Event Schedule

  • The IoT Storm… Will We Survive the Coming Deluge? 9:00 am

    Presented by Check Point Software Technologies

    IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!

    Click to Expand

    Speaker:

    Robert Falzon
    Robert Falzon

    Robert Falzon

    Engineering Office of the CTO

    Collapse This Item

  • The Evolution of Ransomware 9:20 am

    Presented by Sophos

    One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.

    Click to Expand

    Speaker:

    Kris Wayman
    Kris Wayman

    Kris Wayman

    Cybersecurity Analyst

    Collapse This Item

  • Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises 10:00 am

    Presented by Axis Security

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

    Click to Expand

    Speaker:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • Automate or Die Trying: The New Cybersecurity Reality 10:30 am

    Presented by Armor

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.

    Join our leading security and product development experts to learn:

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Speaker:

    Ryan Smith
    Ryan Smith

    Ryan Smith

    Vice President of Product

    Collapse This Item

  • QA Panel #1
  • Building Cyber Resilience: Finding Factors Not Fault 11:30 am

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Lessons Learned From Real-Life Ransomware Remediation Projects 11:55 am

    Presented by Dasher Technologies

    Ransomware has organizations of all sizes and across all industries concerned that they may be the next to get attacked.  Hackers have deployed wide-scale efforts to focus on known vulnerabilities, target users who are least prepared and may least expect it, and hone in on gaps in security with targeted exploits.

    While helping to remediate active ransomware, the Dasher team has taken the time to pull together best practices and lessons learned from working with clients, with particular focus on the trends in attacks seen over the past few years.

    In this presentation, Lead Solution Architect Kellen Christiensen will talk through this experience, sharing new information the team has learned.  He will also make recommendations on what steps your organization should be taking in order to help prevent future Ransomware attacks.

    Click to Expand

    Speaker:

    Kellen Christensen
    Kellen Christensen

    Kellen Christensen

    Sr. Solution Architect, Cybersecurity

    Collapse This Item

  • Lunch Break
  • Defending Our Nation’s Critical Infrastructure in a Time of Crisis 12:45 pm

    Presented by Cybersecurity & Infrastructure Security Agency

    Klint will discuss the linkages between cyberspace and physical systems and best practices for reducing those vulnerabilities. Resilience is just as important as defense, and forming a relationship with CISA will help you as a security professional to stay up-to-date, and know how to report incidents to your local authorities.

    He  will provide an in-depth analysis of securing IT assets and maintaining operational capabilities.  CISA works closely with industry leaders, technical experts, and academic leaders throughout the region. Today, they will share some insights and advice on best practices, policies and procedures, based on the guidance from The Department of Homeland Security – Cybersecurity and Infrastructure Security Agency (CISA).

    Our Chief Strategy Officer, Michael Hiskey, will introduce him and wrap–up the presentation before we take a short break and continue with our afternoon educational sessions.

    Click to Expand

    Speaker:

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Collapse This Item

  • CyberSecurity Ratings: Market Forces and Future Considerations 1:15 pm

    Presented by Security Scorecard

    In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.

    He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.

    David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.

    Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management.  He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.

    Click to Expand

    Speaker:

    David Ortiz
    David Ortiz

    David Ortiz

    Senior Director of Systems Engineering

    Collapse This Item

  • The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps 1:45 pm

    Presented by rmSource

    It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes

    Click to Expand

    Speaker:

    Michael Sullivan
    Michael Sullivan

    Michael Sullivan

    CISSP, CEH

    Collapse This Item

  • Q&A: Managing all Types of Risk in Today's Cybersecurity Landscape
  • Understanding and Combating Credential Stuffing Attacks 2:45 pm

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    • How credential stuffing attacks work
    • What effect they can have on your company
    • Steps to detect and mitigate these attacks
    Click to Expand

    Speaker:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 3:00 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Q&A: Election Security
  • Introduction to Proactive Prevention 4:00 pm

    Presented by Morphisec

    Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.  Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.

    Click to Expand

    Speaker:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • Closing Session
  • Solution Showcase Open Until 6:00 PM
Partners