Event Schedule

  • Developing Your Identity Strategy 8:50 am

    Presented by SailPoint

    Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Jerod walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.

    Click to Expand

    Speaker:

    Jerod Brennen
    Jerod Brennen

    Jerod Brennen

    Identity Strategy & Solutions Advisor

    Collapse This Item

  • TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments 9:15 am

    Presented by OneTrust Vendorpedia

    You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.

    As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.

    Key points:

    • How you can save hours on vendor risk assessments
    • How you can leverage inherent risks and tiered assessments
    • How Cyber Risk Exchanges are reinventing the assessment process
    Click to Expand

    Speaker:

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 9:35 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • The Fear Factor: Reducing Risk in Your Environment 10:30 am

    Presented by Logically

    Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:

    • A clear understanding of the scare tactics organizations are facing from cyber criminals
    • Threats and vulnerabilities that exist in their environment
    • Steps organizations can take to minimize the risks of their organization’s employees
    • This session will help attendees to understand that fear should not be a factor in their approach to security.
    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • The Anatomy of A Cyber Incident Response: Dissecting A Real-World Event & Critical Mitigation Steps 10:40 am

    Presented by rmSource

    It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes

    Click to Expand

    Speaker:

    Michael Sullivan
    Michael Sullivan

    Michael Sullivan

    CISSP, CEH

    Collapse This Item

  • Shift Left: Building Security into the Application Development Lifecycle 11:00 am

    Presented by Micro Focus

    By building security into your application development lifecycle you not only help reduce your attack surface, but also save roughly 30% in costs associated with resolving the application security vulnerabilities afterwards… never mind the costs associated with a breach, such as shareholder value and brand tarnishing.

    Click to Expand

    Speaker:

    Rob Aragao
    Rob Aragao

    Rob Aragao

    Chief Security Strategist

    Collapse This Item

  • Morning Q&A Session
  • Lunch Break
  • Insider Threats, Nation-State Actors and Corporate Espionage – A Case Study 12:15 pm

    Presented by Department of Justice Federal Bureau of Investigation

    FBI Special Agent Scott McGaunn will discuss aspects of the Insider Threat. The presentation will have a particular focus on an FBI investigation where a Massachusetts company was almost destroyed by an insider who sold stolen source code to a Chinese competitor. The presentation will cover the rise and fall of American Superconductor (AMSC) and the FBI investigation to uncover and prosecute the corporate criminals who used an insider to do their dirty work.

    Click to Expand

    Speaker:

    Collapse This Item

  • The Importance of Having a Robust and Comprehensive Data Protection Strategy 1:00 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cyber-crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Shifting PAM Into High Gear With Zero Standing Privilege (ZSP) 1:20 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Ransomware Recovery With Speed and Precision 1:40 pm

    Presented by CrowdStrike

    Ransomware attacks cause major business disruptions resulting in significant time expenditures, technical resources, and related costs in order to return to full business operations. The traditional recovery approach using backups and reimaging or simply paying the ransom fails to address the root cause of the attack and remove persistent threats. This failure leaves organizations open to secondary attacks, negating initial efforts. Our experts from the front lines of incident response and endpoint recovery are helping organizations effectively recover from attacks with speed and precision to surgically remove ransomware. Join us for this informative session to learn just how we do it.

    Click to Expand

    Speaker:

    Eric Bodkin
    Eric Bodkin

    Eric Bodkin

    Endpoint Recovery Services

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 2:15 pm

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Identity and Access Management: Embracing the Complexity 2:35 pm

    Presented by IDMWorks, Auth0

    Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.

    Click to Expand

    Speaker:

    Matthew Marji
    Matthew Marji

    Matthew Marji

    Senior Product Security Engineer

    Collapse This Item

  • Risk Management – Insights in a World Gone Crazy 3:00 pm

    Presented by Ivanti

    Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.

    Click to Expand

    Speaker:

    Phil Richards
    Phil Richards

    Phil Richards

    CISO at Ivanti

    Collapse This Item

  • Credential Harvesting As a Service: How this Darkweb Organization Steals Your Microsoft Credentials 3:30 pm

    Presented by Avanan

    In this presentation, we will analyze the attack methods of a single advanced persistent threat organization that guarantees its dark-web customers that their messages will bypass Microsoft security. We will review the software they use to send email from anywhere in the world, their techniques that take advantage of both short- and long-lived vulnerabilities and the infrastructure to harvest credentials and perform attacks almost instantaneously.

    You will be surprised by the sophistication of the tools as well as their ease of use. Updated regularly with release notes and training videos, they are not ‘hackers’, so much as software developers with a very clear product offer: 100% access to your inbox. We will watch them over time and show how the tricks they use provide us with the indicators-of-attack we need to stop them.

    Click to Expand

    Speaker:

    Michael Landewe
    Michael Landewe

    Michael Landewe

    Cofounder

    Collapse This Item

  • Afternoon Q&A Session
  • Closing Session
  • Solutions Showcase Open Until 6:00
Partners