Virtual Summit
Virtual Detroit Cybersecurity Summit 2020
The Detroit Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Tue. Apr 14
Event Schedule
-
Public Cloud Security Challenges: Why They’re Different and How to Overcome Them 9:05 am
Presented by Check Point Software Technologies
Public cloud security can seem like a massive undertaking. Organizations are being bombarded with news stories related to data breaches and other public cloud security issues. Many organizations are either choosing to wait or facing common challenges as they enter the world of public cloud. In this talk I will cover some of the common security concerns that exist when moving to the public cloud and how they can be overcome.
Speaker:
-
Real Talk on Ransomware 9:30 am
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. Join us for a unique perspective on how organizations can prepare for and defend against ransomware attacks.
Speaker:
-
How to Counter Data Theft by Eliminating the Insider Threat 9:50 am
Presented by Tenfold
Insider threats are among the top IT security risks organizations today must brace for. Conventional security measures typically focus on external attacks, but do not provide protection against attacks from potential internal perpetrators. Simon Cuthbert, responsible for International Business Development at tenfold, will demonstrate why you must never underestimate the threat from within and how you can use identity and access management to minimize the risk of insider threats in your company.
Speaker:
- Break
-
Continuous Vulnerability Management: Striving for a 14-Day SLA 10:30 am
Presented by Ivanti
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
Speaker:
-
Managing Digital Risk in Transformative Times 11:00 am
Presented by RSA
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Speaker:
- Cybersecurity 11:30 am
- Break
-
Cybersecurity Evolved 12:40 pm
Presented by Sophos
Organizations here in the US face a pretty immense challenge when it comes to cybersecurity. Doing more of the same is clearly not the answer. Instead we need to evolve our approach and move to cybersecurity as a system Active adversaries combine advanced attack techniques with interactive, hands-on hacking to increase their rate of success. They paralyze organizations and leaving them hostage to crippling ransoms.
Just as threats have evolved, so has cybersecurity. In the past you just needed to stop an individual threat. And this led to the cybersecurity approach where we had point products to stop individual, point attacks. Today we now have to disrupt the whole attack chain. Which means we have to evolve from point security products to cybersecurity as a system
Speaker:
-
A Centralized Identity Strategy Using Standards Helps Minimize Threats 1:15 pm
Presented by Auth0
Modern architectures continue to become more distributed and fractured. How can developers can continue to develop and build what they understand without having to become identity experts? How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.
Speaker:
-
Why Is the Cybersecurity Market Shifting to Endpoint Detection and Response Platforms? 1:45 pm
Presented by DPI, Fortinet
During the past ten years there has been a gradual shift in technology from traditional antivirus solutions to endpoint detection and response platforms. Why do so many customers remain on traditional antivirus platforms and why hasn’t the EDR market grown faster? What are some questions I can ask when evaluating EDR vendors? I’ll use my background and history in the cybersecurity industry to answer these questions and more.
Speaker:
- Break
-
Developing Your Identity Strategy 2:25 pm
Presented by SailPoint
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Jerod walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Speaker:
-
Stop Staring at the Screen – Use Decision Automation to Propel Security Operations 3:00 pm
Presented by Respond Software
As the number and complexity of cyber-attacks continues to escalate, it is clear that historical approaches to security operations are no longer enough. Enterprises must embrace innovation to drive secure value to their organization with automation. The latest buzzword in the security lexicon, automation has been hailed as the key to fundamentally alter how we manage, analyze and execute.
There is no automation without data.
Nowhere is this truer than in security operations. The foundation of detection and response initiatives, volumes of granular sensor data are analyzed by teams of security analysts to lower the chance that an attacker will slip through the cracks. Yet, there are still plenty of big hurdles to clear.
In this session, Tom Ryan, solutions architect at Respond Software, will introduce Robotic Decision Automation and how it is being applied to security operations centers with amazing results. Participants will learn from real customer examples on this industry-leading approach to security automation.
Speaker:
-
How’s Your Cloud Posture? 3:25 pm
Presented by Trend Micro
Something that either gets overlooked quite often or is a last thought is how close are you architecting your cloud infrastructure to the cloud providers best practice model?
While cloud computing brings an increase in automation; security, compliance, and operations teams now require greater visibility of all the moving parts across their infrastructure and platforms. This increase in complexity can result in cloud-related security incidents due to misconfigurations. What’s more, it can leave DevOps and cloud security teams with a trail of unmanaged risk across multi-cloud environments, in addition to performance, compliance, and visibility concerns. This creates the perfect storm to impact the business’ reputation and bottom line.
What should a Cloud Security Posture Management solution do for you?
Speaker:
- Closing Session