Event Schedule

  • IoT and the Role of Cyber Security 9:00 am

    Presented by Check Point Software Technologies

    We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business process with higher efficiency.

    This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.

    Click to Expand

    Speaker:

    Collapse This Item

  • Unicorns and Water Buffalos: How Security Transformation Should be Protecting Your Digital Transformation 9:30 am

    Presented by Nexum

    Digital Transformation has been taking the IT industry by storm, but has your Security posture been able to keep pace? From Zero Trust to XaaS to SASE, how is your security organization adapting to the changing needs of digital transformation? This talk takes a high level look at the key elements of Security Transformation to protect Digital Transformations. It will cover specific efforts and what safeguards help protect them.

    Click to Expand

    Speaker:

    Collapse This Item

  • Coffee Break
  • Rock the CASB – Top CASB Use Cases 10:30 am

    Presented by Bitglass

    As data has migrated to the cloud, we have lost visibility and control of our sensitive data. A CASB can help your organization to regain that visibility and control. Through a crawl, walk, run approach we can all begin to take the steps necessary to make sure our data is staying with the company. The cloud and BYOD is here to to stay, are you taking the actions necessary to make sure you have the visibility and control you need?

    Click to Expand

    Speaker:

    Collapse This Item

  • The Convergence of SDWAN and Security 11:00 am

    Presented by Rolta Advizex

    Why the industry is moving to SDWAN and why network security is paramount in that migration.

    Click to Expand

    Speaker:

    Collapse This Item

  • Lunch Break
  • Cybersecurity 12:00 pm

    Presented by United States Department of Homeland Security

    Speaker:

    Collapse This Item

  • Dessert and Coffee Break
  • Public Cloud Visibility – Challenges and Solutions 1:15 pm

    Presented by Apcon

    Movement of workloads to public cloud services has increased dramatically over the last several years. Organizations select the public cloud for geographic efficiencies, deployment
    speed, scalability and up-front investment costs. However, there are significant challenges and risks that need to be considered to keep data secure.

    We will discuss the following:

    • The shared responsibility model for public cloud security
    • Key visibility challenges network professionals face when migrating workloads to the cloud
    • Best practices of cloud traffic monitoring
    • Cloud-native visibility solutions
    Click to Expand

    Speaker:

    Collapse This Item

  • Data Center Attack: The Game 1:45 pm

    Presented by Trend Micro

    In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.

    You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.
    After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Continuous Vulnerability Management: Striving for a 14-Day SLA 2:30 pm

    Presented by Ivanti

    The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.

    Click to Expand

    Speaker:

    Collapse This Item

  • Six Practices To Defend Attack Vectors for IT Execs to beat Hackers and Satisfy Regulators 3:00 pm

    Presented by Agile1

    This presentation will discuss with practical applications:

    • The new Digital Attack Vectors
    • De-Risk data in the Cloud
    • Incorporate cybersecurity into risk management
    • Identify and protect critical assets
    • Hunt hackers before they hunt you
    • 6 Practical Steps to beat Hackers and Satisfy Regulators
    Click to Expand

    Speaker:

    Collapse This Item

  • Networking / Happy Hour
Partners