Event Schedule

  • Best Practices for Implementing a Multi-Cloud, Security, Compliance and Governance Program 9:00 am

    Presented by Check Point Software Technologies

    Lack of visibility of cloud assets, identifying misconfigurations and enforcing security, regulatory and corporate compliance policies are the most common problems experienced when migrating to the public cloud. According to Gartner, “through 2025, at least 99% of cloud security failures will be the customer’s fault.”

    This session will explore the challenges of the Public Cloud Shared Responsibility Model, and present a 6-step process that can be used to develop a more secure public cloud framework for your business.

    We will show how new solutions for Cloud Security Posture Management can provide a “single source of truth” for managing the complexity of multi-cloud infrastructures, all while enforcing your governance and compliance policies.

    Click to Expand

    Speaker:

    Collapse This Item

  • Continuous Vulnerability Management: Striving for a 14-Day SLA 9:50 am

    Presented by Ivanti

    The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.

    When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.

    Click to Expand

    Speaker:

    Chris Goettl
    Chris Goettl

    Chris Goettl

    Director of Product Management, Security

    Collapse This Item

  • Break
  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 10:55 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Morning Q&A Panel 11:20 am

    This session will feature all of the presenters from the morning agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.

    Click to Expand

    Collapse This Item

  • Cyber Security Advisor (CSA) With the Department of Homeland Security’s Cybersecurity 11:45 am

    Presented by CISA

    Jason Burt is a Cyber Security Advisor (CSA) with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) assigned to Federal Region IV. CISA is the Nation’s risk advisor. The Agency protects the Nation’s critical infrastructure from physical and cyber threats by working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. CISA established ten regional offices across the country to improve the delivery of the department’s services to critical infrastructure owners and operators and state, local, tribal, and territorial partners (SLTT). CSAs are the front-facing cyber experts supporting regional operations capabilities. Mr. Burt serves as the liaison and focal point for communications, coordination, and outreach. He promotes cyber preparedness and resiliency, incident response, risk mitigation and situational awareness and manages major cyber engagements, championing cyber resilience to public and private sector partners. Region IV encompasses eight states, including Mississippi, Alabama, Florida, Georgia, North Carolina, South Carolina, Tennessee, and Kentucky. Mr. Burt has been with the Department for six years.

    Prior to becoming a CSA, he held positions as a Senior Watch Officer for CISA’s National Cyber Protection System (NCPS) Network Operation Center (NOC), as well as serving as a Network and Systems Administrator for the Department of Veterans Affairs. Additionally, Mr. Burt is also a Cyber Intelligence Officer in the United States Air Force Reserve. In this role, he provides direct support to multiple Air Force Cyber Protection Teams tasked with defending key Air Force assets and resources against cyber attack.

    Richard Dean has been with the Secret Service for 20 years and has held positions with the Secret Service’s Washington Field Office and Presidential Protective Division. Richard currently manages the Tampa Field Office’s investigative operations. In 2015, Richard helped create the Tampa Bay Electronic Crimes Task Force which established a strategic alliance of federal, state, and local law enforcement agencies, academia, private sector, and technical experts, to confront and suppress technology-based criminal activity that endangers the integrity of our nation’s financial infrastructure.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Cybercrime, Inc. the Business of the Dark Web 12:55 pm

    Presented by Armor

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.

    The session aims to expose the inner workings and business of the cyber underground, focusing on the following:

    • Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
    • Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
    • Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
    • How businesses can protect themselves from all levels of cybercriminals; emphasis on the importance of investing in proactive threat hunting
    Click to Expand

    Speaker:

    Michael Mayes
    Michael Mayes

    Michael Mayes

    Senior Writer & Researcher

    Collapse This Item

  • Three Things You Need to Know About New CCPA Regulations 1:45 pm

    Presented by Spirion

    This presentation describes the many cyber security requirements of the California Consumer Privacy Act and offers insights into effectively meeting them in advance of the July 1, 2020 deadline. Included is an analysis of additional requirements recently published by the California Attorney General.

    On March 11, 2020, the California Attorney General issued another set of revisions to the California Consumer Privacy Act of 2018 regulations.  Updates include guidance on IP addresses, privacy policy disclosures, and denying deletion requests.  While the regulations address many questions, they still leave much unanswered, and privacy/security professionals need clarity ahead of the July 1, 2020 compliance deadline.  In this interactive presentation, a data protection industry veteran will offer perspective on the Regulations and three ways professionals can hedge their compliance bets ahead of the deadline.

    Takeaways include:

    • Understand the most pressing elements of the Regulations
    • Learn how to prioritize and rationalize your compliance efforts
    • How to leverage your efforts in advance of CCPA 2.0
    Click to Expand

    Speaker:

    Scott Giordano
    Scott Giordano

    Scott Giordano

    VP and Sr Counsel, Privacy & Compliance

    Collapse This Item

  • Break
  • A Centralized Identity Strategy Using Standards Helps Minimize Threats 2:25 pm

    Presented by Auth0

    Modern architectures continue to become more distributed and fractured.  How can developers can continue to develop and build what they understand without having to become identity experts?  How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.

    Click to Expand

    Speaker:

    Carlos Mostek
    Carlos Mostek

    Carlos Mostek

    Principal Solution Architect

    Collapse This Item

  • The Evolution of Ransomware 2:50 pm

    Presented by Sophos

    One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.

    Click to Expand

    Speaker:

    Brian Ritchie
    Brian Ritchie

    Brian Ritchie

    Senior Solutions Engineer

    Collapse This Item

  • Secure the Enterprise With AI-Powered Adaptive Authentication 3:15 pm

    Presented by OneLogin

    With the risk of cyberattack continuing to increase due to perpetrators finding smarter and less-detectable ways to circumvent security, it is becoming increasingly difficult for today’s businesses to implement solutions that evolve as the methods of attackers evolve.

    In the pursuit of finding more ways to secure the enterprise, the user experience is often sacrificed, causing end-users to become increasingly agitated and unable to get work done due to account lockout.

    Join our session as we discuss how AI-powered authentication is the solution you need to provide an optimal balance between securing your data and ensuring users enjoy seamless access to business-critical applications.

    Click to Expand

    Speaker:

    Collapse This Item

  • Afternoon Q&A Panel 3:40 pm

    This session will feature all of the presenters from the afternoon agenda, answering questions from the audience live via video, in a panel format. Each presenter will take questions that pertain to their topic, and if there is time, they will also respond to a few questions about larger trends and directions that face all members of the cyber-security community.

    Click to Expand

    Collapse This Item

  • Closing Session
Partners