Event Schedule

  • Threat Hunting & Modern Security: 3 Fundamental Flaws 8:50 am

    Presented by CriticalStart

    Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.

    We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?”  We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.

    Click to Expand

    Speaker:

    Jim Rohde
    Jim Rohde

    Jim Rohde

    Director of Security Engineering

    Collapse This Item

  • Managed Threat and Response Services 9:14 am

    Presented by Sophos

    “It’s dangerous to go alone! Take this.” So read the first lines of dialogue in the 1986 Nintendo classic The Legend of Zelda when your character, a young adventurer, is bequeathed a sword to fend off the forces of evil he will face on his impending quest. It’s a reference that may not be as familiar to you as it is to me, but the sentiment should still hold true as we begin our partnership: You are no longer alone… Is Managed Detection and Response (or MDR) something that’s been on your radar? And if not specifically by name (after all, we love our acronyms in security), have you ever had a discussion about the potential of using a partner to support your security program? In this session we will explore Managed Services as a concept, explore its beginnings, and differentiate between the options offered by the industry.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Cybercrime, Inc: The Business of the Dark Web 9:53 am

    Presented by Armor Defense

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.

    The session aims to expose the inner workings and business of the cyber underground, focusing on the following

    Cybercrime-as-a-service – increased threats due to COVID-19, and how businesses can protect themselves from all levels of cyber criminals.

    Click to Expand

    Speaker:

    Michael Mayes
    Michael Mayes

    Michael Mayes

    Senior Writer & Researcher

    Collapse This Item

  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 10:15 am

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.

    So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Special Q&A 10:32 am

    Presented by Remediant

    This session will feature Paul Lanzi from Remediant, answering questions from the audience live via video, in a panel format.

    Paul will take questions, and if there is time, he will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.

    Click to Expand

    Speaker:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Break
  • Managing Digital Risk in Transformative Times 11:00 am

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Securing Remote Workers: Scaling Remote Access and Security for All Employees 11:20 am

    Presented by Netskope

    Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?

    Attend this session about securing remote workers and you will learn:

    • How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
    • About the differences between various remote access architectures
    • How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
    Click to Expand

    Speaker:

    Collapse This Item

  • Morning Q&A Session
  • Lunch Break
  • An Overview of the Cyber Services 12:35 pm

    Presented by Cybersecurity and Infrastructure Security Agency

    An overview of the cyber services the US-DHS Cybersecurity and Infrastructure Security Agency (CISA) offers the public and private sectors to improve their cyber security posture. All the services are free and range from strategic to technical assessments, reviews, tests, and exercises.

    Click to Expand

    Collapse This Item

  • Real Talk on Ransomware 1:20 pm

    Presented by Arcserve

    Presentation Abstract / Description: We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. Join us for a unique perspective on how organizations can prepare for and defend against ransomware attacks.

    Click to Expand

    Collapse This Item

  • A Centralized Identity Strategy Using Standards Helps Minimize Threats 1:42 pm

    Presented by Auth0

    Modern architectures continue to become more distributed and fractured.  How can developers can continue to develop and build what they understand without having to become identity experts?  How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.

    Click to Expand

    Speaker:

    Carlos Mostek
    Carlos Mostek

    Carlos Mostek

    Principal Solution Architect

    Collapse This Item

  • Risk Management – Insights in a World Gone Crazy 2:09 pm

    Presented by Ivanti

    Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.

    Click to Expand

    Speaker:

    Phil Richards
    Phil Richards

    Phil Richards

    CISO at Ivanti

    Collapse This Item

  • Break
  • Creating Your Defense Plan Against IoT Security Threats 2:50 pm

    Presented by Verkada

    Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.

    In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.

    Click to Expand

    Speaker:

    Ryan Malley
    Ryan Malley

    Ryan Malley

    Solutions Engineer

    Collapse This Item

  • A Strategy For Securing Your Everything 3:06 pm

    Presented by Check Point Software Technologies

    The stakes have never been higher for organizations to get cyber security right. There are many forces driving this sense of urgency: companies adding new cloud platforms, products, geographic regions, apps and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped and under budget.

    In this session, we will discuss how businesses of all sizes can adopt a modern approach to cyber security with a consolidated architecture that fully automates preventing attacks before enterprise systems.

    Click to Expand

    Speaker:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Chief Security Evangelist

    Collapse This Item

  • Afternoon Q&A Session
  • Break
  • Closing Session
  • Solution Showcase Open Until 6:00
Partners