Event Schedule

  • Applying Probability Theory to Security Event Analysis 9:00 am

    Presented by Respond Software

    In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as probabilistic math, AI, ML, and correlation. We’ll also discuss the pros and cons of each of these approaches.

    Click to Expand

    Speaker:

    Collapse This Item

  • How Hackers Bypass Office 365 Security: A Guide for the Uninitiated 9:30 am

    Presented by Avanan

    The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

    During this session, we’ll demonstrate how to protect Office 365 from:
    Email-based phishing, spoofing, and malware
    Account takeover, insider threats, compromised Microsoft credentials
    Loss of sensitive data from OneDrive, SharePoint and Office 365

    Click to Expand

    Speaker:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Solutions Engineer

    Collapse This Item

  • Coffee Break
  • Cybercrime Tactics and Techniques Report 10:30 am

    Presented by Malwarebytes

    A significant uptick in threats aimed at businesses were reported in Q2 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.

    Key takeaways:

    • Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
    • How Mac, mobile malware, and especially adware are on the rise
    • User concern about the safety of their personal information, and how organizations are failing to protect their data
    • What it takes to create a resilient enterprise
    Click to Expand

    Speaker:

    Collapse This Item

  • It’s a SOAR Topic 11:00 am

    Presented by Sophos

    From Endpoint Detection and Response (EDR) to Security Orchestration, Automation and Response (SOAR), this presentation will pose question which will cause reflection and spur action, enabling you to take the leap into applying tools in your security ecosystem that will assist you in your daily battle of keeping the bad folks out!

    Click to Expand

    Speaker:

    Collapse This Item

  • Lunch Break
  • Trends in Cybercrime 12:00 pm

    Presented by United States Secret Service

    Speaker:

    Ike Barnes
    Ike Barnes

    Ike Barnes

    Assistant to the Special Agent in Charge, US Secret Service

    Collapse This Item

  • Dessert and Coffee Break
  • The Evolving Convergence of Information Security with Governance & Compliance 1:30 pm

    Presented by Egnyte

    Once highly isolated from each other, information governance and information security is experiencing a convergence where the market is realizing they both need each other more than ever to respond to the explosion of unstructured data, digital transformation and expanding privacy regulations.

    Click to Expand

    Speaker:

    Collapse This Item

  • The Secret to Winning IT Security Roulette 2:00 pm

    Presented by SaltStack

    There is too much talk in IT security and not enough action. But the reality is you probably don’t have the people or the tools to effectively act to secure your IT infrastructure. There is hope. Let’s fix IT. Join the CTO of SaltStack, Thomas Hatch, for a presentation on hope for the future of IT security.

    The pace of infrastructure growth and resulting complexity is overwhelming. Old security tech and processes, combined with overwhelmed and understaffed IT and security teams, simply can’t protect against a new and evolving threat landscape. Security exploits are proliferating faster than ever before.

    You already know this, but according to SC Magazine in the first half of 2019 there were almost 4000 unique data breaches resulting in more than 4 billion records being compromised.

    The hard truth is almost all of these security breaches could’ve been avoided. Gartner said 99% of exploited vulnerabilities occur on misconfigured, unpatched systems KNOWN to IT security teams.

    Security and IT teams need help winning security roulette. Let’s fix IT with fully automated, truly collaborative vulnerability remediation.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • CISA Is Working With Partners to Defend Against Today’s Threats 2:45 pm

    Presented by United States Department of Homeland Security

    Speaker:

    Collapse This Item

  • Networking / Happy Hour
Partners