Virtual Summit
Los Angeles Virtual Cybersecurity Summit
The Los Angeles Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Apr 02
Event Schedule
-
Prevention in a Work from Home World 9:00 am
Presented by Morphisec
The recent shift towards work from home environments is met with a host of security challenges. The loss of enterprise network controls and the use of personal computers for business tasks are just a couple of examples of how this “new normal” is creating an increased security risk. A renewed focus on prevention may hold the answer. Endpoint security architecture can be broken down into three main elements: Prevention, Detection, and Remediation. Prevention should be considered the most strategically important defense element, as by default time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential. This is especially true in the work from the home world we live in, where we have to rely on endpoint controls and detection and remediation are even more challenging.
Speaker:
-
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated 9:30 am
Presented by Avanan
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Speaker:
- Break
-
Risk Exchanges: The Key to Vendor Risk Management Efficiency 10:30 am
Presented by Onetrust Vendorpedia
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
Key Takeaways:
- Understand third-party risk management trends and challenges
- Gain actionable insights on how to monitor third-party risks and performance
- Learn the benefits of a third-party risk exchange
- See how you can protect against third-party threats such as data breaches, etc
Speaker:
-
Protect Your Environment from Cyber Attacks with Advances in Network Analytics, ML, and AI 11:00 am
Presented by ARIA Cybersecurity Solutions
Despite their best efforts, organizations continue to struggle to detect and stop a wide range of cyber-attacks. These can include everything from ransomware attacks to intrusions that can lead to the costly exposure of critical data. Why is this? One reason is that organizations typically lack any visibility to these attacks as they move east-west across their network, which could leave them blind on up to 80% of their threat surface. Additionally, our industry built detection tools on the premise that detection tools should be “dumb,” and therefore, the people who use them must be experts – who are available 365×7 to use them properly. Shouldn’t it be the other way around, where the tools are smart and do the work of the experts? Let us show you how to make your threat detection and investigation simpler, faster, much more effective leveraging the latest advances in AI, ML and automation.
Speaker:
- Break
-
Convergence of Cyber and Physical Risks 11:50 am
Presented by Facebook
How cyber risks impact traditional corporate security programs and the protection of employees
Speaker:
- Break
-
Real Talk on Ransomware 12:50 pm
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. Join us for a unique perspective on how organizations can prepare for and defend against ransomware attacks.
Speaker:
-
Our Role in Responding to Financial Threats During the COVID-19 Virus 1:20 pm
Presented by United States Secret Service
The U.S. Secret Service’s role in defending our critical financial infrastructure. Also, we will discuss our role in responding to financial threats during the COVID 19 virus.
Speaker:
-
Securing Remote Workers: Scaling Remote Access and Security for All Employees 2:00 pm
Presented by Netskope
Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?
Attend this session about securing remote workers and you will learn:
- How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
- About the differences between various remote access architectures
- How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
Speaker:
- Break
-
Stopping Attacker Movement Before They Reach Crown Jewels 2:50 pm
Presented by Illusive
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale. The giant, sudden transition by millions of employees to working from home has only made the attack surface even more volatile.
In this webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels including:
- How normal business activity creates dangerous opportunities for malicious lateral movement
- The cyber hygiene functions needed to harden the network against modern APT attacks
- How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
Speaker:
-
What the CCPA Means For Your Security Program 3:20 pm
Presented by Spirion
This presentation describes the many cyber security requirements of the California Consumer Privacy Act and offers insights into effectively meeting them in advance of the July 1, 2020 deadline. Included is an analysis of additional requirements recently published by the California Attorney General.
Speaker:
-
Securing the Tsunami of Unmanaged and IoT Devices 3:40 pm
Presented by Armis
There’s a virtual tidal wave of smart, connected devices sweeping across businesses in every industry. Whether they’re things you’re already aware of like smart TVs, patient infusion pumps, and manufacturing robotic arms, or ones flying under your radar like printers, smartwatches, and digital assistants, your traditional security products can’t see these devices, making them ideal targets for attacks. The threats are real and all over today’s news, as we’re seeing stories published all the time about the risks these devices pose as attackers have been focusing their efforts on these devices as an easy way to penetrate networks undetected. Join us as we explore the growth of unmanaged, un-agentable devices, including examples of real-world attacks, and issues you should consider to help fill the gaps left by traditional security architectures.
Speaker:
- Solution Showcase Open til 5pm