Event Schedule

  • Why Does Asset Management Matter for Cybersecurity? 8:15 am

    Presented by Axonius

    Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.

    Click to Expand

    Speaker:

    Mikkel Hansen

    Mikkel Hansen

    Director of Sales Engineering

    Collapse This Item

  • Threat Intelligence and Modern Layered Security 9:15 am

    Presented by Sentinel IPS

    The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

    Click to Expand

    Speaker:

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Collapse This Item

  • Coffee Break
  • Trends in Cybercrime 10:00 am

    Presented by United States Secret Service

    Speaker:

    Ike Barnes
    Ike Barnes

    Ike Barnes

    Assistant to the Special Agent in Charge, US Secret Service

    Collapse This Item

  • Break
  • Real Talk on Ransomware 11:15 am

    Presented by Arcserve

    We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.

    Click to Expand

    Speaker:

    Steve Nalick
    Steve Nalick

    Steve Nalick

    Solution Consultant

    Collapse This Item

  • Lunch Break
  • The Paradox of Securing Workloads 12:15 pm

    Presented by Morphisec

    Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.

    Click to Expand

    Speaker:

    Arthur Braunstein
    Arthur Braunstein

    Arthur Braunstein

    Vice President of Sales

    Collapse This Item

  • Break
  • Protect Your Keys or Don’t Waste Your Time Encrypting Your Data 1:15 pm

    Presented by nCipher Security

    For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

    Click to Expand

    Speaker:

    Brad Beutlich
    Brad Beutlich

    Brad Beutlich

    Vice President of Sales Western US and LATAM

    Collapse This Item

  • Overcoming Today’s Most Common Security & Privacy Challenges 1:45 pm

    Presented by OneTrust Vendorpedia

    Managing third-party vendor risk before, during and after on-boarding is a continuous effort under global privacy laws and security regulations. While outsourcing operations to vendors can alleviate business challenges, managing the associated risk with manual tools like spreadsheets is complex and time consuming. To streamline this process, organizations must put procedures in place to secure sufficient vendor guarantees and effectively work together during an audit, incident – or much more. In this session, we’ll breakdown a practical approach for automating third-party vendor risk management and explore helpful tips and real-world practical advice to automate third-party privacy and security risk programs.

    Click to Expand

    Speaker:

    Zach Reed
    Zach Reed

    Zach Reed

    Senior Solutions Engineer

    Collapse This Item

  • Break
  • Cybercrime, Inc: Exposing the Business of the Dark Web 2:30 pm

    Presented by Armor

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.

    The session aims to expose the inner workings and business of the cyber underground, focusing on the following:

    • Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
    • Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
    • Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
    • How businesses can protect themselves from all levels of cybercriminals; emphasis on the importance of investing in proactive threat hunting
    Click to Expand

    Speaker:

    Michael Mayes
    Michael Mayes

    Michael Mayes

    Senior Writer & Researcher

    Collapse This Item

  • Digital Transformation – Knowing the Threat Landscape 3:00 pm

    Presented by RSA

    Digital Transformation is real. How prepared is your business to understand the associated risks within your organization across the threat landscape.

    Click to Expand

    Speaker:

    Craig Goodard
    Craig Goodard

    Craig Goodard

    Enterprise Account Executive - SecurID at RSA Security

    Collapse This Item

  • A Risk Based Privacy Approach 3:30 pm

    Presented by Truvantis

    A privacy program in this environment must take into account: An understanding of what current requirements are applicable to each business process which involves personal information, and the business reasons for the use of that personal information; how those requirements translate into technical and process changes, and how those changes are best addressed from the application level to the organizational level; future-proofing against changing applications and business needs, additional regulatory requirements, increased customer and partner expectations, and peer competitor strategies. This program must be risk based and designed to achieve an MVP defensible position in the shortest amount of time, without boiling the ocean, and should include a road map for continuous improvement and recurring risk and privacy assessments.
    Understand how to create an operational approach to privacy compliance, including business and technical impacts, create a prioritized assessment and implementation plan, and be able to demonstrate compliance and comply with privacy rights requests in a timely and efficient manner.

    Click to Expand

    Speaker:

    Matthew Corwin
    Matthew Corwin

    Matthew Corwin

    VP, General Counsel

    Collapse This Item

  • Networking / Happy Hour
Partners