Event Schedule

  • Day 1
  • Securing Digital Communication: Accelerating Your Digital Business 8:45 am

    Presented by Echoworx

    Entire workforces are pivoting to 100 per cent digital everything – motivating security leaders to accelerate their digital business initiatives – but how does this translate for sensitive documents and confidential communications? Many organizations are not well-prepared.

    Learn more about the critical role email data protection plays in your digital business acceleration and how to choose an encryption solution which works – and will actually be used – throughout your organization.

    Join Echoworx’s Senior Director of Market Intelligence Jacob Ginsberg as he talks about:

    • Importance of fostering flexible workflows
    • How to choose email data protection based on business value and impact
    • How others aresuccessfully securing communications today, including the hidden benefits
    Click to Expand

    Collapse This Item

  • Welcome Session 9:00 am

    More than 80,000 members of the Data Connectors Cybersecurity Community are in Southern California. This TWO-DAY Virtual Summit will be conducted in real time, with amazing panels, presentations, exhibits & demonstrations!

    Click to Expand

    Collapse This Item

  • Threat Hunting & Modern Security: 3 Fundamental Flaws 9:05 am

    Presented by CriticalStart

    Security Operations is a discipline continuously evolving – with the evolution of tools and processes , there are still 3 fundamental flaws that exist with Modern Security Operations.  We will examine 3 specific flaws of modern security operations:

    • Risk Acceptance
    • SOC Alert Overload
    • Inability to mitigate all Zero-Day Attacks.

    We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?”  We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.

    Click to Expand

    Speaker:

    Jim Rohde
    Jim Rohde

    Jim Rohde

    Director of Security Engineering

    Collapse This Item

  • Get Rich Quick With Ransomware: A Lazy Hacker’s Perspective for Enterprises 9:30 am

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

    Click to Expand

    Speaker:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • The Fear Factor: Reducing Risk in Your Environment 10:15 am

    Presented by Logically

    Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:

    • A clear understanding of the scare tactics organizations are facing from cyber criminals
    • Threats and vulnerabilities that exist in their environment
    • Steps organizations can take to minimize the risks of their organization’s employees
    • This session will help attendees to understand that fear should not be a factor in their approach to security.
    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Lessons Learned From Real-Life Ransomware Remediation Projects 10:30 am

    Presented by Dasher Technologies

    Ransomware has organizations of all sizes and across all industries concerned that they may be the next to get attacked.  Hackers have deployed wide-scale efforts to focus on known vulnerabilities, target users who are least prepared and may least expect it, and hone in on gaps in security with targeted exploits.

    While helping to remediate active ransomware, the Dasher team has taken the time to pull together best practices and lessons learned from working with clients, with particular focus on the trends in attacks seen over the past few years.

    In this presentation, Senior Solution Architect, Kellen Christensen, will talk through this experience, sharing new information the team has learned.  He will also make recommendations on what steps your organization should be taking in order to help prevent future Ransomware attacks.

    Click to Expand

    Speaker:

    Kellen Christensen
    Kellen Christensen

    Kellen Christensen

    Sr. Solution Architect, Cybersecurity

    Collapse This Item

  • Ransomware – to Pay, or Not to Pay? 11:00 am

    Ransomware has been a hot topic of 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response.  Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    Click to Expand

    Collapse This Item

  • Small Business Deserves Big Protection With Cisco Umbrella 11:30 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Join Rohit where you’ll learn more about small business cybersecurity and why DNS protection makes a difference.

    Click to Expand

    Speaker:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Break
  • Confessions of a Rogue FBI Agent 12:15 pm

    Presented by KCE Cyber

    1999 – the early days of cybercrime. Identity theft was a new idea, and the FBI birthed a new division to handle it.  It had never been done before – but a few agents started it, flew by the seat of their pants, and traversed the federal law enforcement landscape to blaze a new path, fighting criminals that worked outside our boarders.

    EJ Hilbert was there at the beginning. In this keynote presentation, he’ll talk about case studies from that time, and walk through the scintillating story of his own travelais, which led him to bring down the first major Russian CyberHacker, and later land him squarely in the crosshairs of an international spy thriller: corporate espionage, rouge agents, questionable officials and bad actors.

    You’ll be excited and enlightened by the story, and in the process learn more about today’s threat landscape.  Moreover, you’ll understand why the current cybersecurity environment goes beyond traditional law enforcement – requiring vigilance on the part of corporations and especially cybersecurity professionals.

    Click to Expand

    Speaker:

    E.J. Hilbert
    E.J. Hilbert

    E.J. Hilbert

    Former FBI Cyber Agent, CISO & Founder at KCECyber

    Collapse This Item

  • Is Ransomware Winning? 1:10 pm

    Presented by Ivanti

    Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are getting nastier too. This has led to incredible increases in the average ransoms paid over the past eighteen months. In this session, we will look at recent ransomware trends, the critical changes to threat actor behaviors, and discuss the strategies and technologies organizations need to defend themselves against this evolving threat.

    Click to Expand

    Speaker:

    Chris Goettl
    Chris Goettl

    Chris Goettl

    Director of Product Management, Security

    Collapse This Item

  • Visibility in the Cloud Must Be Part of Your Security Strategy 1:30 pm

    Presented by Gigamon

    As we move to the cloud we often overlook the issue around planning for security. We size for compute and resilience but what about security and compliance? Lets talk about a few of the issues around moving to the cloud from a security point of view and a few ideas on resolving the issues this new architecture presents.

    Click to Expand

    Speaker:

    James Mandelbaum
    James Mandelbaum

    James Mandelbaum

    Senior Security Engineer

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 2:20 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Speaker:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Interview: Cybersecurity and Data – From GDPR to CCPA 2:45 pm

    Presented by Spirion and Data connectors

    In a world where more and more companies are completely virtual, it is vital to keep data protected. When hackers want to access personal data, they can do so with ease as de-identification is no longer enough to keep it safe. If the bad actors obtain this personal data, there can be severe consequences from the GDPR and the CCPA.

    Join Scott Giordano, Vice President, and Senior Legal Counsel for Privacy and Compliance at Spirion, as he delves into the evolving topics that surround the legal end of data protection. The specificities of data protection laws can differ between every state in America. Come learn about the differences between the GDPR vs the CCPA, the legal ramifications of data breaches from the EU and CCPA, and how Spirion can help to protect your data.

    Click to Expand

    Interviewer:

    Michael Hiskey
    Michael Hiskey

    Michael Hiskey

    Speaker:

    Scott Giordano
    Scott Giordano

    Scott Giordano

    VP and Sr Counsel, Privacy & Compliance

    Collapse This Item

  • Q&A: Cloud Security 3:05 pm

    Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers. Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.

    This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed.

    Click to Expand

    Panel Participants:

    James Mandelbaum
    James Mandelbaum

    James Mandelbaum

    Senior Security Engineer

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Lead of Solution Architecture

    Collapse This Item

  • The 2020 Cybersecurity Skills Shortage 3:50 pm

    Presented by Osterman Research

    The cybersecurity skills shortage is real and getting worse: according to ISC(2), nearly three million cybersecurity positions worldwide are currently unfilled, and Cyberseek reports that more than 300,000 positions are available just in the United States. A lack of cybersecurity analysts, researchers, and other security experts means that bad actors have even more of an upper hand because there are fewer people available to investigate potential threats, analyze attacks, and remediate security problems. The lockdowns arising from the COVID-19 pandemic has made the problem worse.

    Osterman Research has conducted an in-depth study and produced a white paper focused squarely on this issue, and Michael Osterman will be presenting the results of that research. In this session you will learn:

    • The seriousness with which your peers taking the cybersecurity skills shortage.
    • What they’re doing to address it.
    • How executive management and employees view their organizations’ cybersecurity function.
    • How cybersecurity professionals are dealing with the stresses of doing their job.
    • How the cybersecurity skills shortage might be solved, both in the near-term and longer term.
    Click to Expand

    Speaker:

    Michael Osterman
    Michael Osterman

    Michael Osterman

    Principle Analyst at Osterman Research

    Collapse This Item

  • Day 2
  • Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices 8:45 am

    Presented by Ordr

    For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.

    Join Ordr’s CSO Jeff Horne in this webinar to learn:

    • Risks and vulnerabilities associated with unmanaged and IoT devices
    • Why traditional networking and security tools fall short
    • Security best practices to protect these devices without impacting business operations
    Click to Expand

    Speaker:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Reducing Friction and Managing Remote Work Environments 9:05 am

    Presented by Automox

    The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.

    During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.

    Click to Expand

    Speaker:

    Jay Goodman
    Jay Goodman

    Jay Goodman

    Manager of Product Marketing

    Collapse This Item

  • Automate or Die Trying: The New Cybersecurity Reality 9:30 am

    Presented by Armor

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.

    Join our leading security and product development experts to learn:

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Speaker:

    Ike Nwabah
    Ike Nwabah

    Ike Nwabah

    Vice President of Markets and Insights

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 10:15 am

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Offensive AI vs. Defensive AI: Battle of the Algorithms 10:40 am

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

    In this session, learn about:

    • Paradigm shifts in the cyber landscape
    • Advancements in offensive AI attack techniques
    • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
    • Real-world examples of emerging threats that were stopped with Cyber AI
    Click to Expand

    Speaker:

    David Masson
    David Masson

    David Masson

    Director of Enterprise Security at Darktrace

    Collapse This Item

  • Q&A: AI & ML in Cybersecurity 11:00 am

    Can We ‘Science the Heck’ Out of Trouble?

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Click to Expand

    Panel Participants:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    David Masson
    David Masson

    David Masson

    Director of Enterprise Security at Darktrace

    Brian Robison
    Brian Robison

    Brian Robison

    Chief Evangelist

    Collapse This Item

  • Proactive Endpoint Protection: What It Is and What It Is Not 11:30 am

    Presented by Morphisec

    Breach damage caused by hackers has accelerated in 2020 despite the fact that businesses are spending more than ever on endpoint security. This is because the incremental improvements being made to EDR and NGAV are outmatched by the fundamental changes we’ve seen in adversarial techniques. Morphisec’s Sam Osterhout will show out a proactive approach to endpoint security offers a means of preventing even the most advanced zero-days, fileless attacks, and exploits. This is not a better, faster, improved version of the tools that have failed us in the past, it’s an entirely new approach to endpoint security that can be quickly and effectively implemented by any business.

    Click to Expand

    Speaker:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • Break
  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 1:20 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Understanding and Combating Credential Stuffing Attacks 1:40 pm

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    • How credential stuffing attacks work
    • What effect they can have on your company
    • Steps to detect and mitigate these attacks
    Click to Expand

    Speaker:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer at Auth0

    Collapse This Item

  • Hacking Exposed: Learning From the Adversaries 2:15 pm

    Presented by BlackBerry

    Fileless attacks and fileless malware have grown in sophistication, especially in their ability to obfuscate and hide from both traditional and next-generation anti-virus. Join us to discover the techniques being used by APT32/OceanLotus to attack their victims and learn how to replicate them to better test your defenses. In this very short demonstration, you will learn techniques to make a weaponized document that is designed to not just bypass AV but also human threat hunters through a sophisticated method of obfuscation and the use of built-in trusted tools. The document is capable of allowing the attacker to gain remote access to the victim system and exfiltrate sensitive data. You will get to see, firsthand, the attack compromise both a Windows PC as well as a MacOS.

    Click to Expand

    Speaker:

    Brian Robison
    Brian Robison

    Brian Robison

    Chief Evangelist

    Collapse This Item

  • Using Security Testing to Know What’s Working 2:45 pm

    Presented by Cymulate

    The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.

    Click to Expand

    Speaker:

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Lead of Solution Architecture

    Collapse This Item

  • Q&A: Defense-in-Depth 2:55 pm

    3rd Party Risk

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Collapse This Item

  • A People-Centric Approach to Cyber Risk Management 3:45 pm

    Presented by Proofpoint

    Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated.

    Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks.

    During this presentation, we’ll cover:

    • The clearly defined risk areas that are frequently targeted in cyber-attacks, with clear examples and use cases
    • How organizations can implement a People-Centric security approach, decreasing their vulnerability to cyber threats.
    Click to Expand

    Speaker:

    Jack Johnson
    Jack Johnson

    Jack Johnson

    Sr. Systems Engineer

    Collapse This Item

  • The Dark Web: A New Underground Economy 4:00 pm

    How Dark Markets are Innovating and Why It Matters

    Throughout history, underground economies thrive following war, natural disaster or political upheaval. While difficult to accurately discern, the underground economy in the U.S. is estimated to be 11-12% of GDP or $2.5 trillion–excluding illegal drug sales, gambling or prostitution! Over the last two years, dark web marketplaces and other underground commerce methods have been innovative and growing, preparing for a new economic reality. While drugs are still popular, malware and stolen data have become far more lucrative for sellers and buyers. In this session, analyst Michael Mayes will share the latest on dark web market innovation and activity, including the sale of COVID-19 related drugs and supplies.

    Click to Expand

    Collapse This Item

Partners