Event Schedule

  • Managing Digital Risk in Transformative Times 8:55 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Implementing Security at the Speed of Innovation 9:15 am

    Presented by Capsule8

    There is no question that every organization is struggling to prevent cyber attacks, especially when it comes to their production environments. The mission critical information found in a modern Linux production infrastructure should be protected at all costs, unless that cost is stability and performance. The introduction of new innovations such as containers, the cloud, and hybrid environments have created an ever evolving attack surface that many struggle to keep up with and defend. This talk will discuss the challenges of and considerations you must make when securing an evolving production environment, all while trying to keep up security and operations teams happy.

    Click to Expand

    Speaker:

    Cynthia Burke
    Cynthia Burke

    Cynthia Burke

    Head of Compliance

    Collapse This Item

  • Threat Hunting & Modern Security: 3 Fundamental Flaws 9:35 am

    Presented by CriticalStart

    Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.

    We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?”  We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.

    Click to Expand

    Speaker:

    Jim Rohde
    Jim Rohde

    Jim Rohde

    Director of Security Engineering

    Collapse This Item

  • Break
  • Risk Management – Insights in a World Gone Crazy 10:20 am

    Presented by Ivanti

    Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.

    Click to Expand

    Speaker:

    Phil Richards
    Phil Richards

    Phil Richards

    CISO at Ivanti

    Collapse This Item

  • Introduction to Proactive Prevention 10:40 am

    Presented by Morphisec

    Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.

    Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.

    Click to Expand

    Speaker:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments 11:00 am

    Presented by OneTrust Vendorpedia

    You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.

    As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.

    Key takeaways:

    • How you can save hours on vendor risk assessments
    • How you can leverage inherent risks and tiered assessments
    • How Cyber Risk Exchanges are reinventing the assessment process
    Click to Expand

    Speaker:

    Collapse This Item

  • Morning Q&A Panel 11:20 am

    This session will feature all of the presenters from the morning agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.

    Click to Expand

    Collapse This Item

  • Break
  • Presented by United States Secret Service 12:10 pm

    Presented by United States Secret Service

    Frederick will provide an informal discussion on the following topics:

    • Overview of USSS Cyber Fraud Task Force (CFTF) and Digital Evidence Forensic Labs (DEFL) program: History, Authority, Mission and Principles of Success within your Region
    • Cyber Incidents: An International Team Sport!
    • What is trending – Cryptocurrency.
    • Leading a Federal Law Enforcement District during a COVID 19 shutdown.
    Click to Expand

    Speaker:

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 1:00 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 1:20 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Speaker:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • The Evolution of Zero Trust in a New Age of Security 1:40 pm

    Presented by Check Point Software Technologies

    As we shift our focus from the data center to the cloud and containers, it is important to keep the Zero-Trust security model in mind. Hear how to make sure the new frontier of cloud, SaaS applications, and serverless functions are staying just as secure as your Datacenter with Check Point.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Shifting PAM Into High Gear With Zero Standing Privilege (ZSP) 2:25 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Secure the Enterprise With AI-Powered Adaptive Authentication 2:45 pm

    Presented by OneLogin

    With the risk of cyberattack continuing to increase due to perpetrators finding smarter and less-detectable ways to circumvent security, it is becoming increasingly difficult for today’s businesses to implement solutions that evolve as the methods of attackers evolve.

    In the pursuit of finding more ways to secure the enterprise, the user experience is often sacrificed, causing end-users to become increasingly agitated and unable to get work done due to account lockout.

    Join our session as we discuss how AI-powered authentication is the solution you need to provide an optimal balance between securing your data and ensuring users enjoy seamless access to business-critical applications.

    Click to Expand

    Speaker:

    Collapse This Item

  • Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices 3:05 pm

    Presented by Ordr

    For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.

    Join Ordr’s CSO Jeff Horne in this session to learn:

    • Risks and vulnerabilities associated with unmanaged and IoT devices
    • Why traditional networking and security tools fall short
    • Security best practices to protect these devices without impacting business operations
    Click to Expand

    Speaker:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Afternoon Q&A Session 3:35 pm

    This session will feature all of the presenters from the afternoon agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.

    Click to Expand

    Collapse This Item

  • Break
  • Closing Session
Partners