Cleveland Cybersecurity Conference
The Cleveland Cybersecurity Conference Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Wed. Mar 11
IoT and the Role of Cyber Security 9:00 am
Presented by Check Point Software Technologies
We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business process with higher efficiency.
This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.
Unicorns and Water Buffalos: How Security Transformation Should be Protecting Your Digital Transformation 9:30 am
Presented by Nexum
Digital Transformation has been taking the IT industry by storm, but has your Security posture been able to keep pace? From Zero Trust to XaaS to SASE, how is your security organization adapting to the changing needs of digital transformation? This talk takes a high level look at the key elements of Security Transformation to protect Digital Transformations. It will cover specific efforts and what safeguards help protect them.
- Coffee Break
Rock the CASB – Top CASB Use Cases 10:30 am
Presented by Bitglass
As data has migrated to the cloud, we have lost visibility and control of our sensitive data. A CASB can help your organization to regain that visibility and control. Through a crawl, walk, run approach we can all begin to take the steps necessary to make sure our data is staying with the company. The cloud and BYOD is here to to stay, are you taking the actions necessary to make sure you have the visibility and control you need?
The Convergence of SDWAN and Security 11:00 am
Presented by Rolta Advizex
Why the industry is moving to SDWAN and why network security is paramount in that migration.
- Lunch Break
Cybersecurity 12:00 pm
Presented by United States Department of Homeland Security
- Dessert and Coffee Break
Public Cloud Visibility – Challenges and Solutions 1:15 pm
Presented by Apcon
Movement of workloads to public cloud services has increased dramatically over the last several years. Organizations select the public cloud for geographic efficiencies, deployment
speed, scalability and up-front investment costs. However, there are significant challenges and risks that need to be considered to keep data secure.
We will discuss the following:
- The shared responsibility model for public cloud security
- Key visibility challenges network professionals face when migrating workloads to the cloud
- Best practices of cloud traffic monitoring
- Cloud-native visibility solutions
Data Center Attack: The Game 1:45 pm
Presented by Trend Micro
In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.
You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.
After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.
Continuous Vulnerability Management: Striving for a 14-Day SLA 2:30 pm
Presented by Ivanti
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
Six Practices To Defend Attack Vectors for IT Execs to beat Hackers and Satisfy Regulators 3:00 pm
Presented by Agile1
This presentation will discuss with practical applications:
- The new Digital Attack Vectors
- De-Risk data in the Cloud
- Incorporate cybersecurity into risk management
- Identify and protect critical assets
- Hunt hackers before they hunt you
- 6 Practical Steps to beat Hackers and Satisfy Regulators
- Networking / Happy Hour