Virtual Summit
Minneapolis & Des Moines Virtual Cybersecurity Summit
The Minneapolis & Des Moines Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. May 14
Event Schedule
-
Threat Hunting & Modern Security: 3 Fundamental Flaws 9:05 am
Presented by CriticalStart
Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Speaker:
-
Decade of the Rats: Corporate Espionage Attacks by Chinese APTs 9:30 am
Presented by BlackBerry
Did you know five APT groups performed a decade of cross-platform cyber espionage attacks targeting Linux servers to steal corporate intellectual property? Linux runs nearly all of the top 1 million websites online, 75% of all web servers, 98% of the world’s supercomputers and 75% of major cloud service providers. In this session, Chris Pittman will share how these APTs leveraged the “always on, always available” nature of Linux servers to establish a “beachhead for operations” across a wide swath of targets.
Speaker:
-
Cybercrime, Inc. the Business of the Dark Web 9:55 am
Presented by Armor
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
This session aims to expose the inner workings and business of the cyber underground, focusing on the following:
- Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
- Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
- Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
- How businesses can protect themselves from all levels of cybercriminals; emphasis on the importance of investing in proactive threat hunting
Speaker:
- Break
-
Shifting PAM Into High Gear With Zero Standing Privilege (ZSP) 10:35 am
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Speaker:
-
Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware. 11:00 am
Presented by Zerto
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Speaker:
-
How to Take a Proactive Security Posture During COVID-19 by Learning From Incident Case Studies 11:25 am
Presented by Check Point Software Technologies
What are the trends that organizations are facing when it comes to cyber attacks? We take an in-depth look at interesting incident case studies before and during the current COVID-19 pandemic so that organizations can be more prepared as more employees are working remotely, attacks are increasing to exploit the current situation, and more IT staffs are looking for surge support to adjust to the new reality. Looking at the increase in DDoS as a deception by 300%, the cyber kill chain and emotet through the eyes of an IR analyst, and the cost of undetected breaches in an organization’s environment. How do we prepare in the face of uncertain times?
Speaker:
- Morning Q&A Panel 11:50 am
- Lunch Break
- Cybersecurity Advisor for the Regional Operations Branch of the Integrated Operations Directorate 12:45 pm
-
Improving Security for Remote Working: 13 Key Recommendations 1:40 pm
Presented by Mimecast
Many organizations are in the middle of a work from home (WFH) trial by fire. What are the security implications of this abrupt change? What are some key security best practices that have become clear during this time? Even after this current pandemic recedes it is fair to assume that WFH is now firmly part of the business continuity new normal. In rapid fire form, this session will provide 13 key recommendations that you can apply now and into the future to improve the security of your WFH program.
Speaker:
-
5 Action Items for Creating an Incident Response Plan Relevant to Your Organization 2:05 pm
Presented by IP Pathways
If your network hasn’t been threatened yet, it will be. If your network has been breached, you know the chaos that can ensue. Whether the event is virtual in the form of a security breach, or physical in the event of power outage or natural disaster, losing functionality or data can have a crippling effect on your organization. A rigorously developed incident response (IR) plan will prepare you to quickly mobilize around minimizing the impacts. Join IP Pathways, Dennis Brown as he discusses what you need to know to create an effective incident response plan.
Speaker:
- Ransomware Negotiations 2:30 pm
- Break
-
Three Things You Need to Know About New CCPA Regulations 3:10 pm
Presented by Spirion
This presentation describes the many cyber security requirements of the California Consumer Privacy Act and offers insights into effectively meeting them in advance of the July 1, 2020 deadline. Included is an analysis of additional requirements recently published by the California Attorney General.
On March 11, 2020, the California Attorney General issued another set of revisions to the California Consumer Privacy Act of 2018 regulations. Updates include guidance on IP addresses, privacy policy disclosures, and denying deletion requests. While the regulations address many questions, they still leave much unanswered, and privacy/security professionals need clarity ahead of the July 1, 2020 compliance deadline. In this interactive presentation, a data protection industry veteran will offer perspective on the Regulations and three ways professionals can hedge their compliance bets ahead of the deadline.
Takeaways include:
- Understand the most pressing elements of the Regulations
- Learn how to prioritize and rationalize your compliance efforts
- How to leverage your efforts in advance of CCPA 2.0
Speaker:
-
Continuous Vulnerability Management: Striving for a 14-Day SLA 3:35 pm
Presented by Ivanti
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.
Speaker:
-
Afternoon Q&A Panel 4:00 pm
This session will feature all of the presenters from the afternoon agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.
- Break
- Closing Session