Virtual Summit
Boston Virtual Cybersecurity Summit 2020
The Boston Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Jun 11
Event Schedule
-
Managing Digital Risk in Transformative Times 8:55 am
Presented by RSA
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey
Speaker:
-
Implementing Security at the Speed of Innovation 9:15 am
Presented by Capsule8
There is no question that every organization is struggling to prevent cyber attacks, especially when it comes to their production environments. The mission critical information found in a modern Linux production infrastructure should be protected at all costs, unless that cost is stability and performance. The introduction of new innovations such as containers, the cloud, and hybrid environments have created an ever evolving attack surface that many struggle to keep up with and defend. This talk will discuss the challenges of and considerations you must make when securing an evolving production environment, all while trying to keep up security and operations teams happy.
Speaker:
-
Threat Hunting & Modern Security: 3 Fundamental Flaws 9:35 am
Presented by CriticalStart
Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Speaker:
- Break
-
Risk Management – Insights in a World Gone Crazy 10:20 am
Presented by Ivanti
Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.
Speaker:
-
Introduction to Proactive Prevention 10:40 am
Presented by Morphisec
Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.
Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
Speaker:
-
TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments 11:00 am
Presented by OneTrust Vendorpedia
You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.
As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.
Key takeaways:
- How you can save hours on vendor risk assessments
- How you can leverage inherent risks and tiered assessments
- How Cyber Risk Exchanges are reinventing the assessment process
Speaker:
-
Morning Q&A Panel 11:20 am
This session will feature all of the presenters from the morning agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.
- Break
-
Presented by United States Secret Service 12:10 pm
Presented by United States Secret Service
Frederick will provide an informal discussion on the following topics:
- Overview of USSS Cyber Fraud Task Force (CFTF) and Digital Evidence Forensic Labs (DEFL) program: History, Authority, Mission and Principles of Success within your Region
- Cyber Incidents: An International Team Sport!
- What is trending – Cryptocurrency.
- Leading a Federal Law Enforcement District during a COVID 19 shutdown.
Speaker:
-
Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 1:00 pm
Presented by Zerto
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Speaker:
-
Introduction to Risk-Based Vulnerability Management 1:20 pm
Presented by Kenna Security
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
- Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
- Details the findings on how risk-based is the way to get ahead in vulnerability management
- Lays out several factors that drive better remediation performance
- Provides steps for setting up a successful risk-based vulnerability management program
Speaker:
-
The Evolution of Zero Trust in a New Age of Security 1:40 pm
Presented by Check Point Software Technologies
As we shift our focus from the data center to the cloud and containers, it is important to keep the Zero-Trust security model in mind. Hear how to make sure the new frontier of cloud, SaaS applications, and serverless functions are staying just as secure as your Datacenter with Check Point.
Speaker:
- Break
-
Shifting PAM Into High Gear With Zero Standing Privilege (ZSP) 2:25 pm
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Speaker:
-
Secure the Enterprise With AI-Powered Adaptive Authentication 2:45 pm
Presented by OneLogin
With the risk of cyberattack continuing to increase due to perpetrators finding smarter and less-detectable ways to circumvent security, it is becoming increasingly difficult for today’s businesses to implement solutions that evolve as the methods of attackers evolve.
In the pursuit of finding more ways to secure the enterprise, the user experience is often sacrificed, causing end-users to become increasingly agitated and unable to get work done due to account lockout.
Join our session as we discuss how AI-powered authentication is the solution you need to provide an optimal balance between securing your data and ensuring users enjoy seamless access to business-critical applications.
Speaker:
-
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices 3:05 pm
Presented by Ordr
For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
Join Ordr’s CSO Jeff Horne in this session to learn:
- Risks and vulnerabilities associated with unmanaged and IoT devices
- Why traditional networking and security tools fall short
- Security best practices to protect these devices without impacting business operations
Speaker:
-
Afternoon Q&A Session 3:35 pm
This session will feature all of the presenters from the afternoon agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.
- Break
- Closing Session