Event Schedule

  • Day 1
  • 2020: The Passwordless Decade 8:55 am

    Presented by HYPR

    As we enter the passwordless decade, more and more organizations are asking the question: How quickly can I move beyond passwords?

    George Avetisov, CEO of HYPR, will discuss the rise of organizations moving to the cloud, how the perimeter fades and the attack surface gets larger.

    Modern tools such as SNIPR and Modlishka make it easier for hackers to launch large-scale automated attacks, bringing credential re-use and two-factor-authentication attacks to record highs. How did we get here, and will mainstream adoption of passwordless security have an impact?

    We will explore how the rise of virtual desktop infrastructure has affected workstation login and review how the evolution of authentication has impacted organizations’ identity and access management systems.

    In this session, you’ll learn:

    Why is Credential Reuse at All-time Highs?

    How has Authentication Evolved?

    Why this is the Passwordless Decade

    Click to Expand

    Speaker:

    Collapse This Item

  • Humans Are the Weakest Link – the Corona Edition 9:25 am

    Presented by Check Point

    Tell the dogs to lie down, grab a fresh coffee from the kitchen, kick your shoes off, and join CyberSecurity Evangelist and Podcast host Brian Linder for a journey into the dark corners of an interwoven mission of bad actors, SpongeBob, face masks, and a few other surprises.

    Plan on leaving with:

    New perspectives on humans as the weakest link in Corona times, and in the next “Work From Anywhere” normal

    The opportunity multiplier effect of pandemic fatigue

    A look into a few cybersecurity “blind spots” which may have been revealed

    A peek into the minds of a global Cyber research powerhouse

    An interconnected and complex threat surface with roads that lead where nobody wants to go.

    Warning: You might be asked to raise your hand even though nobody can see you except the cat. We will be polling the cats afterwards, so your full cooperation is needed.

    Click to Expand

    Speaker:

    Brian Linder
    Brian Linder

    Brian Linder

    CyberSecurity Threat Evangelist

    Collapse This Item

  • Your 2020 Ransomware Hostage Rescue Guide 9:50 am

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion by 2021. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks.So, how can your organization avoid getting held hostage?

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    · What new scary ransomware strains are in the wild
    · Am I infected?
    · I’m infected, now what?
    · Proven methods of protecting your organization
    · How to create your human firewall

    Don’t get held hostage and become a statistic!

    Click to Expand

    Speaker:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate at KnowBe4

    Collapse This Item

  • Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore 10:30 am

    Presented by OneTrust Vendorpedia

    For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromises. However, there are “red flags” you can look for when evaluating the security, privacy, and compliance programs of your vendors. ​

    TAKE AWAYS​:

    How to spot “red flags” from risky vendors​

    What leading third-party risk professionals look for when evaluating vendors​

    How to evaluate vendors using assessment communities and shared due diligence data

    Click to Expand

    Speaker:

    Collapse This Item

  • The Rise of Secure Access Service Edge (Sase) 10:50 am

    Presented by Bitglass

    Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

    Why organizations need SASE

    The key components of SASE offerings

    How SASE architectures impact performance

    Click to Expand

    Speaker:

    Jacob Serpa
    Jacob Serpa

    Jacob Serpa

    Senior Product Manager

    Collapse This Item

  • Defense-in-Depth: Expert Panel Discussion 11:15 am

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Collapse This Item

  • Securely Connecting the Right People to the Right Technologies 11:55 am

    Presented by Okta

    As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.

    Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.

    Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.

    Click to Expand

    Speaker:

    Shyam Rajaram
    Shyam Rajaram

    Shyam Rajaram

    Enterprise Sales Engineer

    Collapse This Item

  • Break
  • Keynote CISA Briefing – Your Role in Defending Critical Infrastructure Amid the Ongoing Crisis 12:20 pm

    Presented by CISA

    Pandemics had been relegated to the corners of cybersecurity preparedness tabletop exercises—until this year. In our highly interconnected world, most of the key security components that citizens rely on are not the property of the government, but rather technology that rests in private hands.

    The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) is charged with advisory, response and support across the US.  Cybersecurity Advisors, like today’s keynote presenter, are on the front lines of this response.  In this session, he will share details of recent attacks that have impacted Region IV, which includes the Atlanta Metro and all of Georgia.

    In this discussion, Mr. Walker will discuss the types of attacks that you need to prepare for, regardless of the size of your organization. He will offer practical advice for protecting your part of the supply chain that has increasingly been the target of threat actors. From simple security flaws in unpatched operational technology, to nation-state supported corporate attacks, the tools and advisory services from CISA can help every organization with penetration testing, systems analysis, and education.

    Our DHS-CISA Cybersecurity Agent will discuss the linkages between cyberspace and physical systems and best practices for reducing those vulnerabilities. Resilience is just as important as defense, and forming a relationship with CISA will help you as a security professional to stay up-to-date, and know how to report incidents to your local authorities.

    Click to Expand

    Speaker:

    Collapse This Item

  • Developing Your Identity Strategy 1:10 pm

    Presented by SailPoint

    Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.

    Click to Expand

    Speaker:

    Rob Wilson
    Rob Wilson

    Rob Wilson

    Sr. Solution Engineer

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 1:30 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Collapse This Item

  • The Fear Factor: Reducing Risk in Your Environment 2:20 pm

    Presented by Logically

    Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:

    A clear understanding of the scare tactics organizations are facing from cyber criminals

    Threats and vulnerabilities that exist in their environment

    Steps organizations can take to minimize the risks of their organization’s employees

    This session will help attendees to understand that fear should not be a factor in their approach to security.

    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Rise of the Machines: Best Practices for Securing Unmanaged and Iot Devices 2:45 pm

    Presented by Ordr

    For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.

    Join Ordr CSO Jeff Horne in this webinar to learn:

    Risks and vulnerabilities associated with unmanaged and IoT devices

    Why traditional networking and security tools fall short

    Security best practices to protect these devices without impacting business operations

    Click to Expand

    Speaker:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • People and Security: Expert Panel Discussion 3:05 pm

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Click to Expand

    Collapse This Item

  • Cybersecurity Ratings: Market Forces and Future Considerations 3:50 pm

    Presented by SecurityScorecard

    In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.

    He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.

    David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.

    Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management.  He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.

    Click to Expand

    Speaker:

    Collapse This Item

  • Security & Privacy: CCPA, CCPA 2.0 and CPRA 4:15 pm

    Presented by Spirion

    In this short session, our CSO Michael will interview Scott Giordano, an attorney and data privacy expert. They will discuss the changes expected due to the recent passage of “Prop 24” in California, which puts CCPA 2.0 on track to become law. This, along with the California Privacy Rights Act (CPRA), is expected to have far-reaching effects across the country – not just in California, and may be seen as a model for future compliance and privacy regulations going forward. Michael and Scott will preview the loger discussion that will be the subject of a CISO Panel and Web Briefing later this month for the Data Connectors Community.

    Learn More here: https://info.dataconnectors.com/spirion_compliance

    Click to Expand

    Speakers:

    Scott Giordano
    Scott Giordano

    Scott Giordano

    VP and Sr Counsel, Privacy & Compliance

    Michael Hiskey
    Michael Hiskey

    Michael Hiskey

    Collapse This Item

  • Fireside Executive Chat with City of Atlanta CIO 4:25 pm

    Ms. Hayes, a Navy Veteran and experienced technologist from the private sector, began her new role just this week!  Hear more about how she plans to guide the over 250 IT staffers from the City into 2021.  An Atlanta native, born and raised, she is excited to make cybersecurity part of the City’s everyday business.

    Tye Hayes is the Interim Chief Information Officer, for the Department of Atlanta Information Management for the City of Atlanta. Tye is a Navy veteran and a consummate professional with over 20 years of experience as a Technologist, Solutions Architect and Business Strategist within in theInformation Technology industry. She has an extensive background in IT services, having previously served as the Deputy CIO for Atlanta Public Schools and an Information Security Officer for Lockheed Martin Aeronautics where she led the Information Security Compliance and Governance group.

    Tye’s established track record of technology leadership and digital transformation has been recognized on local and national levels. She is well respected within the Information Technology field, having received the nomination for the 2020 Women Who Mean Business Award and awarded the 2014 CIO 100 Award, STEM Women of Color for IT Leadership Award, Modern Day Technology Leader and Black Engineer Award. As a leader in the corporate world, Tye believes it is equally as important to be involved in civic and community organizations to help foster a sense of accountability for the next generation. Her dedication to change is the motivation behind serving on the boards for the City of Atlanta Technology Advisory, Women In Technology (WIT) Atlanta, American Cancer Society ResearcHer and the Pink Frog Foundation. Tye is a transformational leader with a myriad of experience in innovation, security and IT solutions. I stand with her as we continue to help AIM blaze forward.

    Click to Expand

    Speaker:

    Collapse This Item

  • Day 2
  • Understanding and Combating Credential Stuffing Attacks 9:20 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    How credential stuffing attacks work

    What effect they can have on your company

    Steps to detect and mitigate these attacks

    Click to Expand

    Speaker:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 9:45 am

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Securing Legacy Hardware Architecture Apps in Modern Cloud Infrastructure 10:25 am

    Presented by Stromasys

    Mission-critical applications running on legacy hardware, such as SPARC, Alpha, VAX, or PA-RISC, are posing a significant, on going threat to IT security in addition to risk of unplanned downtime, increasing costs, and diminishing support. Legacy hardware also complicates digital transformation brought about by embracing new technologies. In this presentation, we’ll discuss some effective strategies for migrating legacy apps away from aging hardware to a private or public cloud. We’ll also discuss bringing improved availability and enhanced security leveraging zero trust architecture to these previously brittle legacy apps.

    Click to Expand

    Speaker:

    Marlin McNeil
    Marlin McNeil

    Marlin McNeil

    CEO and Managing Partner

    Collapse This Item

  • The Anatomy of a Cyber Incident Response – Dissecting a Real-World Event & Critical Mitigation Steps 10:50 am

    Presented by Rmsource

    It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes

    Click to Expand

    Speaker:

    Michael Sullivan
    Michael Sullivan

    Michael Sullivan

    CISSP, CEH

    Collapse This Item

  • Compliance & Automation: Expert Panel Discussion 11:10 am

    Managing compliance needs as a continuous, organizational process (as opposed to a reactive response), amid the ever-increasing myriad of industry regulations and legislation has become a full time job for most CISOs. Automation – including artificial intelligence and machine learning will help, and are perhaps more critical than ever.

    In this panel, our experts will discuss the current issues with regard to compliance, monitoring, and reporting. They’ll also talk about policy decisions and regulations that have kept their clients busiest in 2020, and how much help we can expect from automation.

    Click to Expand

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 11:45 am

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Break
  • Reducing Friction and Managing Remote Work Environments 1:15 pm

    Presented by Automox

    The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.

    During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.

    Click to Expand

    Speaker:

    Jay Goodman
    Jay Goodman

    Jay Goodman

    Manager of Product Marketing

    Collapse This Item

  • Why Do Small Businesses Need Big Protection? 1:40 pm

    Presented by Cisco

    As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations.  The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.

    Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on.  At the base of many of these challenges lies DNS Security.  DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.

    Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.

    Click to Expand

    Speaker:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Reducing Risk in 2021, While Spending Less 2:15 pm

    Presented by Morphisec

    This session will provide a roadmap for reducing risk in 2021. Preventing a breach in the coming year is going to be particularly difficult because most risk reduction strategies require significant increases in security spending, while analysts predict decreased security budgets. Using the MITRE ATT&CK framework, Netta will run through the anatomy of a modern attack to articulate this problem. Through this lens, she will explore the reasons why spending more doesn’t necessarily equate to stopping more attacks. More importantly, she will demonstrate some ways in which you can make impactful improvements to your security posture while managing to cut costs.

    Click to Expand

    Speaker:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • Wfh Is Here to Stay. Is Your Organization Prepared? 2:40 pm

    Presented by Cloudflare

    The global pandemic has forced organizations to provide scalable secure access to their entire user population. Applications have moved to the cloud. End users have become more mobile. The internet is the new corporate network and businesses cannot depend on a perimeter security model and need to change how we enable employees, customers, partners, and vendors to securely transact business online.

    Click to Expand

    Speaker:

    Jeff Hochberg
    Jeff Hochberg

    Jeff Hochberg

    Field Solutions Engineer

    Collapse This Item

  • IAM + WFH: Expert Panel Discussion 3:00 pm

    By now, we’re tired of talking about how everyone had to do a rush job to prepare for everyone Working From Home (WFH). Many of us have hired new staff, who have never set foot in our office – and may never be on the corporate LAN. Going forward, as this is the new reality – how will our security practices around identity and access management and in particular authentication and authorization change?

    Our panel are experts in these topics, and we will discuss various aspects of this challenge.

    Click to Expand

    Collapse This Item

  • Keynote - How to Protect Your Enterprise the Way the U.S. Secret Service Protects the President 3:50 pm

    Presented by US Secret Service

    The United States Secret Service has been investigating financial crimes since its inception in 1865. Over time, the agency’s mission has expanded to include the protection of our nation’s leaders. Protecting the President of the United States is very similar to the Cybersecurity strategies used by most major businesses, but why are breaches so prevalent?

    Throughout our long history of protection, several incidents like the attempted assassination of President Ronald Reagan, have prompted the Secret Service to implement lessons learned to harden the security of the commander and chief. Learn how to protect your business by employing the same methodology applied by the United States Secret Service. Even when you encounter a cyber incident, you can still prevail!

    Additionally, this session will highlight some of the typical schemes used by cybercriminals, BEC, romance scams, and their new conversion to COVID-19 scams.

    Click to Expand

    Speaker:

    Collapse This Item

  • Summit Final Closing Session
Partners