Event Schedule

  • Surviving the Digital Storm – IoT Security Deluge 8:50 am

    Presented by Check Point

    We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business processes with higher efficiency.

    This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.

    Click to Expand

    Speaker:

    Joel Hollenbeck
    Joel Hollenbeck

    Joel Hollenbeck

    Office of the CTO

    Collapse This Item

  • Reducing Friction and Managing Remote Work Environments 9:10 am

    Presented by Automox

    The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.

    During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.

    Click to Expand

    Spaaker:

    Jay Goodman
    Jay Goodman

    Jay Goodman

    Manager of Product Marketing

    Collapse This Item

  • Threat Hunting & Modern Security: 3 Fundamental Flaws 9:50 am

    Presented by Criticalstart

    Security Operations is a discipline continuously evolving – with the evolution of tools and processes, there are still many flaws that exist around people & process. We will examine 3 specific flaws of modern security operations: 1.) Risk Acceptance 2.) SOC Alert Overload 3.) Inability to mitigate all Zero-Day Attacks.

    We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?”  We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.

    Click to Expand

    Speaker:

    Jim Rohde
    Jim Rohde

    Jim Rohde

    Director of Security Engineering

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:15 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Speaker:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Identity: Expert Panel Discussion 10:45 am

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?

    Click to Expand

    Collapse This Item

  • Developing Your Identity Strategy 11:15 am

    Presented by SailPoint

    Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.

    Click to Expand

    Speaker:

    Rob Wilson
    Rob Wilson

    Rob Wilson

    Sr. Solution Engineer

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 11:30 am

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Break
  • Keynote: How CISA Is Working With Partners to Defend Against Today’s Threats and Collaborating to Build a More Secure and Resilient Infrastructure for the Future 12:20 pm

    Presented by CISA

    The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the heart of mobilizing a collective defense as we lead the Nation’s efforts to understand and manage risk to our critical infrastructure. Considering a large majority of our critical infrastructure is owned and operated by the private sector, collaboration is imperative to secure and allow us to address the systemic risks facing U.S. critical infrastructure. This talk discusses how CISA is working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future.

    Click to Expand

    Speaker:

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 1:05 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence.  Historically its been seen as an innovation backwater and as “insurance”, but with the growth of ransomware and cyber crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack.  Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Managing Digital Risk Amid Disruption 1:30 pm

    Presented by RSA

    Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.

    Click to Expand

    Speaker:

    Ben Smith
    Ben Smith

    Ben Smith

    Field CTO

    Collapse This Item

  • Defense in Depth: Expert Panel Discussion 2:05 pm

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?

    Click to Expand

    Collapse This Item

  • Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware. 2:30 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Offensive AI vs. Defensive AI: Battle of the Algorithms 2:50 pm

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

    In this session, learn about:

    Paradigm shifts in the cyber landscape

    Advancements in offensive AI attack techniques

    The Immune System Approach to cyber security and defensive, Autonomous Response capabilities

    Real-world examples of emerging threats that were stopped with Cyber AI

    Click to Expand

    Speaker:

    David Masson
    David Masson

    David Masson

    Director of Enterprise Security at Darktrace

    Collapse This Item

  • WFH2020: Expert Panel Discussion 3:25 pm

    WFH2020: Cybersecurity Surviving & Thriving Amid the Pandemic

    We all went virtual this year… unexpectedly.  As COVID-19 instantiates itself as the biggest force for change in your IT infrastructure (more than your CISO, CIO, and CEO combined), what have we learned and what will we do differently going forward for the balance of 2020 and beyond?

    Click to Expand

    Collapse This Item

  • Ransomware Recovery With Speed and Precision 3:50 pm

    Presented by Crowdstrike

    Ransomware attacks cause major business disruptions resulting in significant time expenditures, technical resources, and related costs in order to return to full business operations. The traditional recovery approach using backups and reimaging or simply paying the ransom fails to address the root cause of the attack and remove persistent threats. This failure leaves organizations open to secondary attacks, negating initial efforts. Our experts from the front lines of incident response and endpoint recovery are helping organizations effectively recover from attacks with speed and precision to surgically remove ransomware. Join us for this informative session to learn just how we do it.

    Click to Expand

    Speaker:

    Eric Bodkin
    Eric Bodkin

    Eric Bodkin

    Endpoint Recovery Services

    Collapse This Item

  • Understanding and Combating Credential Stuffing Attacks 4:15 pm

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    How credential stuffing attacks work

    What effect they can have on your company

    Steps to detect and mitigate these attacks

    Click to Expand

    Speaker:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • Closing Session + Prize Drawing
Partners