Event Schedule

  • Reducing Friction and Managing Remote Work Environments 8:40 am

    Presented by Automox

    The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.

    During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.

    Click to Expand

    Speaker:

    Richard Melick
    Richard Melick

    Richard Melick

    Sr. Technical Product Manager

    Collapse This Item

  • Threat Intelligence and Layered Security in the Modern Era 9:00 am

    Presented by Sentinel IPS

    The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll use real-world examples to show how it can even improve a network’s defenses at the perimeter while saving your analyst’s time.

    Click to Expand

    Speaker:

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Collapse This Item

  • Threat Hunting & Modern Security: 3 Fundamental Flaws 9:35 am

    Presented by CriticalStart

    Security Operations is a discipline continuously evolving – with the evolution of tools and processes , there are still 3 fundamental flaws that exist with Modern Security Operations.  We will examine 3 specific flaws of modern security operations:

    • Risk Acceptance
    • SOC Alert Overload
    • Inability to mitigate all Zero-Day Attacks.

    We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?”  We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.

    Click to Expand

    Speaker:

    Jim Rohde
    Jim Rohde

    Jim Rohde

    Director of Security Engineering

    Collapse This Item

  • TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments 9:55 am

    Presented by OneTrust Vendorpedia

    You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.

    As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.

    Key points:

    • How you can save hours on vendor risk assessments
    • How you can leverage inherent risks and tiered assessments
    • How Cyber Risk Exchanges are reinventing the assessment process
    Click to Expand

    Speaker:

    Collapse This Item

  • Q&A: Managing All Types of Risk in Today's Cybersecurity Landscape
  • A Modern Approach to Deception 10:55 am

    Presented by Attivo Networks

    Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm on the attacker to be perfect or be detected. History and experience have shown us that human attackers can bypass next-gen perimeter and endpoint controls. Threat deception provides early detection of external, insider, and 3rd party attackers – protecting against new types of Active Directory attacks, delivering actionable alerts, strengthening overall defensive posture, while being simple to deploy and maintain with a small staff. Whether your organization is a Fortune 10 or one with less than 1000 employees, organizations across the globe are deploying modern Attivo Deception both on-prem and the cloud as a proactive measure to combat cyber criminals.

    Click to Expand

    Speaker:

    Jonathan Randall
    Jonathan Randall

    Jonathan Randall

    Regional Manager

    Collapse This Item

  • The Importance of Having a Robust and Comprehensive Data Protection Strategy 11:15 am

    Presented by Pure Storage

    Data protection is experiencing a resurgence.  Historically its been seen as an innovation backwater and as “insurance”, but with the growth of ransomware and cyber crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack.  Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • The 8 Biggest Cyber Threats of 2020 11:35 am

    Presented by United States Department of Homeland Security

    Over the past several months, the cyberthreat landscape has evolved at an alarming rate.  New threats, combined with thoughtful rehashing of some tried-and-true screams have sprung up anew, and increased in ernest.  Join Region VII Cybersecurity Advisor Geoffrey Jenista, from the Department of Homeland Security Cyber Infrastructure Security Agency (DHS-CISA), as he expands upon these trends with current case studies and the most recent updates from the ‘front lines’ of our nation’s cyber warfare.

    Geoff will expand beyond the standard explanation of CISA’s mission and offerings to help KC & Omaha Virtual Cybersecurity Summit attendees understand the stories behind the headlines. He’ll share details on operations, trends and CISA’s thinking on what organizations need to to be best prepare their systems and staff for the 2020 cybersecurity landscape.

    Click to Expand

    Collapse This Item

  • Lunch Break
  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 12:40 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 1:00 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Q&A: WFH2020 - Cybersecurity Surviving & Thriving Amid the Pandemic
  • Learn About the Threat Landscape & Current Trends in 2020 1:45 pm

    Presented by CrowdStrike

    The purpose of this brief is to provide a threat intelligence review of the most current threat actor trends across both eCrime and nation-state adversaries. This brief will cover changes in tactics, techniques, and procedures (TTPs), how ransomware is continuing to evolve, as well as a review of how threat actors are exploiting current worlds events (such as COVID-19). Additionally, this presentation will include use cases around how organizations can operationalize threat intelligence in order to empower a more defensible environment within their organizations.

    Click to Expand

    Speaker:

    Jason Rivera
    Jason Rivera

    Jason Rivera

    Director Strategic Threat Advisory

    Collapse This Item

  • Three Things You Need to Know About New CCPA Regulations 2:20 pm

    Presented by Spirion

    This presentation describes the many cyber security requirements of the California Consumer Privacy Act and offers insights including an analysis of additional requirements recently published by the California Attorney General.

    On March 11, 2020, the California Attorney General issued another set of revisions to the California Consumer Privacy Act of 2018 regulations.  Updates include guidance on IP addresses, privacy policy disclosures, and denying deletion requests.  While the regulations address many questions, they still leave much unanswered, and privacy/security professionals need clarity.  In this interactive presentation, a data protection industry veteran will offer perspective on the Regulations and three ways professionals can hedge their compliance bets ahead of the deadline.

    Takeaways include:

    • Understand the most pressing elements of the Regulations
    • Learn how to prioritize and rationalize your compliance efforts
    • How to leverage your efforts in advance of CCPA 2.0
    Click to Expand

    Speaker:

    Scott Giordano
    Scott Giordano

    Scott Giordano

    VP and Sr Counsel, Privacy & Compliance

    Collapse This Item

  • Taming the IAM Beast: 7 Steps to Embracing IAM Complexity That Will Transform Your Identity Program 2:40 pm

    Presented by IDMWorks, Auth0

    Digital business demands seamless user experiences, interoperability among a diverse set of platforms, and near instant access to the right resources at the right time. To accomplish this, digital initiatives rely on a mature, scalable IAM organization for success.

    The challenge? IAM is an incredibly complex space and every organization is as unique as a snowflake.

    Join us on a journey to break down the 7 steps you can take to embrace the complexities of IAM and transform your identity practice into a modern program capable of delivering enterprise and consumer identity solutions that are agile and adaptable enough to support new business initiatives and safeguard against new threats as they arise.

    Click to Expand

    Speaker:

    Collapse This Item

  • Q&A: Defense-in-Depth: Data, Networks & Infrastructure
  • CyberSecurity Ratings: Market Forces and Future Considerations 3:40 pm

    Presented by Security Scorecard

    In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.

    He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.

    David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.

    Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management.  He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.

    Click to Expand

    Speaker:

    David Ortiz
    David Ortiz

    David Ortiz

    Senior Director of Systems Engineering

    Collapse This Item

  • Building Your Identity Program from Start to Finish 4:00 pm

    Presented by SailPoint

    Building out an identity and access management (IAM) program can be an overwhelming task. Where do you start? Who do you engage? How do you get from a vague, undefined idea to a practical, real-world solution? Fortunately, Jerod is here to help you answer that question. Drawing on his experience deploying an IAM program in an enterprise environment, combined with years of consulting experience, he put together this talk as a step-by-step instruction manual to help move your IAM program from where it is to where you want it to be.

    Click to Expand

    Speaker:

    Jerod Brennen
    Jerod Brennen

    Jerod Brennen

    Identity Strategy & Solutions Advisor

    Collapse This Item

  • Closing Session
Partners