Virtual Summit
Louisville Virtual Cybersecurity Summit
The Louisville Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Apr 23
Event Schedule
-
Managing Digital Risk in Transformative Times 9:35 am
Presented by RSA
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Panel Participants:
-
Rethinking Network Security: The Future and Why 10:00 am
Presented by Check Point Software Technologies
In order to deliver cyber security with Cloud, IOT and all of the infrastructure diversity challenges we will continue to face, we need a new approach. In this session we will discuss how we arrived here and what direction we need to head in order to conquer the challenges of tomorrow.
Speaker:
- Break
-
Continuous Vulnerability Management: Striving for a 14-Day SLA 10:45 am
Presented by Ivanti
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
Speaker:
- Morning Q&A Session
- Q&A with DHS-CISA 11:45 am
- Break
-
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 1:00 pm
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Speaker:
-
How to Counter Data Theft by Eliminating the Insider Threat 1:25 pm
Presented by Tenfold
Insider threats are among the top IT security risks organizations today must brace for. Conventional security measures typically focus on external attacks, but do not provide protection against attacks from potential internal perpetrators. Simon Cuthbert, responsible for International Business Development at tenfold, will demonstrate why you must never underestimate the threat from within and how you can use identity and access management to minimize the risk of insider threats in your company.
Speaker:
- Break
-
Decade of the RATs: Corporate Espionage Attacks by Chinese APTs 2:15 pm
Presented by Blackberry, Trace3
Did you know five APT groups performed a decade of cross-platform cyber espionage attacks targeting Linux servers to steal corporate intellectual property? Linux runs nearly all of the top 1 million websites online, 75% of all web servers, 98% of the world’s supercomputers and 75% of major cloud service providers. In this session, Chris Pittman will share how these APTs leveraged the “always on, always available” nature of Linux servers to establish a “beachhead for operations” across a wide swath of targets.
Speaker:
- Afternoon Q&A Session
- Closing Session