Event Schedule

  • Why Does Asset Management Matter for Cybersecurity? 9:00 am

    Presented by Axonius

    Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.

    Click to Expand

    Speaker:

    Collapse This Item

  • Lightweight Deception, Heavyweight Results 9:30 am

    Presented by PacketViper

    Speaker:

    Tim Jencka
    Tim Jencka

    Tim Jencka

    Vice President Sales & Business Development

    Collapse This Item

  • Break
  • Real Talk on Ransomware 10:30 am

    Presented by Arcserve

    We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, we’ll dive into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.

    Click to Expand

    Speaker:

    Collapse This Item

  • How Hackers Bypass Office 365 Security: An Guide for the Uninitiated 11:00 am

    Presented by Avanan

    The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

    During this session, we’ll demonstrate how to protect Office 365 from:

    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Microsoft credentials
    • Loss of sensitive data from OneDrive, SharePoint and Office 365
    Click to Expand

    Speaker:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Solutions Engineer

    Collapse This Item

  • Lunch Break
  • Cyber Security Advisor program 12:00 pm

    Presented by United States Department of Homeland Security

    Speaker:

    Sean McCloskey
    Sean McCloskey

    Sean McCloskey

    CISA Region 4 - Chief of Cybersecurity at Department of Homeland Security

    Collapse This Item

  • Dessert and Coffee Break
  • The Fear Factor: Reducing Risk in Your Environment 1:15 pm

    Presented by Carolinas IT

    Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:

    • A clear understanding of the scare tactics organizations are facing from cyber criminals
    • Threats and vulnerabilities that exist in their environment
    • Steps organizations can take to minimize the risks of their organization’s employees

    This session will help attendees to understand that fear should not be a factor in their approach to security.

    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Protection From Today’s Biggest Threats 1:45 pm

    Presented by Sophos

    In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Cyber Resilience 2:30 pm

    Presented by Zerto

    Rethinking your data protection strategy in the age of ransomware

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • How to Fight Modern Advanced Threats and Improve Your Cybersecurity Posture 3:00 pm

    Presented by Arctic Wolf Networks, Cohesity

    In this presentation, learn how to fight modern advanced threats and improve your cybersecurity posture. Topics to be covered include current challenges facing IT departments, types of advanced threats, and how to detect and respond to those threats. When it comes to security, you must take a proactive approach to minimize the damage that can be done.

    Click to Expand

    Speakers:

    Collapse This Item

  • Networking / Happy Hour
Partners