
Virtual Summit
Phoenix 2021
Virtual Cybersecurity Summit
The Phoenix Virtual Cybersecurity Summit is a an opportunity to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Thu. Apr 29
Event Schedule
Times for this Event are in ARIZONA TIME
The Summit will be open from 8AM to 6PM.
- Welcome
-
Securing Active Directory to Defeat Attacker Lateral Movement 8:40 am
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
-
Tackling User Behavior Head-On 9:00 am
Today’s popular attacks like phishing, credential compromise, and business email compromise have one thing in common: they need people to work. InfoSec professionals add technology on top of technology, but still the problems persist. How do you take people from the weakest link to active defenders of your organization? Based on our experiences with tens of millions of users, we’ll share with you best practices, strategies, and benchmarks to be successful.
Join our presentation to learn about:
- Best practices for running an effective security awareness program
- Strategies for driving behavior change and improving security culture
- Benchmarks for making real impacts to your risk posture
Panel Participants:
-
THE LAST LINE OF DEFENSE: DATA PROTECTION 9:20 am
With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense.
Panel Participants:
-
Implementing True Zero Trust Control on the Endpoint 9:55 am
In this presentation, ThreatLocker CEO, Danny Jenkins will reveal his approach to managing 3 critical layers of cybersecurity. During this session, you will learn critical security measures you should implement to protect these 3 layers against today’s cyber threats.
Panel Participants:
-
Expert Panel Discussion: Defense in Depth: New Strategies for 2021 10:15 am
Defense in Depth: New Strategies for 2021
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
Panel Participants:
-
Rethinking data protection in the age of ransomware 10:50 am
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Latest network-layer DDoS trends and the rise of ransom-driven attacks 11:25 am
Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks.
In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:
- Key trends and shifts in the DDoS landscape
- Ransom-based attacks: what are they and how to respond?
- Steps organizations can take to better protect their networks
Panel Participants:
-
Faking It: Stopping Impersonation Attacks with Cyber AI 11:45 am
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response.
In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.
Find out how in this session.
Panel Participants:
- Lunch Break
-
Keynote: Evolving Nature of CyberCrime in the Southwest 12:35 pm
U.S. Secret Service Supervisory Special Agent Ingrid Rush will be shedding light on the work of the agency alongside the Arizona Cybersecurity Task Force, and their efforts to protect organizations and individuals from cyber criminals across the Southwest. Calling upon her years of experience in the agency, particularly in her role as a digital forensics examiner, she will offer guidance on managing and mitigating cyber incidents.
During her talk, SSA Rush will provide insight on how organizations can prepare for all types of attacks, including Phishing, Ransomware, and Business Email Compromise (BEC), with a particular focus on the threats facing the greater Phoenix area. From her post in the Phoenix Field Office, Rush will take questions from the community, as well as provide her thoughts on how companies can work with government organizations like the Secret Service to stay on top of cyber threats.
Panel Participants:
-
Earn More Trust Through Vulnerability Management Best Practices 1:20 pm
COVID has brought on a set of security challenges that has security teams pivoting and spinning up new applications to meet the unique demands of quarantine and remote work. When external and even internal environments demand that you move quickly, how do you measure and communicate changes? And how do you build trust with customers, staff and the board, ensuring data and other investments are protected? Join Synack’s VP of Operations, Nick Harrahill, for a discussion on how to meet these unique demands.
You’ll learn:
- Best practices security leaders can pursue to harden vulnerability programs
- How leveraging a continuous crowdsourced testing model can help measure and communicate security posture
- How to maximize trust with customers and throughout organizations
Panel Participants:
-
Delivery Failed: Preventing ransomware by detecting its precursors 1:50 pm
Ransomware doesn’t magically materialize across endpoints at an organization. Adversaries often use other malware or legitimate tools to deliver it. Whether it’s during lateral movement, command and control, or data exfiltration, defenders have multiple opportunities to detect precursor activity and prevent a ransomware infection long before anything gets encrypted.
In this talk, we’re going to discuss trojans, offensive tools, file transfer utilities, and other software that frequently precedes a full blown ransomware infection. As it turns out, many ransomware precursors are very conspicuous, and if you can stop them in their tracks, you can prevent a ransomware incident.
Attendees will walk away from this talk with specific and detailed guidance on how to observe and detect the threats that often lead to a ransomware infection.
Panel Participants:
-
Expert Panel Discussion: Recover from Ransomware – What’s Next? 2:00 pm
Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack: What’s Next?
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
Feature Keynote: CISA Briefing - Hafnium/Microsoft Exchange Vulnerabilities 2:45 pm
In this exclusive briefing, Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) Region 6 Advisor George Reeves will share the latest, and most detailed information to date on DHS Emergency Directive 21-02. This directive, along with its associated Alerts AA21-062A informs public and private organizations with critical infrastructure about the state-sponsored cyberattack that has been attributed to China’s Hafnium group.
CSA Reeves will share specifics of the remediation recommendations, details and links to mitigation tools available. Using the MITRE ATT&CK framework, he explains the tactics, techniques and procedures (TTPs) that have been used by the Advanced Persistent Threat (APT) actors associated with both this and the SolarWinds Sunburst Supply Chain Compromise.
The information shared will include newly released command-line tools from CISA to assist with remediation. Also included will be links to (TLP: White) Malware Analysis Reports, as well as awareness, training and prevention recommendations from his agency.
Panel Participants:
-
Expert Panel Discussion: High-Profile, State-Sponsored CyberAttacks: Practical Advice 3:15 pm
High-Profile, State-Sponsored CyberAttacks: Practical Advice
SolarWinds and Hafnium have made headlines this year, and figured prominently into the talk track for so many of the presentations at the Summit today. This expert panel discussion will talk about more of the practical advice, thought leadership and best practices that the executives in our cybersecurity community can take back to their organizations. The panel will touch on awareness, prevention, and remediation from the various angles represented by our experts.
Panel Participants:
-
CISO Panel 4:00 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Guest Keynote: Social Media - Threat Vector & Source of Intel. for InfoSec Programs 4:45 pm
Keynote by Lester Godsey, Chief Information Security and Privacy Officer for the City of Mesa, AZ.
During the 2020 election cycle, many municipalities found that social media was the primary vector for misinformation and disinformation. In Maricopa County, officials also discovered that social media was a source of intelligence for both cyber and kinetic threats.
Cyber-minded citizens throughout the southwest see the synergies when it comes to election protection/preparedness. CISO Lester Godsey will discuss why forward-thinking organizations who care about their brand/reputation should take similar steps to what Maricopa County has done and continues to do post-election for their own information security programs.
Panel Participants:
- Summit Final closing Session
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners