Event Schedule

  • The Evolution of Ransomware 8:35 am

    Presented by Sophos

    One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.

    Click to Expand

    Speaker:

    Kris Wayman
    Kris Wayman

    Kris Wayman

    Cybersecurity Analyst

    Collapse This Item

  • Risk Management – Insights in a World Gone Crazy 9:00 am

    Presented by Ivanti

    Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.

    Click to Expand

    Speaker:

    Phil Richards
    Phil Richards

    Phil Richards

    CISO at Ivanti

    Collapse This Item

  • Automate or Die Trying: The New Cybersecurity Reality 9:40 am

    Presented by Armor

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.

    Join our leading security and product development experts to learn:

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Speaker:

    Ike Nwabah
    Ike Nwabah

    Ike Nwabah

    Vice President of Markets and Insights

    Collapse This Item

  • Get Rich Quick With Ransomware: A Lazy Hacker’s Perspective for Enterprises 10:00 am

    Presented by Axis Security

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

    Click to Expand

    Speaker:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • Q&A: Empowering Users to Be the Best Human Firewall in Your Organization 10:45 am

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks.  Maybe with corporate devices, maybe not.  This makes it more important than ever we arm them with tools, training and the sense to look for suspicious activity.

    Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

    Click to Expand

    Collapse This Item

  • The Last Line of Defense: The Importance of Having a Robust and Comprehensive Data Protection Strategy 11:15 am

    Presented by Pure Storage

    Data protection is experiencing a resurgence.  Historically its been seen as an innovation backwater and as “insurance”, but with the growth of ransomware and cyber crime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack.  Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Should Be Stopping Attacker Movement They Reach Your Crown Jewels 11:35 am

    Presented by Illusive

    During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale. The giant, sudden transition by millions of employees to working from home has only made the attack surface even more volatile.

    In this webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels including:

    How normal business activity creates dangerous opportunities for malicious lateral movement

    The cyber hygiene functions needed to harden the network against modern APT attacks

    How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management

    Click to Expand

    Speaker:

    Wade Lance
    Wade Lance

    Wade Lance

    Field CTO - Cyber Detection and Response

    Collapse This Item

  • Defending Our Nation’s Critical Infrastructure in a Time of Crisis 12:00 pm

    Presented by United States Secret Service

    Ian will discuss the COVID19 pandemic and how the current telework posture of the private and public workforce has affected criminal activity, cyber hygiene, and the incident response process. He will discuss the continued importance of having a relationship with federal law enforcement and the need for timely reporting of incidents and events, especially if the incident involves the loss of money through U.S. and International financial systems.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • Pragmatic Protection From Insider Threats 1:10 pm

    Presented by Sherpa Software

    Even prior to COVID-19, more people were working from home than ever before. According to the Bureau of Labor, 25% of Americans performed some work from their homes in 2017-2018. Additionally, the Federal Reserve reports that the share of the workforce that works from home has tripled in the last 15 years. In this session we’ll talk about the insider threat considerations — both intentional and accidental — that a dispersed workforce can present. We’ll also share some real-world examples of the steps our Fortune 100 customers are taking to mitigate their insider risk factors.

    Click to Expand

    Speaker:

    Rick Wilson

    Rick Wilson

    VP Strategy & Solutions

    Collapse This Item

  • Identity and Access Management: Embracing the Complexity 1:30 pm

    Presented by Auth0

    Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.

    Click to Expand

    Speaker:

    Matthew Marji
    Matthew Marji

    Matthew Marji

    Senior Product Security Engineer

    Collapse This Item

  • Q&A: Grey Crime - The Rise of State Sponsored Attacks on Business 2:10 pm

    Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets.  Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections.

    Our panelists today will talk about the problem, and what US enterprises are doing to prepare themselves for these situations

    Click to Expand

    Collapse This Item

  • From ‘Right Now’ Answers to Tomorrow’s Solutions 2:30 pm

    Presented by cStor

    You can’t deny it; the biggest driver for accelerating and enabling a remote and mobile workforce has happened. The perimeter has vanished and the old ideas of securing corporate resources are gone for good. For many organizations this change happened, quite literally, overnight.

    You are not alone. Many organizations scrambled to do something, anything to enable their workforce to do their jobs remotely RIGHT NOW. When we made those quick decisions, we didn’t even know what tomorrow would look like. Were those rapid answers really the best solutions to carry your organization into the future and do so securely? Now that we’re starting to see what the future will hold, it’s time to check our decisions to ensure they align with our future goals. Join our session as we discuss areas to consider as you validate security solutions for next year’s reality.

    Click to Expand

    Speaker:

    Andrew Roberts
    Andrew Roberts

    Andrew Roberts

    Chief Cybersecurity Strategist

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 3:00 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Speaker:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Q&A: Rescue From Ransomware 3:25 pm

    What to Know Before You Get That Nasty Email

    Ransomware has been a hot topic of 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response.  Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line. 

    Click to Expand

    Collapse This Item

  • Building Cyber Resilience: Finding Factors Not Fault 4:00 pm

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 4:15 pm

    Presented by Proofpoint

    Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.

    Join our session and learn about:

    • What is BEC and EAC? And how do they work?
    • What are the common attack tactics regarding this new form of email threats?
    • Best practices to defend against BEC and EAC
    Click to Expand

    Speaker:

    Ash Valeski
    Ash Valeski

    Ash Valeski

    Email Security Product Evangelist

    Collapse This Item

  • Closing Session
Partners