Event Schedule

  • Managing Digital Risk in Transformative Times 9:45 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Improving Security for Remote Working: 13 Key Recommendations 10:15 am

    Presented by Mimecast

    Many organizations are in the middle of a work from home (WFH) trial by fire. What are the security implications of this abrupt change? What are some key security best practices that have become clear during this time? Even after this current pandemic recedes it is fair to assume that WFH is now firmly part of the business continuity new normal. In rapid fire form, this session will provide 13 key recommendations that you can apply now and into the future to improve the security of your WFH program.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 11:00 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Break
  • The Linkages Between Cyberspace and Physical Systems and Reducing Those Vulnerabilities. Resilience Is Just as Important As Defense. 11:45 am

    Presented by United States Department of Homeland Security

    The DHS-CISA will provide an in-depth analysis of securing IT assets and maintaining operational capabilities

    Click to Expand

    Speaker:

    Ron Ford
    Ron Ford

    Ron Ford

    Region 1 Cybersecurity Advisor - CISA

    Collapse This Item

  • Break
  • Best Practices: PAM Security and Data Privacy 1:25 pm

    Presented by BeyondTrust

    The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your organizations unique risk appetite and tolerance can help guide decisions made to secure privileged accounts. Gartner lists Privileged Access Management (PAM) as the #1 security project for CISO’s in 2020.

    Click to Expand

    Speaker:

    Collapse This Item

  • The Evolution of Zero Trust in a New Age of Security 1:55 pm

    Presented by Check Point Software Technologies

    As we shift our focus from the data center to the cloud and containers, it is important to keep the Zero-Trust security model in mind. Hear how to make sure the new frontier of cloud, SaaS applications, and serverless functions are staying just as secure as your Datacenter with Check Point.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Creating Your Defense Plan Against IoT Security Threats 2:35 pm

    Presented by Verkada

    Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.

    In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.

    Click to Expand

    Speaker:

    Collapse This Item

  • Security Without Compromise: A Key Requirement for the Modern Security Architecture 3:00 pm

    Presented by Menlo Security

    Companies are moving to cloud architectures to simplify network management.

    For network administrators, securing web, email, and data access is a major concern – 92% of attacks come from email and 6% of attacks from web browsing. No organization is immune and the cost of remediation averages $4M per incident.

    Admins often try a myriad of solutions to prevent network attacks, such as firewalls, sandboxing, or anti-virus scanners. Unfortunately, these solutions either severely restrict web access which lowers worker productivity or rely on detecting threats that have already entered the network.

    Cloud-based isolation helps network administrators provide the advantages of moving their network to a cloud architecture without compromising safety. Cloud-based isolation technology prevents malware and phishing attacks through web and email while also improving SaaS apps usage and end-user browsing.

    Click to Expand

    Speaker:

    Ryan Malley
    Ryan Malley

    Ryan Malley

    Solutions Engineer

    Collapse This Item

  • Summit Closing
Partners