Event Schedule

  • Managing Digital Risk in Transformative Times 9:35 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Panel Participants:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Rethinking Network Security: The Future and Why 10:00 am

    Presented by Check Point Software Technologies

    In order to deliver cyber security with Cloud, IOT and all of the infrastructure diversity challenges we will continue to face, we need a new approach. In this session we will discuss how we arrived here and what direction we need to head in order to conquer the challenges of tomorrow.

    Click to Expand

    Speaker:

    Joel Hollenbeck
    Joel Hollenbeck

    Joel Hollenbeck

    Office of the CTO

    Collapse This Item

  • Break
  • Continuous Vulnerability Management: Striving for a 14-Day SLA 10:45 am

    Presented by Ivanti

    The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.

    Click to Expand

    Speaker:

    Chris Goettl
    Chris Goettl

    Chris Goettl

    Director of Product Management, Security

    Collapse This Item

  • Morning Q&A Session
  • Q&A with DHS-CISA 11:45 am

    Presented by United States Department of Homeland Security

    Speaker:

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Collapse This Item

  • Break
  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 1:00 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • How to Counter Data Theft by Eliminating the Insider Threat 1:25 pm

    Presented by Tenfold

    Insider threats are among the top IT security risks organizations today must brace for. Conventional security measures typically focus on external attacks, but do not provide protection against attacks from potential internal perpetrators. Simon Cuthbert, responsible for International Business Development at tenfold, will demonstrate why you must never underestimate the threat from within and how you can use identity and access management to minimize the risk of insider threats in your company.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Decade of the RATs: Corporate Espionage Attacks by Chinese APTs 2:15 pm

    Presented by Blackberry, Trace3

    Did you know five APT groups performed a decade of cross-platform cyber espionage attacks targeting Linux servers to steal corporate intellectual property?  Linux runs nearly all of the top 1 million websites online, 75% of all web servers, 98% of the world’s supercomputers and 75% of major cloud service providers. In this session, Chris Pittman will share how these APTs leveraged the “always on, always available” nature of Linux servers to establish a “beachhead for operations” across a wide swath of targets.

    Click to Expand

    Speaker:

    Collapse This Item

  • Afternoon Q&A Session
  • Closing Session
Partners