Event Schedule

  • Why Does Asset Management Matter for Cybersecurity? 9:00 am

    Presented by Axonius

    Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.

    Click to Expand

    Speaker:

    Collapse This Item

  • Lightweight Deception, Heavyweight Results 9:30 am

    Presented by PacketViper

    Speaker:

    Tim Jencka
    Tim Jencka

    Tim Jencka

    Vice President Sales & Business Development

    Collapse This Item

  • Break
  • Real Talk on Ransomware 10:30 am

    Presented by Arcserve

    We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.

    Click to Expand

    Speaker:

    Collapse This Item

  • How Hackers Bypass Email Security: An Attack Guide for the Uninitiated 11:00 am

    Presented by Avanan

    Migration to cloud email requires a strategic shift in security. Given that Office 365 inboxes and user credentials are top targets for hackers, it’s no surprise that 90% of breaches start with email. The resulting security incident orchestration and response workload drain resources from the SOC team.

    Sr Solutions Engineer, Jeff Raymond will share insights from research and demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks. He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to secure inboxes from threats like phishing, account takeover, and business email compromise.

    Click to Expand

    Speaker:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Solutions Engineer

    Collapse This Item

  • Break
  • The CSI Model of Digital Forensics 12:00 pm

    Presented by United States Secret Service

    With the speed of business, the width of company exposure, and the number of growing attackers; learning and utilizing the CSI Model of Digital Forensics can assist in the mitigation of security events and the protection of company assets.

    Click to Expand

    Speaker:

    Alan Davis
    Alan Davis

    Alan Davis

    Operational Manager – USSS ATL RCC DEFL

    Collapse This Item

  • Break
  • Threat Hunting and Modern Security: 3 Fundamental Flaws 1:15 pm

    Presented by CriticalStart

    When considering how to move forward with the development or operations of a monitoring function, what risks must be addressed and which ones are inherently unavoidable? There are three fundamental flaws with threat hunting and trying to find “the bad” that many organizations may not be addressing.

    Click to Expand

    Speaker:

    Collapse This Item

  • Cyber Security Report 2020 1:45 pm

    Presented by Check Point Software Technologies

    Join us to take a look at the new trends in Cyber Warfare for 2020. We will take a look at the top threats facing businesses and government organizations, such as Magecart and Supply Chain attacks. We will discuss why the traditional approach is not enough to respond to these new threats.

    Click to Expand

    Speaker:

    Arthur Braunstein
    Arthur Braunstein

    Arthur Braunstein

    Vice President of Sales

    Collapse This Item

  • Break
  • The Paradox of Securing Workloads 2:30 pm

    Presented by Morphisec

    Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.

    Click to Expand

    Speaker:

    Arthur Braunstein
    Arthur Braunstein

    Arthur Braunstein

    Vice President of Sales

    Collapse This Item

  • Risk Exchanges: The Key to Vendor Risk Management 3:00 pm

    Presented by OneTrust Vendorpedia

    Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.

    Key Takeaways:

    Understand third-party risk management trends and challenges

    Gain actionable insights on how to monitor third-party risks and performance

    Learn the benefits of a third-party risk exchange

    See how you can protect against third-party threats such as data breaches, etc

    Click to Expand

    Speaker:

    Randy Ferree
    Randy Ferree

    Randy Ferree

    CSO

    Collapse This Item

  • Networking / Happy Hour
Partners