Virtual Summit
4-Corners Virtual Cybersecurity Summit
The 4-Corners Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Sep 17
Event Schedule
-
The Evolution of Ransomware 8:35 am
Presented by Sophos
One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.
Speaker:
-
Risk Management – Insights in a World Gone Crazy 9:00 am
Presented by Ivanti
Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.
Speaker:
-
Automate or Die Trying: The New Cybersecurity Reality 9:40 am
Presented by Armor
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our leading security and product development experts to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
Speaker:
-
Get Rich Quick With Ransomware: A Lazy Hacker’s Perspective for Enterprises 10:00 am
Presented by Axis Security
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.
Speaker:
-
Q&A: Empowering Users to Be the Best Human Firewall in Your Organization 10:45 am
Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever we arm them with tools, training and the sense to look for suspicious activity.
Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.
-
The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 11:15 am
Presented by Pure Storage
Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of ransomware and cyber crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.
Speaker:
-
Should Be Stopping Attacker Movement They Reach Your Crown Jewels 11:35 am
Presented by Illusive
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale. The giant, sudden transition by millions of employees to working from home has only made the attack surface even more volatile.
In this webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels including:
How normal business activity creates dangerous opportunities for malicious lateral movement
The cyber hygiene functions needed to harden the network against modern APT attacks
How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
Speaker:
-
Defending Our Nation’s Critical Infrastructure in a Time of Crisis 12:00 pm
Presented by United States Secret Service
Ian will discuss the COVID19 pandemic and how the current telework posture of the private and public workforce has affected criminal activity, cyber hygiene, and the incident response process. He will discuss the continued importance of having a relationship with federal law enforcement and the need for timely reporting of incidents and events, especially if the incident involves the loss of money through U.S. and International financial systems.
Speaker:
- Break
-
Pragmatic Protection From Insider Threats 1:10 pm
Presented by Sherpa Software
Even prior to COVID-19, more people were working from home than ever before. According to the Bureau of Labor, 25% of Americans performed some work from their homes in 2017-2018. Additionally, the Federal Reserve reports that the share of the workforce that works from home has tripled in the last 15 years. In this session we’ll talk about the insider threat considerations — both intentional and accidental — that a dispersed workforce can present. We’ll also share some real-world examples of the steps our Fortune 100 customers are taking to mitigate their insider risk factors.
Speaker:
-
Identity and Access Management: Embracing the Complexity 1:30 pm
Presented by Auth0
Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.
Speaker:
-
Q&A: Grey Crime - The Rise of State Sponsored Attacks on Business 2:10 pm
Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets. Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections.
Our panelists today will talk about the problem, and what US enterprises are doing to prepare themselves for these situations
-
From ‘Right Now’ Answers to Tomorrow’s Solutions 2:30 pm
Presented by cStor
You can’t deny it; the biggest driver for accelerating and enabling a remote and mobile workforce has happened. The perimeter has vanished and the old ideas of securing corporate resources are gone for good. For many organizations this change happened, quite literally, overnight.
You are not alone. Many organizations scrambled to do something, anything to enable their workforce to do their jobs remotely RIGHT NOW. When we made those quick decisions, we didn’t even know what tomorrow would look like. Were those rapid answers really the best solutions to carry your organization into the future and do so securely? Now that we’re starting to see what the future will hold, it’s time to check our decisions to ensure they align with our future goals. Join our session as we discuss areas to consider as you validate security solutions for next year’s reality.
Speaker:
-
Introduction to Risk-Based Vulnerability Management 3:00 pm
Presented by Kenna Security
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
- Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
- Details the findings on how risk-based is the way to get ahead in vulnerability management
- Lays out several factors that drive better remediation performance
- Provides steps for setting up a successful risk-based vulnerability management program
Speaker:
-
Q&A: Rescue From Ransomware 3:25 pm
What to Know Before You Get That Nasty Email
Ransomware has been a hot topic of 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response. Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
-
Building Cyber Resilience: Finding Factors Not Fault 4:00 pm
Presented by eSentire
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Speaker:
-
Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 4:15 pm
Presented by Proofpoint
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
- What is BEC and EAC? And how do they work?
- What are the common attack tactics regarding this new form of email threats?
- Best practices to defend against BEC and EAC
Speaker:
- Closing Session