Virtual Summit
New Orleans & Little Rock Virtual Cybersecurity Summit
The New Orleans & Little Rock Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Sep 24
Event Schedule
-
Threat Hunting & Modern Security: 3 Fundamental Flaws 9:20 am
Presented by CriticalStart
Security Operations is a discipline continuously evolving – with the evolution of tools and processes , there are still 3 fundamental flaws that exist with Modern Security Operations. We will examine 3 specific flaws of modern security operations:
- Risk Acceptance
- SOC Alert Overload
- Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Speaker:
-
Threat Intelligence and Layered Security in the Modern Era 9:45 am
Presented by Sentinel IPS
The term ‘Threat Intelligence’ has always attracted lots of hype and attention, but what does it actually mean? And, more importantly, how can it help you protect your network? In this presentation, we’ll discuss what Threat Intelligence really looks like in the context of a layered security approach and we’ll use real-world examples to show how it can even improve a network’s defenses at the perimeter while saving your analyst’s time.
Speaker:
-
Cyber Resilience: Rethinking Your Data Protection Strategy in the Age of Ransomware 10:30 am
Presented by Zerto
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Speaker:
-
Developing Your Identity Strategy 10:50 am
Presented by SailPoint
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Speaker:
-
Q&A: IAM + WFH – Authentication vs Authorization 11:30 am
The “perimeter” concept for organizational security… The castles and moats analogy has been on the wane since before “Friends” was popular on TV… This year, as we all went to Work From Home quickly – we tested the boundaries of identity and authentication.
In this panel, we will discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust.
-
A Centralized Identity Strategy Using Standards Helps Minimize Threats 12:00 pm
Presented by Auth0
Modern architectures continue to become more distributed and fractured. How can developers can continue to develop and build what they understand without having to become identity experts? How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.
Speaker:
-
Surviving the Digital Storm – IoT Security Deluge 12:20 pm
Presented by Check Point Software Technologies
We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business processes with higher efficiency.
This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.
Speaker:
- Break
-
The State of (Cyber) Emergency: Louisiana Preparedness 1:15 pm
Presented by State of Louisiana
As Director of the Louisiana Governor’s Office of Homeland Security and Emergency Preparedness, James Waskom is no stranger to every kind of situation — Laura’s Category 4 Landfall and the current pandemic to name a few. Data Connectors is delighted that amid all that, he will find the time on this live briefing. Louisiana has taken great strides, learning from best practices across the US, and leading with its own initiatives, in areas that include cybersecurity.
Speaker:
-
Ransomware Recovery With Speed and Precision 2:00 pm
Presented by CrowdStrike
Ransomware attacks cause major business disruptions resulting in significant time expenditures, technical resources, and related costs in order to return to full business operations. The traditional recovery approach using backups and reimaging or simply paying the ransom fails to address the root cause of the attack and remove persistent threats. This failure leaves organizations open to secondary attacks, negating initial efforts. Our experts from the front lines of incident response and endpoint recovery are helping organizations effectively recover from attacks with speed and precision to surgically remove ransomware. Join us for this informative session to learn just how we do it.
Speaker:
-
Q&A: Defense-in-Depth 2:30 pm
Data, Networks, & Infrastructure
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
-
Introduction to Proactive Prevention 3:00 pm
Presented by Morphisec
Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer. Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
Speaker:
-
The 2020 Cybersecurity Skills Shortage 3:45 pm
Presented by Osterman
The cybersecurity skills shortage is real and getting worse: according to ISC(2), nearly three million cybersecurity positions worldwide are currently unfilled, and Cyberseek reports that more than 300,000 positions are available just in the United States. A lack of cybersecurity analysts, researchers, and other security experts means that bad actors have even more of an upper hand because there are fewer people available to investigate potential threats, analyze attacks, and remediate security problems. The lockdowns arising from the COVID-19 pandemic has made the problem worse.
Osterman Research has conducted an in-depth study and produced a white paper focused squarely on this issue, and Michael Osterman will be presenting the results of that research. In this session you will learn:
- The seriousness with which your peers taking the cybersecurity skills shortage.
- What they’re doing to address it.
- How executive management and employees view their organizations’ cybersecurity function.
- How cybersecurity professionals are dealing with the stresses of doing their job.
- How the cybersecurity skills shortage might be solved, both in the near-term and longer term.
Speaker:
- Closing Session