Event Schedule

  • Cyber Trivia Contest – Hosted by Automox 8:15 am

    Presented by Automox

    Forget the pop culture and geography categories. It’s time to make use of all of that cyber knowledge you have acquired in the field of IT security. Attend this lightening round trivia session with your peers to get your day started and you could walk away with one of three prizes. 1st Place) $100 Amazon Gift Card 2nd Place) Automox 20 oz. YETI Tumbler Mug. 3rd Place) Stylish Legacy Hater T-shirt

    Click to Expand

    Panel Participants:

    Collapse This Item

  • Cybersecurity Ratings: Market Forces and Future Considerations 8:35 am

    Presented by SecurityScorecard

    In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.

    He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.

    David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.

    Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management.  He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.

    Click to Expand

    Panel Participants:

    David Ortiz
    David Ortiz

    David Ortiz

    Senior Director of Systems Engineering

    Collapse This Item

  • Humans Are the Weakest Link – the Corona Edition 9:00 am

    Presented by Check Point

    Tell the dogs to lie down, grab a fresh coffee from the kitchen, kick your shoes off, and join CyberSecurity Evangelist and Podcast host Brian Linder for a journey into the dark corners of an interwoven mission of bad actors, SpongeBob, face masks, and a few other surprises.

    Plan on leaving with:

    New perspectives on humans as the weakest link in Corona times, and in the next “Work From Anywhere” normal

    The opportunity multiplier effect of pandemic fatigue

    A look into a few cybersecurity “blind spots” which may have been revealed

    A peek into the minds of a global Cyber research powerhouse

    An interconnected and complex threat surface with roads that lead where nobody wants to go.

    Warning: You might be asked to raise your hand even though nobody can see you except the cat. We will be polling the cats afterwards, so your full cooperation is needed.

    Click to Expand

    Panel Participants:

    Brian Linder
    Brian Linder

    Brian Linder

    CyberSecurity Threat Evangelist

    Collapse This Item

  • The Rise of Secure Access Service Edge (Sase) 9:40 am

    Presented by Bitglass

    Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

    Why organizations need SASE

    The key components of SASE offerings

    How SASE architectures impact performance

    Click to Expand

    Panel Participants:

    Jacob Serpa
    Jacob Serpa

    Jacob Serpa

    Senior Product Manager

    Collapse This Item

  • Managing Digital Risk Amid Disruption 10:00 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Panel Participants:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Identity, Users, and the Cloud 10:45 am

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?

    Click to Expand

    Collapse This Item

  • Is Ransomware Winning? 11:15 am

    Presented by Ivanti

    Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are getting nastier too. This has led to incredible increases in the average ransoms paid over the past eighteen months. In this session, we will look at recent ransomware trends, the critical changes to threat actor behaviors, and discuss the strategies and technologies organizations need to defend themselves against this evolving threat.

    Click to Expand

    Panel Participants:

    Chris Goettl
    Chris Goettl

    Chris Goettl

    Director of Product Management, Security

    Collapse This Item

  • Developing Your Identity Strategy 11:40 am

    Presented by SailPoint

    Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.

    Click to Expand

    Panel Participants:

    Rob Wilson
    Rob Wilson

    Rob Wilson

    Sr. Solution Engineer

    Collapse This Item

  • Break
  • Partnerships With Higher-Ed: Resources for Your Organization 12:25 pm

    Presented by Tennessee College

    In this session, you will learn how you can form a partnership with higher education and use the services from these entities to help protect your infrastructure or to help with ongoing investigations by using higher education subject matter experts.

    See how TCAT Shelbyville partners with statewide businesses and industries and how the program works with local law enforcement and the Tennessee Department of Safety and Homeland Security.   Learn how the partnership continues to provide vulnerability scans, audits and advice to businesses and industry.

    Case examples are given on how TCAT Shelbyville’s faculty and students have been utilized to scan and protect the Port of Memphis with the US Coast Guard, the TN Department of Homeland Security and private businesses and industry partners. Other case examples include how the faculty and students provide data to businesses and industry from a live Security Operation Center at TCAT Shelbyville.  Learn how using seven strategically placed sensors in southern Middle TN have helped to increase the security posture of these entities.

    Click to Expand

    Panel Participants:

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 1:10 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • A New Spin on Securing Active Directory 1:30 pm

    Presented by Attivo

    CISOs, Penetration Testers, and Incident Responders all agree that Active Directory is a primary target for attackers. So why isn’t AD defended more effectively? Join us in this session to learn who is attacking AD, why AD Security has traditionally been so difficult, and some groundbreaking new techniques for securing Active Directory.

    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • 2020 Wrap-up/2021 Looking Ahead 2:10 pm

    Risk comes from all angles in 2020 users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the continent.

    Obviously, COVID and the associated rush to work-from-home played a big part. Beyond that, what are the key cybersecurity trends we need to watch out for in 2021?

    Click to Expand

    Collapse This Item

  • Understanding and Combating Credential Stuffing Attacks 2:30 pm

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    How credential stuffing attacks work

    What effect they can have on your company

    Steps to detect and mitigate these attacks

    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 2:50 pm

    Presented by Esentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Panel Participants:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Recover From Ransomware 3:25 pm

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Collapse This Item

  • Using Security Testing to Know What’s Working 3:50 pm

    Presented by Cymulate

    The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.

    Click to Expand

    Panel Participants:

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Lead of Solution Architecture

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 4:10 pm

    Presented by Purestorage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense.

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Closing Session + Prize Drawing
Partners