Event Schedule

  • Evading Death by a Silver Bullet 8:30 am

    Presented by Micro Focus

    The world of cyber security is constantly evolving and as such security and privacy practitioners need to continue to adapt to protect their information assets. In this ever changing world it is crucial that companies employ effective strategies to improve their security posture. This session will look at the trends in cyber security, the evolving threats to organizations, and what some of the most effective strategies can be employed to reduce risk. In addition we will discuss the pitfalls that have plagued organizations efforts to prevent data breach and loss.

    Click to Expand

    Speaker:

    Collapse This Item

  • A Practical (Low Cost) Approach to Securing East-West Traffic & Critical Data 9:30 am

    Presented by ARIA Cybersecurity Solutions

    Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data. Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.

    Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective. Learn also how to add layers of defense to protect your most critical assets.

    Click to Expand

    Speaker:

    Gary Southwell
    Gary Southwell

    Gary Southwell

    General Manager

    Collapse This Item

  • Coffee Break
  • The Current Threat Landscape & Enterprise Remediation 10:30 am

    Presented by Malwarebytes

    The threat landscape is changing rapidly, we are moving away from consumer focused attacks and entering the age of heavy ransomware infection of organizational networks, such as businesses, hospitals, and municipal networks. To better understand this trend, we delve into the detections, trend lines and real world events that coincide with this surge of ransom threats, to better understand where they came from and where they are going.

    In this presentation, we will be discussing numerous families of ransomware who have had serious change to how much we see of them over the years, specifically 2016 – 2019, including ransom families like Ryuk, GandCrab and Locky. In addition to this, we take a look at local detections of the top ten countries dealing with ransomware today and provide guidance on how to deal with today’s ransomware threat.

    Click to Expand

    Speaker:

    Collapse This Item

  • Real Talk on Ransomware 11:00 am

    Presented by Arcserve

    We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.

    Click to Expand

    Speaker:

    Collapse This Item

  • Lunch Break
  • CISA Is Working With Partners to Defend Against Today’s Threats 12:00 pm

    Presented by United States Department of Homeland Security

    The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the heart of mobilizing a collective defense as we lead the Nation’s efforts to understand and manage risk to our critical infrastructure. Considering a large majority of our critical infrastructure is owned and operated by the private sector, collaboration is imperative to secure and allow us to address the systemic risks facing U.S. critical infrastructure. This talk discusses how CISA is working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future.

    Click to Expand

    Speaker:

    George Reeves
    George Reeves

    George Reeves

    Region 6 Cybersecurity Advisor, DHS-CISA

    Collapse This Item

  • Dessert and Coffee Break
  • The Paradox of Securing Workloads 1:30 pm

    Presented by Morphisec

    Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.

    Click to Expand

    Speaker:

    Arthur Braunstein
    Arthur Braunstein

    Arthur Braunstein

    Vice President of Sales

    Collapse This Item

  • Automating Incident Response for SOC Survival 2:00 pm

    Presented by Swimlane

    Today’s security operations centers (SOCs) do not have the time, energy, or resources to keep pace with the growing security skills gap and evolving threat landscape. Security operations need to be able to secure their organizations by doing more with less. This is where a security orchestration, automation, and response (SOAR) solution comes in.

    Rather than being bogged down by arduous manual tasks, SOAR empowers your SOC by leveraging your existing people, processes, and technology to investigate and remediate threats at machine speeds. Swimlane’s Ric Lewis details how a SOAR solution works and demonstrates real-world use cases, including phishing, host alarms, and endpoint detection and response.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Protect Your Keys or Don’t Waste Your Time Encrypting Your Data 3:00 pm

    Presented by CipherCloud

    For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

    Click to Expand

    Speaker:

    Brad Beutlich
    Brad Beutlich

    Brad Beutlich

    Vice President of Sales Western US and LATAM

    Collapse This Item

  • Networking / Happy Hour