Houston Cybersecurity Conference 2020
The Houston Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Thu. Jan 23
Evading Death by a Silver Bullet 8:30 am
Presented by Micro Focus
The world of cyber security is constantly evolving and as such security and privacy practitioners need to continue to adapt to protect their information assets. In this ever changing world it is crucial that companies employ effective strategies to improve their security posture. This session will look at the trends in cyber security, the evolving threats to organizations, and what some of the most effective strategies can be employed to reduce risk. In addition we will discuss the pitfalls that have plagued organizations efforts to prevent data breach and loss.
A Practical (Low Cost) Approach to Securing East-West Traffic & Critical Data 9:30 am
Presented by ARIA Cybersecurity Solutions
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data. Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective. Learn also how to add layers of defense to protect your most critical assets.
- Coffee Break
The Current Threat Landscape & Enterprise Remediation 10:30 am
Presented by Malwarebytes
The threat landscape is changing rapidly, we are moving away from consumer focused attacks and entering the age of heavy ransomware infection of organizational networks, such as businesses, hospitals, and municipal networks. To better understand this trend, we delve into the detections, trend lines and real world events that coincide with this surge of ransom threats, to better understand where they came from and where they are going.
In this presentation, we will be discussing numerous families of ransomware who have had serious change to how much we see of them over the years, specifically 2016 – 2019, including ransom families like Ryuk, GandCrab and Locky. In addition to this, we take a look at local detections of the top ten countries dealing with ransomware today and provide guidance on how to deal with today’s ransomware threat.
Real Talk on Ransomware 11:00 am
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
- Lunch Break
CISA Is Working With Partners to Defend Against Today’s Threats 12:00 pm
Presented by United States Department of Homeland Security
The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the heart of mobilizing a collective defense as we lead the Nation’s efforts to understand and manage risk to our critical infrastructure. Considering a large majority of our critical infrastructure is owned and operated by the private sector, collaboration is imperative to secure and allow us to address the systemic risks facing U.S. critical infrastructure. This talk discusses how CISA is working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future.
- Dessert and Coffee Break
The Paradox of Securing Workloads 1:30 pm
Presented by Morphisec
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Automating Incident Response for SOC Survival 2:00 pm
Presented by Swimlane
Today’s security operations centers (SOCs) do not have the time, energy, or resources to keep pace with the growing security skills gap and evolving threat landscape. Security operations need to be able to secure their organizations by doing more with less. This is where a security orchestration, automation, and response (SOAR) solution comes in.
Rather than being bogged down by arduous manual tasks, SOAR empowers your SOC by leveraging your existing people, processes, and technology to investigate and remediate threats at machine speeds. Swimlane’s Ric Lewis details how a SOAR solution works and demonstrates real-world use cases, including phishing, host alarms, and endpoint detection and response.
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data 3:00 pm
Presented by CipherCloud
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
- Networking / Happy Hour