Chicago Virtual Cybersecurity Summit 2020
The Chicago Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Thu. Apr 30
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated 9:00 am
Presented by Avanan
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 9:25 am
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Threat Hunting & Modern Security: 3 Fundamental Flaws: 9:50 am
Presented by CriticalStart
Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Achieving Secure Remote Access with RDP 10:30 am
Presented by Axis Security
What is RDP and how you can avoid the risks involved when giving your users access.
Developing Your Identity Strategy 10:55 am
Presented by SailPoint
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Jerod walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Cybercrime, Inc: The Business of the Dark Web 11:20 am
Presented by Armor
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
The session aims to expose the inner workings and business of the cyber underground, focusing on the following:
- Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
- Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
- Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
- How businesses can protect themselves from all levels of cybercriminals
- Morning Q&A Session
The Secret Service’s Network of Cyber Fraud Task Forces 12:10 pm
Presented by United States Secret Service
Pat Hogan, Assistant Special Agent in Charge – US Secret Service – Chicago will discuss the Secret Service’s role in the prevention and investigation of transnational cybercrime including trends observed by law enforcement and how they work with the private sector to be more prepared to respond to a cyber-incident.
Special Agent Hogan will also cover:
- The Secret Service’s network of Cyber Fraud Task Forces (formerly known as Electronic Crimes Task Forces).
- Trends in Business Email Compromise, Ransomware, e-skimming & COVID-19 Fraud schemes.
- Best Practices and frameworks including guidance from CISA and NIST as well as Presidential Policy Directive 41 “United States Cyber Incident Coordination”.
Transforming and Modernizing Your Security Posture 1:20 pm
Presented by Pure Storage
In the new world of a nearly 100% remote workforce, security, now more than ever, is a challenge. As our workforce evolves, so do attackers, and the attacks they employ to steal corporate secrets or personal information from our users. As security professionals, our #1 job is to protect the digital assets of our company and its stakeholders. That means, as attackers evolve so must our information security practices. Our once well-defined and defended borders are no longer in place. The endpoints we had full control over and visibility into are now distributed and users may very likely be working from personal devices as well. Having centralized control to get insights is no longer reality. All of this means we have to evolve and transform the way we think about or security programs.
In this presentation, Andy will discuss how to modernize your security program using his five step security transformation framework that has been successfully implemented at multiple, very large, global organizations.
Stopping Attacker Movement Before They Reach Crown Jewels 1:45 pm
Presented by Illusive
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale. The giant, sudden transition by millions of employees to working from home has only made the attack surface even more volatile.
In this webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels including:
- How normal business activity creates dangerous opportunities for malicious lateral movement
- The cyber hygiene functions needed to harden the network against modern APT attacks
- How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
Securing Remote Workers: Scaling Remote Access and Security for All Employees 2:10 pm
Presented by Netskope
Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?
Attend this session about securing remote workers and you will learn:
- How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
- About the differences between various remote access architectures
- How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
Continuous Vulnerability Management: Striving for a 14-Day SLA 2:50 pm
Presented by Ivanti
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.
Vision of Cyber Security 3:15 pm
Presented by Check Point Software Technologies
We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business process with higher efficiency.
This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.
- Afternoon Q&A Session
- Closing Session