lasting connection needed to win support for an effective security strategy? This session will examine key mistakes security leaders make when addressing executives and board level leaders. Tying together business context and lessons taken from neuroscience, a methodology for establishing a authoritative presence in the boardroom. Learn how to not only earn a seat at the table, but how to present the board with offers they can’t refuse.

Session Room: Level 1 - Pinyon 3
Session Code: CLD_251
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Alyssa Miller, Manager, Information Security Solutions Practice, CDW

Understanding Cloud Threat Models

For enterprises to build defenses, a threat model must be thoroughly understood: what are the attack goals, targets, techniques, and impacts? A shared security responsibility exists between the service provider and the enterprise. This session will explore threats in SaaS, IaaS and PaaS across Public, Private and Hybrid cloud deployments.

Session Room: Level 3 - Juniper 1
Session Code: CLD_194
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Kevin Rodriguez, Cybersecurity Lead, M&T Bank
Daphne Zhao, Group Product Manager, McAfee Cloud Business Unit, McAfee
Sandeep Chandana, Director, Data Science, McAfee Cloud Business Unit, McAfee

Enabling Pacific Dental to Expand Their Cloud Adoption with Amazon Web Services and MVISION Cloud

Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools and skill sets to keep sensitive data secure.  In today’s cloud environments it is important for customers to  have confidence in the security of their cloud platform, have the right tools that help them with additional security controls, and have security solutions that can keep up as customers take advantage of key features that are offered by running in the cloud.  In this session we will talk about why customers are choosing the AWS Cloud, how they are able to meet their security goals when running on AWS, how McAfee as an AWS partner is enabling customers to meet their security goals on AWS, and how Pacific Dental Systems was able to meet their compliance needs and improve their security posture for their AWS environment by leveraging AWS and McAfee security solutions.

Session Room: Level 1 - Pinyon 3
Session Code: CLD_252
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Scott Ward, Principal Solutions Architect, Amazon Web Services

Deep Dive: DevOps to DevSecOps: Cloud Security Shifts Left

Reduce risk by integrating automated security into the DevOps process. “Shift Left” is the concept of pushing the responsibility of security earlier into the development cycle; promoting Security by Design.  Build security discipline early in the development process by integrating it into the check in and build processes. 

Session Room: Level 3 - Juniper 4
Session Code: CLD_170
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Bob Fish, Sr. Cloud Security Technologist, Electronic Arts
Shitij Suneja, Sr. Security Architect, McAfee Cloud Business Unit, McAfee
John Dodds, Director, Product Management, McAfee Cloud Business Unit, McAfee

Securing Microsoft Office 365 & Microsoft Teams with CASB

In this session we will outline the top 7 security use cases for Microsoft Office 365 across Exchange, OneDrive, SharePoint, and Teams and provide a model for determining which use cases to tackle first.

Session Room: Level 3 - Starvine 10-11
Session Code: CLD_186
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Tracy Crain, Director of ISVs, One Channel Partner, Microsoft
Thyaga Vasudevan, Sr Director, Product Management, McAfee Cloud Business Unit, McAfee

Securing Your Move to the Cloud: Discussion With a Global Technology Company’s Director of Information Security

As cloud adoption continues to grow, additional measures are needed to bolster data protection and tighten access to sensitive information. In this session, SHI International Director of Information Security Chris Sullo will discuss lessons learned, and how to address cloud security challenges with a strategy that includes the appropriate architecture, controls, and policies. 

Session Room: Level 3 - Juniper 2
Session Code: CLD_254
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Christopher Sullo, Director, Information Security, SHI International

Cloud Security Telemetry Management for Cyber Digital Transformation

This session will help you identify and understand the building blocks of Cloud telemetry signals, manage the noise,and configuration drift to instrument actionable intelligence. Target Audience - Decision makers, Influencers, and Engineers -  As enterprises continues to consume SaaS, IaaS, PaaS, FaaS environment, Learn how to manage strategy on telemetry signals coming out of various data sources and rationalize the data to have actionable intelligence to detect and respond. 

Session Room: Level 1 - Pinyon 3
Session Code: CLD_256
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Joe Vadakkan, Cloud Security Practice Leader, Optiv

MVISION Cloud DLP: Why Microsoft Office 365 DLP Isn't Enough

Even though Office 365 has great DLP technology, it is not sufficient to match onsite capabilities. See actual use case test results from MVISION Cloud DLP and O365 DLP evaluations. Learn how easy it is to re-use your existing classifications from McAfee ePO to get the most value from your time spent and end with a high-level strategy for implementing MVISION Cloud DLP in Office 365.

Session Room: Level 3 - Juniper 1
Session Code: CLD_29
Session Time: Thursday, October 3, 2019 at 4:40 PM to 5:30 PM

Kenneth Sheppard, Senior Security Engineer, AbbVie
Sam Herath, Senior Sales Engineer, McAfee


TRACK 4
Device to Cloud Data and Web Protection

Companies of all sizes are adopting cloud-based services to give their employees greater flexibility and easier access to core business applications. Endpoint and network security alone is not sufficient in the device-to-cloud world. Unsanctioned cloud application access, reduced visibility of sensitive data in the cloud, and the absence of centralized management and reporting can lead to data loss and non-compliance. In this track, we will share with you how to protect users and data while applying consistent security policies across control points in all environments with less complexity and great efficacy. And enable business with user-friendly encryption and help ensure compliance with unified policies, work flow and incident management.


Deep Dive: Bright Web Security for Cloudy Environments (with real world use case from customer WEG)

Cloud technology provides web services accessed by any device, anywhere. Changing network architectures and data storage locations dramatically alter the requirements for effective web security. The use of virtualization, encryption, SD-WAN, websockets, HTTP2, TLS 1.3, O365, GSuite, AWS, Azure and others demand brighter web security solutions.

Session Room: Level 3 - Juniper 3
Session Code: DWP_30
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Pierre Rodrigues, CISO, WEG
Jeff Ebeling, SE Specialist - Web, McAfee

Shaping the Cloud Edge - Converging Web, CASB, and DLP

The classic network perimeter and cloud services are merging and converging while companies move their products and classic on-premise tools into the cloud. ​ This convergence generates a specific new challenge for organizations, as they now need to deal with data spreading out to any device, service, or user in their company -- independent of location. Companies need a new vision for their data protection and security strategy that is cloud native (cloud centric but hybrid). This would cover data security from the DLP aspect in addition to threat protection and access control to data. This presentation will lay out a holistic approach to data security by leveraging CASB, DLP and Web protection technologies.

Session Room: Level 3 - Juniper 3
Session Code: DWP_199
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Michael Schneider, Lead Product Manager, McAfee
Sadik Al Abdulla, VP, Product Management, McAfee

Third Party Vendor Risk Assessments with MVISION Cloud and MWG

In this session we will be describing the process to leverage MVISION Cloud's Cloud Registry to feed McAfee Web Gateway policy to mitigate risk associated with 3rd party vendors.

Session Room: Level 3 - Starvine 1-2
Session Code: DWP_53
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Ivaylo Uzunov, Information Security Manager, Carlson Wagonlit Travel
Keith Page, Sales Engineer, McAfee

A Real World Use Case Using McAfee DLP, Web Protection and CASB to Protect Data and Tackle Threats

Data and applications have shifted to the cloud.  A unified security platform that can oversee your cloud, on-premise, and hybrid environments is needed.  Join us to see actual use cases leveraging McAfee Web, DLP and CASB technologies to protect data, detect shadow IT, and reduce admistrative burden. 

Session Room: Level 3 - Starvine 1-2
Session Code: DWP_201
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Elliott Breukelman, Senior Information Security Engineer, Land O Lakes, Inc.
Chris Zieg, Sr. Security Engineer, Land O’Lakes Inc.
Steven Goers, Sr. Solutions Engineer, McAfee

Deep Dive: Quick Wins Implementing DLP (with real world use case for a data-centric organization)

The erosion of the traditional border opens the possibility for data mismanagement: storage of sensitive data in unauthorized locations, overly promiscuous ACLs, insecure cryptography, inaccurate data classification, data loss, or data theft. Join us as we talk about how to successfully plan, implement, and maintain a Data Loss Prevention program.

Session Room: Level 3 - Starvine 1-2
Session Code: DWP_160
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Micah Brown, Vice President, Greater Cincinnati ISSA
Rolf Haas, Senior Enterprise Technology Specialist, McAfee

New DLP Features to Help You Protect Sensitive Files in the Cloud

This session will introduce our next level of DLP and MVISION Cloud (CASB) integrations, along with integration with MVISION ePO. We'll also talk about other new capabilities we're launching at MPower as well as talk about some changes to how we release and support new versions.

Session Room: Level 3 - Starvine 1-2
Session Code: DWP_15
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Graham Clarke, Director of Product Management, McAfee
Shlomi Zrahia, Product Manager, McAfee

User-friendly Preboot Authentication and Security for BitLocker Demo

This session will discuss and demonstrate McAfee Management of Native Encryption new user-friendly McAfee Preboot authentication that adds network aware pre-boot security to MS BitLocker, enforcing user-domain authentication at startup. Learn how new MNE resolves typical drive encryption issues like Windows password sync and forgotten passwords.

Session Room: Level 1 - Pinyon 8
Session Code: DWP_64
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Gary Ulaner, Group Product Manager, McAfee
David Webb, Director of Engineering, McAfee


TRACK 5
Endpoint Security

Defeating attackers isn't a matter of choosing efficacy or efficiency. It's not a choice at all, actually, as one means giving up something at the cost of the other. What if the answer is as simple as doing what you already do, more efficiently with better visibility? In this track we will focus on simplifying your operations, endpoint maintenance, and how to apply your McAfee defenses to get threat insights within a couple clicks and minutes (instead of hours or across several separate tools and manual processes). From automating more of your zero-day defenses to cutting the time it takes to investigate, remediate, and harden your endpoints - this track is for those who want to know how to do more with less time.


Diagnosing the Security Risk in the Palm of Your Hand

60% of enterprise endpoints are mobile—and are totally unprotected against attacks. In this session, you'll hear from a McAfee customer how they uncovered the risks and needs that led them to look at their mobile strategy more closely. Join us to learn more about selecting the right criteria, evaluation methods, and deployment plan for your business. We will also demonstrate how mobile attacks occur and share best practices for preventing them with MVSION Mobile.

Session Room: Level 3 - Juniper 4
Session Code: EP_24
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

David Barron, Associate Vice President, GM Financial
Michael Callahan, Chief Marketing Officer, Zimperium
Paul Luetje, Enterprise Technology Specialist, McAfee

Deep Dive: The Road Ahead for EDR, Endpoint & Mobile - and How You Can Get Involved

Come listen to our expert team members talk about their endpoint products, EDR solutions, the future and how our customers can get engaged.

Session Room: Level 3 - Juniper 1
Session Code: EP_143
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Nina Smith, Product Manager, McAfee
Terry Stuart, Global Technical Director, Security Operations, McAfee
Briana Farro, Global Tech Director, Endpoint, McAfee

MVISION Endpoint and ENS – Understanding Where They Fit and Complement Your Environment

Endpoint security can be overwhelming and at times seem virtually impossible. We'll discuss the most common challenges within the space and provide practical ways to overcome those challenges.

Session Room: Level 3 - Juniper 1
Session Code: EP_150
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Philippe Maquoi, Team Leader for Security Operations, SPW (Service Public de Wallonie)
Nosa Obasohan, Product Manager, McAfee
Nina Smith, Product Manager, McAfee

Automation Tips for Overwhelmed Administrators​

Geared towards those who wear multiple IT-security hats in an organization, don’t have the time/budget for formal training and only knows enough about ePO and ENS to keep things running day to day, but no idea what to do if an outbreak happens. This talk will provide pointers and tips on what a shorthanded security team can do to improve security.

Session Room: Level 3 - Juniper 4
Session Code: EP_75
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Shelly Anderson, Professional Services Consultant, McAfee
Patrick Pinder, Professional Services Consultant, McAfee

Application Control – Securing Yesterday’s Operating Systems and Critical Systems from Tomorrow’s Threats

This session will go into depth on the newest features of McAfee Application Control showing how systems can be protected from new zero day threats with no updates or network connectivity required. Also to be discussed will be the use of whitelisting to protect Operating Systems beyond their traditional end of life.

Session Room: Level 3 - Juniper 2
Session Code: EP_122
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Benjamin Ellis, Advanced Technical Support Engineer, McAfee
Dominick Paynter, Enterprise Architect, McAfee

Deep Dive: Machine-learning: EDR’s Visibility Super Power for Hidden Threats​

Demonstrate MVISION EDR detection capabilities by leveraging the machine learning detection capabilities in MVISION Endpoint. A clear articulation in the MVISION portfolio.

Session Room: Level 3 - Juniper 3
Session Code: EP_142
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Roman Pedraza, Software Engineer, McAfee
Dave McCormack, Principal Engineer, McAfee
Randy Kersey, Product Manager, McAfee

The Future of Linux and Mac Security – What’s New and What’s Coming ​

It can be challenging navigating the security needs for Mac and Linux endpoints. Let's discuss some of the challenges and opportunities in deploying endpoint security solution in a non-windows environment.

Session Room: Level 3 - Juniper 1
Session Code: EP_147
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Nazanin Hoglund, Director, McAfee
Trey Wafer, Group Product Manager, McAfee
Roopesh Uppala, Product manager, McAfee
Mohamed Kortam, Senior Director , McAfee

Why Just-in-Time PAM is the Next Big Step in Risk Reduction

A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than necessary—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited part of the equation. Today, powerful accounts with always-on (24x7) privileged access proliferate across enterprises. The privileges of these accounts are always in an active mode—for both legitimate use and misuse. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges to accounts and assets to ensure identities only have the appropriate privileges when necessary, and for the least time necessary. With JIT PAM, your admin privileges are no longer always ripe for abuse, so the threat window is drastically condensed. For example, a typical always-on privileged account may be “privilege-active” 168 hours a week, versus just a couple dozen minutes using a JIT approach. Multiplying this effect across all your privileged accounts will have a truly massive impact on risk-reduction. Adopting JIT as part of your PAM approach means you can implement a true least-privilege model across your enterprise. 

Session Room: Level 1 - Pinyon 3
Session Code: EP_253
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Morey Haber, Chief Technology Officer & Chief Information Security Officer, BeyondTrust

Securing the "Un-Protectable" by Augmenting Traditional Endpoint Tools

With the explosion of cloud, IoT and the need to lock down critical infrastructure, traditional methods of securing these devices using agent-based security technologies are no longer sufficient and needs to be augmented by new and innovative methods. Even enterprises that can often support daily or weekly change windows, cannot afford to scan their entire network except in piecemeal over 3 or even 6 months due to the impact. For cloud-based systems where hosts are often in motion and change attributes, current technologies just cannot track these assets appropriately and often miss them or increase the burden via duplicate scanning. For an ICS/IoT environment, this type of haphazard scanning is no longer acceptable especially for systems that must be maintained at high-performance levels or 24/7/365.  Find out about new approaches in solving these types of complex environments that support “the un-patchable” or “un-protectable” systems.  

Session Room: Level 3 - Starvine 1-2
Session Code: EP_258
Session Time: Thursday, October 3, 2019 at 4:40 PM to 5:30 PM

Sanjay Raja, Senior Director of Technical Strategic Partnerships, Digital Defense

Advanced ENS Firewall, On-Access-Scanner and Exploit Prevention Management

Default security policies almost never meet an organization's needs, and often one policy is inadequate to cover those needs. In this session we'll explore how to use ENS Policies, ePO features, and third party tools to effectively create and tune custom policies for even the most complex environments.

Session Room: Level 3 - Juniper 3
Session Code: EP_99
Session Time: Thursday, October 3, 2019 at 4:40 PM to 5:30 PM

Tyler Nielsen, Sr. Endpoint Security Administrator, Perspecta / FDA
Jason Bentley, Sr. Endpoint Security Engineer, Perspecta / FDA
Nosa Obasohan, Product Manager, McAfee


TRACK 6
Evolving Your Security Operations

Efficient, effective threat detection and response requires insight from a broad collection of data and tools – insight that needs to be accurate, concise, open, and actionable by solutions and analysts alike. This track will demonstrate how to manage and analyze volumes of data to detect threats. Learn how to gain visibility without getting overwhelmed with noise, augment staff capabilities to validate and investigate threats, and enable integration to simplify response, team collaboration and workflows. From practical case studies to technical use cases and expert advice, see how sustainable approaches can help reduce your exposure and enhance your security posture.


Enterprise Visibility and Investigations with SIEM and EDR

Wondering how and when to use your SIEM vs. your EDR?  The best-case scenario is when each provides its own benefits. Learn when to be looking for each tool and how to automate and accelerate the security incident investigation process via intelligent integration. This discussion will help you find new ways to strengthen your security posture by leveraging the deep insight of EDR and broad visibility of SIEM. Each have their strengths and when used together, life gets easier and better for you and your security analysts.

Session Room: Level 3 - Juniper 1
Session Code: SO_154
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Randy Kersey, Product Manager, McAfee
Adam Rocker, Product Manager, McAfee

Deep Dive: Go from Good to Great - Investigating with McAfee EDR

Need to understand how an investigation using McAfee MVISION EDR takes place? The process enables analysts with little experience to take on greater responsibility, accelerate processes, and gain new insights into threats. This session explains how investigations can utilize existing SOC workflows, uses examples to show how McAfee EDR helps a broad spectrum of skill sets, and demonstrates how investigations expand beyond just the endpoint.

Session Room: Level 3 - Starvine 10-11
Session Code: SO_137
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Randy Kersey, Product Manager, McAfee
Jay Goodman, Product Manager, McAfee

Using McAfee Platform for Incident Response

STERIS is a leading provider of infection prevention and procedural products and services that use multiple McAfee products throughout their Enterprise including Enterprise Security Manager and DXL integrated with 3rd party solutions.  When hit with an attack, they rely on several McAfee tools to help mitigate the risk.  This session will share their approach to risk, show examples of how they use McAfee ESM, ENS, ATD and TIE to help protect and clean their enterprise, and will share ideas how to improve various processes to run a more streamlined security operations center. 

Session Room: Level 3 - Starvine 1-2
Session Code: SO_88
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Frederick Sopnicar, IT Security Lead, STERIS

An Orchestrated Incident Response Process with McAfee & IBM

Security Operation Centers (SOCs) are increasingly complex environments, often leveraging many disparate security tools that result in confusion around alert prioritization and an uncoordinated response process. This session demonstrates how security analysts can leverage McAfee products with IBM Resilient to build a well-orchestrated incident response process that prioritizes critical threats and minimizes time to resolution.  This session will discuss how teams who work in Security Operation Centers can use McAfee and IBM Resilient to orchestrate their incident response process. We will discuss how to go from threat identification to remediation using SIEM and SOAR solutions. The target audience are members of Security Operations Centers or teams that are looking to implment or improve an incident response process. Join Chris Coburn, Technical Enablement Specialist for IBM Security, for a demo showing how McAfee product integrations for IBM QRadar and IBM Resilient can:  1) Initiate incident response workflows from SIEM solution 2) Automate the incident response process using functions to enrich incidents with data from McAfee products 3) Act on McAfee managed endpoints directly from the IBM Resilient for quick time to resolution on the most critical tasks

Session Room: Level 3 - Starvine 10-11
Session Code: SO_250
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Chris Coburn, Technical Enablement Specialist - IBM Security, IBM Security

Targeted Attacks – The SOC Strikes Back

This presentation will cover critical steps that companies should be taking to protect their corporate environments. If you suspect your organization has become the target of a worthy adversary, what steps can you take and what tools will help quickly strengthen your security posture. We will cover continuous monitoring, spring cleaning and fortifications, in addition to how McAfee tools such as SIEM can be used with SOAR technology and uncover value.

Session Room: Level 3 - Juniper 4
Session Code: SO_35
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

William Woods, Senior Director of Security Intelligence, McAfee
Arve Kjoelen, Deputy CISO, McAfee

A Complete Picture: Endpoint, Network, and the Cloud - Together In Your SOC

We all struggle to protect our environments and gain the broader picture of what is going on where and when.  With the pace of change, including the number of tools you are asked to use, it's almost impossible to keep up with security, let alone get ahead. In this session, you'll learn how to set up your SOC to gain a more complete picture of your environment from the endpoint to the cloud, including tools in-between so you can improve the visibility and efficacy of both your people and security programs. 

Session Room: Level 3 - Juniper 3
Session Code: SO_200
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Christian Zink, SOC Leiter, Deutsche Rentenversicherung Bund
Ryan Wuensch, Global Technical Director, Network, McAfee
Terry Stuart, Global Technical Director, Security Operations, McAfee

Deep Dive: The Evolution of EDR at GM Financial

Endpoint Detection & Response has evolved in the last few years. It has rapidly moved from being an endpoint-centric threat hunting tool to a tool with a wider aperture. See what the future holds for EDR and how one leading edge organization has worked with McAfee since the product's early days to operationalize it in their organization.

Session Room: Level 3 - Juniper 2
Session Code: SO_79
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

David Barron, Associate Vice President, GM Financial
Ratnesh Saxena, Director, Product Management, McAfee

Three Keys to Pulling Up Your SOCs

Ready to take your SOC to the next level? Whether you have a multi-national wolfpack SOC or you are a one-person show, there are ways to advance you or your team’s abilities. The emergence of disruptive technologies and innovations, as well as new and potential threats, will impact the Threat Defense Life cycle. Through this session, we will walk through examples on how to power up security operations to make advanced cyber threat hunting possible for all security professionals, no matter the skill level.

Session Room: Level 3 - Juniper 4
Session Code: SO_165
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Brian Stephens, Security Engineer, Memorialcare
Pradeep Simha, Professional Service Consultant, McAfee

SOC 2020: Getting Your Security Operations Future Ready

The session will focus on key challenges SOC managers are faced with and how they can be addressed by taking a few strategic steps, both today and in the future. Core topics addressed include key performance indicators for measuring SOC success, delivering a successful SOC through Human-Machine teaming, and the future of the SOC, in addition to some near-term enhancements coming to the McAfee Enterprise Security Manager. 

Session Room: Level 3 - Juniper 1
Session Code: SO_120
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Scott Durrant, Product Manager, McAfee
Michael Leland, Principal Engineer & Chief Technology Strategist, McAfee

Make Your SOC SOAR: How SOAR Improves Detection and Response

Security Orchestration, Automation and Response (SOAR) is more than SIEM and improves security operations in a number of significant ways.  This session will explain what SOAR is, what its advantages are, how it improves operations, and how it gets implemented in a McAfee (and other) environments.  The kind of automation and orchestration that SOAR offers will be a game changer for security operations and companies will need to implement it to keep up with the ever-changing threat landscape.  This session will be moderately technical and will discuss SOAR and what Atos and SIEMPlify are doing to enable SOAR in our SOC environment, which is based upon ESM.  We will cover how SOAR is an improvement upon and different than SIEM; why SOAR is becoming increasingly important due to its ability to orchestrate a wide variety of security tools; how SOAR consolidates information into cases; and how SOAR takes advantage of automation to vastly improve both detection and response times.  We will discuss example workflows and implementation details.  Some detail will be provided about how McAfee products fit into a SOAR environment.  The target audience is security operations personnel who need to understand what SOAR is and understand some of its benefits and challenges.  

Session Room: Level 3 - Juniper 3
Session Code: SO_255
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Eric Taylor, CTO, Atos
Michael Brown, Global Director of Service Providers and Strategic Accounts, Siemplify


TRACK 7
Grow your Security business as part of McAfee's Partner Ecosystem

We believe that no one person, product or organization can fight cybercrime alone. It’s the underlying concept of this new track designed for members of McAfee’s partner ecosystem. See real-world examples and gain actionable direction for evolving your McAfee solution sales and service delivery to meet customers’ transforming needs from device to cloud and in between. Session topics will range from: technology architecture; to how to navigate new routes to market; to what the year ahead holds for McAfee partner program members, all with the goal of helping you build and grow your business.


You Secure Your Customers, But Are You The Target?

Earlier this year, the Department of Homeland Security attributed multiple attacks on Service Providers (managed security, managed IT, cloud) to the Chinese government.  Over the past several years these actors have been exploiting the trusted relationship between provider and customer, because providers may have unrestricted access inside a customer’s network, across several industries including Information Technology, Energy, Healthcare, Communications, and Critical Manufacturing.​ In this session we will look into recommendations and best practices from the National Cybersecurity and Communications Integration Center (NCCIC) to avert these types of threats, and review a practical way to raise the shield employing the McAfee and SIA portfolio of solutions across the threat defense lifecycle to protect, detect, and correct for the partner -- ultimately for the benefit of securing their end-customers.

Session Room: Level 1 - Pinyon 8
Session Code: PRN_159
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Rodel Alejo, Solution Architect, McAfee
Dave Marcus, Principal Engineer, McAfee
Ryan Sherstobitoff, Advanced Threat Research Group, McAfee

Deep Dive: Learn and Adopt the McAfee Selling Methodology

In 2019, McAfee adopted a proven selling methodology. Every McAfee salesperson was equipped with differentiated value propositions to articulate the McAfee Story. We want to equip our partners with the same resources and materials to truly set your security selling apart when talking to your customers. This session will be led by an expert in teaching McAfee sales and partners this methodology and it will also include interaction with McAfee reps who utilize this sales approach in their daily go-to-market. We have a unique strategy, portfolio, brand, and tools that make us your device-to-cloud cybersecurity partner of choice in this industry. Now is the time to transform our go-to-market motion together.

Session Room: Level 1 - Pinyon 8
Session Code: PRN_48
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Chris Cole, Sr. Director - Enterprise Security Architecture, McAfee
Curtis Allen, Account Manager, McAfee

Navigate New Routes to Market: How to Support and Accelerate your Customers’ Move to the Cloud

Many reports are telling us the number one focus for CIOs and CISOs is transformation, and this is led by the move to cloud. Cloud leader Microsoft Azure will discuss the biggest drivers moving customers to the cloud, and what this means for their security needs. Learn how the McAfee + Microsoft partnership enables partners to play a role and what special partner skill sets are most in need for these customers? What are the differences between Azure cloud and other platforms? 

Session Room: Level 1 - Pinyon 8
Session Code: PRN_155
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Tracy Crain, Director of ISVs, One Channel Partner, Microsoft
Miguel Holguin, Partner Development Manager, Microsoft

Bring the McAfee Ecosystem to Life: Collaboration, Architecture and Delivery of McAfee and Non-McAfee Security Solutions

McAfee has the leading Open Architecture Platform in the Industry -- but how do you turn that into a real advantage for your business and your customers? Join McAfee principal architect and lead SIA architect as they guide you through how to leverage McAfee integrations and DXL to build holistic security offerings with enabled workflow-and-policy automation, built to 3rd party recommended architecture standards. This session will also include interaction with SIA partners whose solutions integrate and fill critical roles in a recommended security architecture. 

Session Room: Level 1 - Pinyon 8
Session Code: PRN_72
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Jason Keirstead, Chief Architect - Threat Management, IBM Security
Maurice Cashman, Principal Engineer, Director, Security Architects EMEA, McAfee
Mark Mastrangeli, SIA Lead Architect, McAfee
Krithika Hegde, Software Development Engineer, McAfee

Service Provider-Strategic Alliances with McAfee: Create World Class Security Services

Understand McAfee's renewed focus, approach and commitment to enabling highly optimized and successful Partnerships specific to service provider needs.  Topics will include feedback from “Voice of the Partner” program that will higlight Service Provider challenges and how that relevant insight has helped McAfee structure Strategic Alliances resources to guide you in building a McAfee-based world-class security offering.

Session Room: Level 1 - Pinyon 8
Session Code: PRN_169
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Sonya Lonergan, Global NPS Programs leader for GTM Operations, McAfee
Peter Gaucher, Sr Director, GSP & OEM, McAfee
Richard Bowman, Director, Global Service Provider GTM, McAfee

Deep Dive: Preview of McAfee's Global Partner Program 2020 - MPACT!

What’s New and What’s Next? Get a Preview of MPACT, McAfee’s Global Partner Program that kicks off in 2020. This session will begin with the latest research results of an on-going "Voice of the Partner" project. We’ll review trends that you and your peers are sharing related to needs in this transformative marketplace. Then we’ll move into MPACT! and how the updated requirements, new benefits and tools will set you up for success in 2020 and beyond.

Session Room: Level 1 - Pinyon 8
Session Code: PRN_109
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Ken McCray, Senior Director, Sales, McAfee
Ed Baker, Sr. Director, Channel Sales, McAfee
Simon Cheong, Director, Channel Sales, McAfee

How Partners & Customers can Influence McAfee Products

This session will cover an overview of McAfee’s development process and how the Joint Development Program/Beta fits in. The panel will include Program Managers, Global Pre-Sales Director, and current customers and partners – each providing their experience of the process. Discussion will cover design review, testing, feedback, verification and delivery. At the end of this session you will have the opportunity to sign up for an upcoming Beta or be included on our list for consideration for future projects.

Session Room: Level 1 - Pinyon 8
Session Code: PRN_82
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

David Barron, Associate Vice President, GM Financial
Helvio Almeida, Cybersecurity Specialist, Scunna Networks Technologies
Terry Stuart, Global Technical Director, Security Operations, McAfee
Simon Lorrimer-Roberts, Program Management Lead for Data Protection, McAfee
Andrea Zabala, Program Manager, McAfee
Thomas Bryant, Global Pre-Sales Director, McAfee


TRACK 8
Harnessing Insights for Action

It is becoming increasingly obvious that more (threat) intelligence does not equal better security. As a matter of fact, an overabundance of intelligence can harm your risk profile. In a world of criminal AI and spurious correlations, the need for turning wild intelligence into actionable insights is a must. In this track we’ll delve into harnessing your threat intelligence into insights. What makes a good insight that adds true value and can help lower your risk. We’ll look at what McAfee is doing around insights and we’ll demonstrate how to build and present a scorecard of insights. Finally, we’ll explain how insights can make you more meaningful to your board and how they can help you advocate for more resources and money. Join us.


Advances in IT/OT Security and Convergence; The Rise of Digital Twins

The convergence of IT/ OT is real, bringing both challenges and opportunities. This session will discuss advances in IT/OT security, why it is a CxO issue, and how the Digital Twin concept can improve both security and operational performance. Will discuss how products/services from McAfee, Nozomi and Atos can reduce operational and cyber risk.

Session Room: Level 1 - Pinyon 3
Session Code: HIA_151
Session Time: Wednesday, October 2, 2019 at 7:30 AM to 8:20 AM

Mazi Fayazfar, CTO - Telco, Media & Utiities, Atos
John Almlof, Director, Alliances and Business Development, Nozomi Networks

Deep Dive: How to Catch a Spy in Your Network?

Although more than 80% of data leakages are proven to be unintentional, what about the remaining 20%? What a disturbing feeling that someone from your organization is leaking information for different malicious purposes. How to catch a spy in your network? WIth McAfee Pervasive Data Protection solutions set. Learn and see how - in this session.

Session Room: Level 1 - Pinyon 3
Session Code: HIA_149
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Nino Talian, Head of Information Security, King ICT
Filip Kiseljak, Senior Information Security Expert, King ICT

WannaCry in 2019: Changing the Narrative with Global Analytics

In May 2017, WannaCry attacked hundreds of enterprise targets across the globe, with enterprise damage estimates as high as $4B globally by some counts. Many forget that this ransomware attack with record-setting damages began as a targeted attack against healthcare and then manufacturing industries. Learn how to change the narrative for your company if a zero-day attack followed a similar strategy in 2019, using powerful, globally-sourced analytics that help prepare your organization to recognize a campaign targeted at you and your industry, and how to quickly adjust enterprise protection policies – potentially before your team receives its first malware sample or generates an Indicator of Compromise.

Session Room: Level 3 - Juniper 3
Session Code: HIA_197
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Wayne Anderson, Director, Enterprise Security Architect, McAfee
Robert Leong, Director of Product Management, McAfee

Our Big-data Infrastructure: Power of Collective Intelligence

In this session, we will talk about McAfee’s strategy of data gathering and providing insights to the customer from the information gathered from various McAfee products. We'll be showcasing our big-data infrastructure and how you can benefit from it.

Session Room: Level 3 - Starvine 1-2
Session Code: HIA_198
Session Time: Wednesday, October 2, 2019 at 3:40 PM to 4:30 PM

Varun Talreja, Director, Engineering, McAfee
Prashanth Ramagopal, Principal Engineer, McAfee
Prabhat Singh, VP Engineering - Data & Insights, McAfee

Purple Team Diaries: Ask The Experts in Red and Blue Teams

Join experts from the McAfee Advanced Cyber Threat Services (ACTS) team, formerly Foundstone, for an audience-interactive panel discussion and question/answer session on best practices, experiences, and tips and tricks, on both Red Team (offensive/attacker) and Blue Team (defensive/defender) perspectives.

Session Room: Level 3 - Juniper 1
Session Code: HIA_105
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Josiah Inman, Senior Consultant, Incident Response & Threat Research, Mcafee
Jim Olmstead, IR Practice Lead, NA, McAfee
Palaniappan Annamalai, Technical Practice Director, McAfee
Scott Petricig, Prof Services Consultant, McAfee

Mining Malware via PRE; Let Malware Tell You Why It Is Malicious

Black-box machine learning offers few insights and makes failure RCA difficult. Advances in prediction rule ensembles (PRE) offer competitive performance and best-in-class interpretability enabling more informed cybersecurity decision making. This session presents rule ensembles as tools for insight and inference in the evolving threat landscape.

Session Room: Level 3 - Starvine 10-11
Session Code: HIA_96
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Nicholas Smith, Security Researcher, McAfee

Hardware Tampering Security Risks in the Supply Chain

Hardware tampering security risk in the global cyber supply chain is becoming a problem-centered challenge which governments and organizations are currently facing. This paper will try to cover the various sources of attack and recommend ways to mitigate this critical security risk in the global supply chain - from manufacturing to delivery.

Session Room: Level 3 - Juniper 2
Session Code: HIA_66
Session Time: Thursday, October 3, 2019 at 2:30 PM to 3:20 PM

Pipop Nuangpookka, Developer, Marymount University
Zelalem Mengistu, Professional Service Consultant/Security Engineer, McAfee


TRACK 9
Security Management & Collaboration

Your cybersecurity demands with increased threats, pressure for constant compliance and limited staff strongly suggest your need to optimize your security management efforts. Research reveals that organizations cry out for an integrated security platform approach with tools working together to detect faster and remediate more effectively. Your McAfee investment ensures these priorities will be met. In addition, McAfee’s recognizes and supports your transformation into the cloud with the MVISION portfolio. In this track, you will dig deeper into your pursuit to optimize your security management. Gain guidance on better deployment and monitoring. Learn best practices to achieve better visibility and improved response time. Hear from your colleagues using the latest ePO, MVISION ePO and DXL on how these solutions help them achieve operational efficiencies. Become versed on how these critical integrations work for you. Join us to elevate your security management efforts.


Deep Dive: Enterprise ePO, DXL and TIE Infrastructure Designs

This session will take a look at enterprise designs for ePO infrastructures with Data Exchange Layer and Threat Intelligence Exchange and showcase several customer examples of different design strategies for the infrastructure architectures.​ How can you organically transform your current ePO, DXL and TIE infrastructure to include cloud servers located in AWS, AZURE, etc. - a hybrid ePO architecture.

Session Room: Level 3 - Starvine 1-2
Session Code: SMC_37
Session Time: Wednesday, October 2, 2019 at 1:00 PM to 2:15 PM

Steen Pedersen, Principal Architect, McAfee
Peter Simmons, Sales Engineer, McAfee

Remove the Chaos: Automate Your Disaster

During this session Danske Bank will share their journey to achieving faster more productive security incident response and establishing security compliance through automation and integrations of security functions. Session will cover three main topics: - Business case definition for automation and integration - Key automation & integration actions that move the success needle - Key considerations when deciding to automate & integrate

Session Room: Level 1 - Pinyon 3
Session Code: SMC_192
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Aleksei Zjabkin, Head of Infrastructure Security Department, Danske Bank
Nikolai Belstein, Head of Cyber Defence Centre, Danske Bank

Using the OpenDXL Open Broker within AWS for Cyber Security at AT&T

The session will cover how AT&T uses its Data Driven Message Architecture (DDMA) to transport public cloud information. Built on Open DXL, AT&T is using the DDMA message bus to distribute cloud data and react to network observations. The goal of the session will be to explain the role of Open DXL in this message distribution path.

Session Room: Level 3 - Juniper 1
Session Code: SMC_6
Session Time: Wednesday, October 2, 2019 at 2:30 PM to 3:20 PM

Joseph Harten, Director Technology Security, AT&T
Michael Stair, Lead Member of Technical Staff, AT&T

How FedEx is "Shipping" Security Orchestration Automation and Response

Security Orchestration Automation and Response (SOAR) is fast becoming a critical component of mature security operations, with the potential to reduce response times, automate repetitive tasks and make security operations smarter and more measurable. In this session, FedEx and SOAR vendor Siemplify talk through Data Exchange Layer (DXL) integrations to empower orchestration and coordination between McAfee and non-McAfee products, providing a powerful insight into FedEx's SOAR journey.

Session Room: Level 3 - Juniper 2
Session Code: SMC_101
Session Time: Wednesday, October 2, 2019 at 4:40 PM to 5:30 PM

Jovan Scott, Cyber Command Center Manager, FedEx
Meny Har, VP Products, Siemplify
Darren Thomas, Senior Product Manager, McAfee

Tips On Migrating to The New MVISION ePO

Learn from those who walked the MVISION ePO migration journey.  Hear from McAfee and customers Seagate and Farmers Mutual of Nebraska on their migration plans and the best practices to consider when migrating to MVISION ePO and moving your management to the cloud.

Session Room: Level 3 - Juniper 4
Session Code: SMC_103
Session Time: Thursday, October 3, 2019 at 7:30 AM to 8:20 AM

Patrick Wright, Information Security Specialist, Farmers Mutual of Nebraska
Roan Moore, Architect, Seagate Technology
Naveen Chakrapani, Product Manager, McAfee
Art Zeigler, Principal Engineer, McAfee
Michael Moyle, Manager, Software Engineering, McAfee

Deep Dive: Optimizing MVISION Security Integrations with DXL

This session will cover how McAfee enables automation of on-premise products in MVISION ePO via DXL.  Learn how to leverage existing local infrastructure while transitioning management load to the cloud! Get more from your truly integrated platform from the cloud.

Session Room: Level 3 - Juniper 1
Session Code: SMC_156
Session Time: Thursday, October 3, 2019 at 1:00 PM to 2:15 PM

Jon Provancher, DXL Engineering Manager, McAfee
Christopher Smith, Principal Engineer & DXL Architect, McAfee

What's New with ePO?

It's been an incredibly exciting year for McAfee's security platform.  Come talk to the Product Management team and learn what's changed, what's changing, and what's coming to McAfee's Security Management Platform. We'll talk strategy, new capabilities, and how we're shaping management to help secure our customer's environments.

Session Room: Level 3 - Starvine 10-11
Session Code: SMC_42
Session Time: Thursday, October 3, 2019 at 3:40 PM to 4:30 PM

Joseph Petrocelli, Director, Product Management, McAfee
Raghu Nathan Balasubramani, Manager, Software Engineering, McAfee
Derek Watkins, Product Manager, McAfee


TRACK 10
Training

Join us during MPOWER for MVISION training classes now included free with your registration. New this year, training classes will run during MPOWER October 1-3. These classes are available to customers and can be added to your schedule during registration. Seating is limited, and available on a first come, first serve basis. We will be providing Certificates of Completion to each attendee. Attendees can use this to submit for Continuing Education Units(CEUs/CPEs) with their respective certification vendor such as ISC2, CompTIA etc.


OpenDXL Automation Training & Code Camp

Arrive a day early and broaden your McAfee solution expertise by adding OpenDXL code camp training to your MPOWER experience. In this hands-on workshop led by technical experts and community members, you will gain the knowledge and understanding to leverage existing integrations and to create OpenDXL orchestration flows, service wrappers, and clients to support your OpenDXL initiatives. This workshop will be a hands-on walkthrough of creating an OpenDXL Fabric, orchestrating existing tools using OpenDXL Node Red connectors, and developing code/scripts to integrate with OpenDXL, such as those featured at www.OpenDXL.com.

Course Details: This workshop will be very hands-on, and will involve implementing code/scripts to integrate with OpenDXL, such as those featured at www.OpenDXL.com. By attending this course, you will leave with:
  • An understanding of the concepts and possibilities of what can be done with OpenDXL with knowledge of how to implement and modify services & flows created by others
  • Experience integrating with McAfee Threat Intelligence Exchange (TIE), McAfee Active Response (MAR), and 3rd party security tools
  • A strong OpenDXL foundation to build on as you interact with the community and best practices for building your own enhancements
Who Should Take This Class: Session participants should come with a desire to learn the fundamentals of working with OpenDXL and how leveraging OpenDXL can simplify the process of automating interactions between several products. Basic scripting skills are required for configuring and modifying flows. Please note that students are responsible for bringing their own laptop to class to access the lab materials.

Session Room: Level 3 - Starvine 3-4
Session Code: DXL
Session Time: Monday, September 30, 2019 at 8:30 AM to 5:00 PM

Ted McDonald, DXL & OpenDXL Founder, McAfee
Viji Krishnaprasad, DXL & OpenDXL Founder, McAfee

Thinking Red, Acting Blue – Defending Your Organization Through Adversary Emulation with McAfee ATR and the SecOps Team

Join the McAfee ATR and the SecOps Engineering team in the very first Defend the Flag (DTF) competition debuting at MPOWER 2019. In this 2 part session, you’ll have a chance to learn the Tactics, Techniques and Procedures (TTPs) of advanced adversaries like APT29 from the hand of our world-known ATR researchers and red teamers, followed by a practical session delivered by our top security engineers and blue teamers on what are the key winning techniques you can implement with McAfee Endpoint and SecOps products to implement effective security architectures and controls.

In the second part of this session, you’ll form and join a blue team (up to 5 participants) and compete in our new Defend the Flag (DFT) game, a hands-on interactive exercise, to defend an organization against a real-world adversary like APT29. Through simulated attacks and scenarios based on the MITRE ATT&CK framework, the participants will leverage a combination of McAfee solutions and best of breed open source tools to prevent, detect, triage, investigate and hunt for the presence of the adversary. Players will practice their security skills through a series of questions and challenges of varied difficulty, from basic to advanced, and earn points in our interactive scoreboard for prizes, unique swagger and bragging rights.

Anyone can participate and learn! SOC managers, analysts, incident responders, and other general security practitioners are encouraged to join us in this fun DTF designed to accommodate all levels of expertise: from the junior analyst to the expert one. Join us for a FULL day on Monday, September 30 (9:00AM - 5:30PM) and compete to the be winner of the 1st ever McAfee MPOWER Defend the Flag!

Join us for a FULL day on Monday, September 30 (9:00AM - 5:30PM) and compete to the be winner of the 1st ever McAfee MPOWER Defend the Flag!

ATTENDEE REQUIREMENTS: General security knowledge, including working knowledge of security tools and investigations, Laptop computer equipped with WIFI - Laptops will not be provided.
Space is limited. Pre-registration required.

Session Room: Level 3 - Starvine 1-2
Session Code: PRE_1
Session Time: Monday, September 30, 2019 at 9:00 AM to 5:30 PM

Eamonn Ryan, Red Team Researcher, McAfee ATR Team
Hector Raul Juarez, Sr. Security Engineer, McAfee SecOps Team
Leandro Pineda, Software Engineer, McAfee SecOps Team
Marc Rivero Lopez, Threat Researcher, McAfee
Ismael Valenzuela, Sr. Principal Engineer, McAfee
Cedric Cochin, Sr. Principal Engineer, McAfee
Diego Provinciani, Software Engineer, McAfee

MVISION Cloud for MPOWER

This presentation will introduce McAfee MVISION Cloud. Topics covered will include the security concepts and practices required to ensure protection of a corporate environments from data loss in the cloud and protection from shadow it. The presentation will provide a walkthrough of a company’s cloud journey which will discuss the steps to establishing a secure cloud environment. The critical terms and architecture used in an MVISION Cloud implementation will be discussed. Finally, practical use cases showing the application of the MVISION Cloud in a customer environment using Microsoft Office 365 will be provided. Use cases and hands on activities using MVISION Cloud and Office 365 will be covered for Data Loss Prevention, Access control, email and activity monitoring (Shadow iT), and threat protection. This session is intended to last 4 hours. We will be providing Certificates of Completion to each attendee. Attendees can use this to submit for Continuing Education Units(CEUs/CPEs) with their respective certification vendor such as ISC2, CompTIA etc. Amount of units may vary by certifying body.

Session Room: Level 1 - Pinyon 6
Session Code: MVC
Session Time: Tuesday, October 1, 2019 at 8:00 AM to 12:00 PM
Session repeats: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM, Wednesday, October 2, 2019 at 1:00 PM to 5:00 PM, Thursday, October 3, 2019 at 1:00 PM to 5:00 PM


MVISION ePO for MPOWER

The McAfee® MVISION ePO Overview course from Education Services provides attendees with basic knowledge to support McAfee MVISION ePolicy Orchestrator (MVISION ePO) software. In addition, students will learn the benefits of running MVISION ePO in their environment, basic configuration and best practice information, as well as Protection Workspace functionality. This course combines lectures and practical lab exercises, with hands-on interaction with the MVISION ePO user interface. This course is approximately four hours in length. We will be providing Certificates of Completion to each attendee. Attendees can use this to submit for Continuing Education Units(CEUs/CPEs) with their respective certification vendor such as ISC2, CompTIA etc. Amount of units may vary by certifying body.

Session Room: Level 1 - Pinyon 7
Session Code: MVE
Session Time: Tuesday, October 1, 2019 at 8:00 AM to 12:00 PM
Session repeats: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM, Wednesday, October 2, 2019 at 1:00 PM to 5:00 PM, Thursday, October 3, 2019 at 1:00 PM to 5:00 PM



Targeted Group Meetings

Targeted Group Meetings

Arrive early to participate in the very popular Targeted Group Meetings (TGMs)! The meetings are built around specific topics and are designed to allow you to network with your peers and to meet directly with key product managers, engineers and developers. You’ll learn what’s on deck at McAfee, get hands on with product prototypes and hear what the future may hold. This is your chance to learn from your peers and offer your insights to help mold the future of McAfee. These targeted sessions will be offered at MPOWER 19 on Tuesday, October 1.


TGM: Endpoint Defenses United - Strategies for Aligning EDR, Endpoint Security and More

Endpoint, EDR, Servers, Mobile and IoT device security - they were all once separate security discussions, tools and strategies that are all meeting at a growing cross-roads. The need to work against increasingly sophisticated threats and the need for better visibility through an elevated view of the attack surface are rapidly changing that. Join us for a look at why these controls are converging, how to adopt an inclusive - not exclusive strategy and best practices for leveraging cloud-native tools that make you more operationally efficient.

Session Room: Level 1 - Pinyon 3
Session Code: TGM_300
Session Time: Tuesday, October 1, 2019 at 8:30 AM to 12:30 PM

Ratnesh Saxena, Director, Product Management, McAfee
Nazanin Hoglund, Director, McAfee
Trey Wafer, Group Product Manager, McAfee
Briana Farro, Global Tech Director, Endpoint, McAfee
Nathan Jenniges, Sr. Director Product Management, McAfee
Grant McDonald, Sr Marketing Manager, Endpoint, McAfee

TGM: Data Exchange Layer (DXL)

Join us. Learn exciting news on DXL, the most compehensive and open communication fabric for cybersecurity.  Hear from your peers on how they are harnessing the power of DXL to share and streamline their cybersecurity . Learn how to deploy DXL in minutes. Gain additional insight on the magic that DXL brings to your McAfee deployment.  See new updates on DXL. Offer direction for future DXL.  Embrace the DXL motion--create one, resuse everywhere!

Session Room: Level 1 - Pinyon 8
Session Code: TGM_302
Session Time: Tuesday, October 1, 2019 at 8:30 AM to 12:30 PM

Christopher Smith, Principal Engineer & DXL Architect, McAfee
Darren Thomas, Senior Product Manager, McAfee
Kathy Trahan, Senior Product Marketing, McAfee
Don Hanson, Sr Director Engineer, McAfee

TGM: Network Security Platform - What’s New, Roadmap, and Strategy

Security is more critical than ever as networks become faster and more complex. McAfee is evolving its Advanced Intrusion Detection and Prevention platform to better inspect and protect your systems today, and provide flexibility to adapt and grow to match future requirements. 

Session Room: Level 1 - Bluethorn 6
Session Code: TGM_306
Session Time: Tuesday, October 1, 2019 at 8:30 AM to 12:30 PM

Ryan Wuensch, Global Technical Director, Network, McAfee
Sadik Al Abdulla, VP, Product Management, McAfee
Shishir Singh, SVP, Engineering, McAfee
Manikandan Kenyan, Principal Engineer, McAfee

TGM: The Real Value of SIEM with McAfee Enterprise Security Manager (ESM)

McAfee ESM is a security information and event management (SIEM) solution that delivers actionable intelligence and integrations to prioritize, investigate, and respond to threats.  In this meeting, ESM customers and prospects will get a review of recent enhancements made, run through a detailed threat hunting tutorial led by SMEs, gain a better understanding regarding the use of ESM and EDR technologies together, run through a showcase implementation, and have the opportunity to provide feedback and gain insight into the ESM roadmap. 

Session Room: Level 1 - Bluethorn 8
Session Code: TGM_308
Session Time: Tuesday, October 1, 2019 at 8:30 AM to 12:30 PM

Scott Durrant, Product Manager, McAfee
Adam Rocker, Product Manager, McAfee
Terry Stuart, Global Technical Director, Security Operations, McAfee
Dave Bull, Product Marketing Director, McAfee
Ismael Valenzuela, Sr. Principal Engineer, McAfee
Richard Hart, Enterprise Technology Specialist, McAfee

TGM: Uncover the Buried Treasures in Your Security Solutions

Security is not a one size fits all. Domain experts from the Customer Success Group (CSG) will break down persistent security challenges, reveal tips and tricks you can easily implement, and examine how others are optimizing their McAfee solutions to achieve optimum health.  We’ll unearth these assets so you can:  • Hear about security gaps to improve your security operations  • Learn best practices to effectively prepare and respond to an attack • Discover tools and training at your fingertips to manage solutions and build skillsets • Find out how to fully embrace your solutions to improve product adoption

Session Room: Level 1 - Bluethorn 9
Session Code: TGM_310
Session Time: Tuesday, October 1, 2019 at 8:30 AM to 12:30 PM

Riana Smalberger, Global Foundstone Practice Director, McAfee
Aneel Jaeel, SVP, Customer Success Group, McAfee
James Fraley, Director, Security Service Strategy, McAfee
Zachary Krider, Enterprise Architect, McAfee
Bill Watson, VP, CSG Product Management and Operations, McAfee
Kuldeep Chaudhari, Vice President Enterprise Support, McAfee
Susan Ellefson, Sr. Director, Education Services, McAfee

TGM: McAfee MVISION EDR-From Fog to Visibility

Hear from our experts including Product Management and Incident Responders about MVISION EDR and how incorporating the MITRE™ ATT&CK Framework with AI guided investigations quickly provides insights and visibility into what alerts really matter.  During this session we will discuss how MVISION EDR has been embraced by the analyst community, where we are going next and how to leverage AI Guided Investigations.

Session Room: Level 1 - Pinyon 3
Session Code: TGM_301
Session Time: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM

Ratnesh Saxena, Director, Product Management, McAfee
Randy Kersey, Product Manager, McAfee
Jay Goodman, Product Manager, McAfee

TGM: ePolicy Orchestrator (ePO)

Join us to hear exciting news on ePO!  Hear from your ePO peers on how they are harnessing the power of ePO. Gain insight on how to optimize your ePO experience. See new updates to ePO. Offer direction for future ePO.  The industry-acclaimed McAfee ePO is a topic you don't want to miss.

Session Room: Level 1 - Pinyon 8
Session Code: TGM_303
Session Time: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM

Joseph Petrocelli, Director, Product Management, McAfee
Naveen Chakrapani, Product Manager, McAfee
Briana Farro, Global Tech Director, Endpoint, McAfee
Kathy Trahan, Senior Product Marketing, McAfee

TGM: McAfee's Hidden Gems

Want to know more about Encryption, ATD, MACC and CWS-MVC convergence?  Please join our session and hear from McAfee product experts on the latest features these products offer.   1:00 - 2:10 pm Encryption 2:15 - 3:25 pm ATD 3:30 - 4:25 pm MACC 4:30 - 5:00 pm CWS-MVC

Session Room: Level 1 - Bluethorn 8
Session Code: TGM_305
Session Time: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM

Danny Manuel, Product Manager, McAfee
Gary Ulaner, Group Product Manager, McAfee
David Webb, Director of Engineering, McAfee
Jay Goodman, Product Manager, McAfee
Benjamin Ellis, Advanced Technical Support Engineer, McAfee
Dominick Paynter, Enterprise Architect, McAfee

TGM: McAfee Web Protection

A great opportunity to meet with McAfee Web Protection team to see the latest features and demos, and have in depth discussions with the Web core team on any issues and trends. 

Session Room: Level 1 - Bluethorn 7
Session Code: TGM_307
Session Time: Tuesday, October 1, 2019 at 1:00 PM to 5:00 PM

Michael Schneider, Lead Product Manager, McAfee
Cindy Chen, Sr. Product Marketing Manager, Data Protection, McAfee


CPE Credits for MPOWER 19

CPE Credits for MPOWER 19 (ISC)2® Type "A" CPEs are awarded to (ISC)2® members for activities which are directly related to the Domains of the CISSP.

CPEs are awarded at the rate of one CPE per hour of activity for information security events. As an official (ISC)2® CPE Submitter, McAfee can submit CPEs for you after MPOWER 19. Please provide your (ISC)2® member number and your first and last name to pam_granlund@mcafee.com, and your CPEs will be submitted to (ISC)2®. The cut-off to submit through McAfee is November 14, 2019.

MPOWER ATTENDEES: Create your Own Agenda

If you have already registered - Create your Own Agenda Here and map out your daily schedule of sessions and events you most want to attend through the MPOWER 19 My Event site by entering your registration login information and then clicking on "My Schedule" to create your personalized agenda.

When the Mobile App is available, you will be able to view your agenda on your mobile device.