Florida Caribbean Virtual Cybersecurity Summit
The Florida Caribbean Cybersecurity Conference Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Florida Caribbean Virtual Cybersecurity Summit
Thu. Oct 22
The IoT Storm… Will We Survive the Coming Deluge? 9:00 am
Presented by Check Point Software Technologies
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
The Evolution of Ransomware 9:20 am
Presented by Sophos
One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises 10:00 am
Presented by Axis Security
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.
Automate or Die Trying: The New Cybersecurity Reality 10:30 am
Presented by Armor
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our leading security and product development experts to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
- QA Panel #1
Building Cyber Resilience: Finding Factors Not Fault 11:30 am
Presented by eSentire
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Lessons Learned From Real-Life Ransomware Remediation Projects 11:55 am
Presented by Dasher Technologies
Ransomware has organizations of all sizes and across all industries concerned that they may be the next to get attacked. Hackers have deployed wide-scale efforts to focus on known vulnerabilities, target users who are least prepared and may least expect it, and hone in on gaps in security with targeted exploits.
While helping to remediate active ransomware, the Dasher team has taken the time to pull together best practices and lessons learned from working with clients, with particular focus on the trends in attacks seen over the past few years.
In this presentation, Lead Solution Architect Kellen Christiensen will talk through this experience, sharing new information the team has learned. He will also make recommendations on what steps your organization should be taking in order to help prevent future Ransomware attacks.
- Lunch Break
Defending Our Nation’s Critical Infrastructure in a Time of Crisis 12:45 pm
Presented by Cybersecurity & Infrastructure Security Agency
Klint will discuss the linkages between cyberspace and physical systems and best practices for reducing those vulnerabilities. Resilience is just as important as defense, and forming a relationship with CISA will help you as a security professional to stay up-to-date, and know how to report incidents to your local authorities.
He will provide an in-depth analysis of securing IT assets and maintaining operational capabilities. CISA works closely with industry leaders, technical experts, and academic leaders throughout the region. Today, they will share some insights and advice on best practices, policies and procedures, based on the guidance from The Department of Homeland Security – Cybersecurity and Infrastructure Security Agency (CISA).
Our Chief Strategy Officer, Michael Hiskey, will introduce him and wrap–up the presentation before we take a short break and continue with our afternoon educational sessions.
Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)
CyberSecurity Ratings: Market Forces and Future Considerations 1:15 pm
Presented by Security Scorecard
In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.
He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.
David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.
Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management. He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps 1:45 pm
Presented by rmSource
It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes
- Q&A: Managing all Types of Risk in Today's Cybersecurity Landscape
Understanding and Combating Credential Stuffing Attacks 2:45 pm
Presented by Auth0
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
- How credential stuffing attacks work
- What effect they can have on your company
- Steps to detect and mitigate these attacks
The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 3:00 pm
Presented by Pure Storage
Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.
- Q&A: Election Security
Introduction to Proactive Prevention 4:00 pm
Presented by Morphisec
Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer. Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
- Closing Session
- Solution Showcase Open Until 6:00 PM