Event Schedule

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 8:50 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • How Hackers Bypass Email Security: An Attack Guide for the Uninitiated 9:10 am

    Presented by Avanan

    The arms race between email attackers and defenders is a long and expensive one. In this presentation, we will analyze the attack methods of a single advanced persistent threat organization that guarantees its dark-web customers that their messages will bypass Microsoft security. We will review the software they use to send email from anywhere in the world, their techniques that take advantage of both short- and long-lived vulnerabilities and the infrastructure to harvest credentials and perform attacks almost instantaneously.

    You will be surprised by the sophistication of the tools as well as their ease of use. Updated regularly with release notes and training videos, they are not ‘hackers’, so much as software developers with a very clear product offer: 100% access to your inbox. We will watch them over time and show how the tricks they use provide us with the indicators-of-attack we need to stop them.

    Click to Expand

    Speaker:

    Michael Landewe
    Michael Landewe

    Michael Landewe

    Cofounder

    Collapse This Item

  • A Modern Approach to Deception 9:30 am

    Presented by Attivo Networks

    Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm on the attacker to be perfect or be detected. History and experience have shown us that human attackers can bypass next-gen perimeter and endpoint controls. Threat deception provides early detection of external, insider, and 3rd party attackers – protecting against new types of Active Directory attacks, delivering actionable alerts, strengthening overall defensive posture, while being simple to deploy and maintain with a small staff. Whether your organization is a Fortune 10 or one with less than 1000 employees, organizations across the globe are deploying modern Attivo Deception both on-prem and the cloud as a proactive measure to combat cyber criminals.

    Click to Expand

    Speaker:

    Jonathan Randall
    Jonathan Randall

    Jonathan Randall

    Regional Manager

    Collapse This Item

  • Break
  • CyberSecurity Ratings: Market Forces and Future Considerations 10:15 am

    Presented by Security Scorecard

    In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.

    He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.

    David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.

    Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management. He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.

    Click to Expand

    Speaker:

    David Ortiz
    David Ortiz

    David Ortiz

    Senior Director of Systems Engineering

    Collapse This Item

  • Securing Remote Workers: Scaling Remote Access and Security for All Employees 10:35 am

    Presented by Netskope

    Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?

    Attend this session about securing remote workers and you will learn:

    • How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
    • About the differences between various remote access architectures
    • How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
    Click to Expand

    Speaker:

    Collapse This Item

  • Managing Digital Risk in Transformative Times 10:55 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Morning Q&A Panel
  • Lunch Break
  • USSS’s Role in Responding to Financial Threats During the COVID-19 Virus 12:15 pm

    Presented by United States Secret Service

    The U.S. Secret Service will discuss their role in defending our critical financial infrastructure, and also discuss the USSS’s role in responding to financial threats during the COVID 19 virus.

    Click to Expand

    Speaker:

    Collapse This Item

  • Identity and Access Management: Embracing the Complexity 1:00 pm

    Presented by Auth0

    Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.

    Click to Expand

    Speaker:

    Matthew Marji
    Matthew Marji

    Matthew Marji

    Senior Product Security Engineer

    Collapse This Item

  • Creating Your Defense Plan Against IoT Security Threats 1:20 pm

    Presented by Verkada

    Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.

    In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.

    Click to Expand

    Speaker:

    Ryan Malley
    Ryan Malley

    Ryan Malley

    Solutions Engineer

    Collapse This Item

  • Using Threat Intelligence to Inform Your Security Program 1:40 pm

    Presented by F5

    As the global pandemic evolves, many organizations are adjusting to the dramatic increase in remote workers. This puts an acute strain on systems required to deliver reliable and secure access to applications. Attackers are taking advantage of this situation to breach companies through tactics such as credential stuffing and web attacks. Join Sara Boddy from F5 Labs as she discusses threat intelligence in a “new normal” and prioritizing defense based on attacks and likelihood.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 2:30 pm

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 2:50 pm

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • The Present and Future of IoT Security 3:10 pm

    Presented by Check Point Software Technology

    We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business process with higher efficiency.

    This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.

    Click to Expand

    Speaker:

    Collapse This Item

  • Gain Visibility Into On-Premises and Cloud Networks to Optimize Performance and Security 3:30 pm

    Presented by APCON

    Current trends and disruptive technologies add layers of complexity and security risks to networks. But balancing these issues with performance, scale, and end-user requirements, complicate architecting today’s network environment.

    Learn how APCON addresses the dynamics of packet-level visibility and ways we can help to optimize the performance and security of both on-premises and cloud networks.

    Click to Expand

    Speaker:

    Collapse This Item

  • Afternoon Q&A Session
  • Closing Session
Partners