Virtual Summit
Seattle Portland Virtual Cybersecurity Summit 2020
The Seattle Portland Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Jun 04
Event Schedule
-
Threat Hunting & Modern Security: 3 Fundamental Flaws 8:50 am
Presented by CriticalStart
Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Speaker:
-
Managed Threat and Response Services 9:14 am
Presented by Sophos
“It’s dangerous to go alone! Take this.” So read the first lines of dialogue in the 1986 Nintendo classic The Legend of Zelda when your character, a young adventurer, is bequeathed a sword to fend off the forces of evil he will face on his impending quest. It’s a reference that may not be as familiar to you as it is to me, but the sentiment should still hold true as we begin our partnership: You are no longer alone… Is Managed Detection and Response (or MDR) something that’s been on your radar? And if not specifically by name (after all, we love our acronyms in security), have you ever had a discussion about the potential of using a partner to support your security program? In this session we will explore Managed Services as a concept, explore its beginnings, and differentiate between the options offered by the industry.
Speaker:
- Break
-
Cybercrime, Inc: The Business of the Dark Web 9:53 am
Presented by Armor Defense
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
The session aims to expose the inner workings and business of the cyber underground, focusing on the following
Cybercrime-as-a-service – increased threats due to COVID-19, and how businesses can protect themselves from all levels of cyber criminals.
Speaker:
-
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 10:15 am
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Speaker:
-
Special Q&A 10:32 am
Presented by Remediant
This session will feature Paul Lanzi from Remediant, answering questions from the audience live via video, in a panel format.
Paul will take questions, and if there is time, he will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.
Speaker:
- Break
-
Managing Digital Risk in Transformative Times 11:00 am
Presented by RSA
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Speaker:
-
Securing Remote Workers: Scaling Remote Access and Security for All Employees 11:20 am
Presented by Netskope
Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?
Attend this session about securing remote workers and you will learn:
- How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
- About the differences between various remote access architectures
- How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
Speaker:
- Morning Q&A Session
- Lunch Break
-
An Overview of the Cyber Services 12:35 pm
Presented by Cybersecurity and Infrastructure Security Agency
An overview of the cyber services the US-DHS Cybersecurity and Infrastructure Security Agency (CISA) offers the public and private sectors to improve their cyber security posture. All the services are free and range from strategic to technical assessments, reviews, tests, and exercises.
-
Real Talk on Ransomware 1:20 pm
Presented by Arcserve
Presentation Abstract / Description: We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. Join us for a unique perspective on how organizations can prepare for and defend against ransomware attacks.
-
A Centralized Identity Strategy Using Standards Helps Minimize Threats 1:42 pm
Presented by Auth0
Modern architectures continue to become more distributed and fractured. How can developers can continue to develop and build what they understand without having to become identity experts? How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.
Speaker:
-
Risk Management – Insights in a World Gone Crazy 2:09 pm
Presented by Ivanti
Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.
Speaker:
- Break
-
Creating Your Defense Plan Against IoT Security Threats 2:50 pm
Presented by Verkada
Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.
In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.
Speaker:
-
A Strategy For Securing Your Everything 3:06 pm
Presented by Check Point Software Technologies
The stakes have never been higher for organizations to get cyber security right. There are many forces driving this sense of urgency: companies adding new cloud platforms, products, geographic regions, apps and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped and under budget.
In this session, we will discuss how businesses of all sizes can adopt a modern approach to cyber security with a consolidated architecture that fully automates preventing attacks before enterprise systems.
Speaker:
- Afternoon Q&A Session
- Break
- Closing Session
- Solution Showcase Open Until 6:00