Registration

Wed. Aug 18

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Keynote Speaker: Cyber Kills 9:05 am

    Cyber incidents kill. They have killed before. They will kill again.

    Cyber incidents kill. They have killed before. They will kill again.

    Even though the cyber industry constantly strives to raise the world’s awareness about emerging threats, it seems like we have neglected to talk about the thing that will soon become the center of the cybersecurity domain – life-threatening cyber threats (LTTs).

     Even the current cybersecurity industry standards (e.g., NIST Cybersecurity framework) fail to discuss (and even mention) this threat category, let alone explain how such threats should be incorporated in the risk management process in a way that would allow security experts and decision-makers to identify and tackle such threats effectively.

     In this talk, we will discuss this threat, review past incidents that have resulted in casualties, and dive into effective risk management strategies. We will define the different LTTs subcategories (e.g. direct and indirect), understand who can be affected by such threats (most of enterprises, business and individuals), and how.

    We will discuss incentives, discover why these attacks almost never happen even though they are possible, and see why this is about to change. We will revisit the relationship between physical security and cybersecurity.

     Lastly, we will understand why the cyber industry must adopt the right mindset when human lives are at stake and incorporate this notion into their standards, policies, and methodologies.

    Click to Expand

    Panel Participants:

    Menny Barzilay
    Menny Barzilay

    Menny Barzilay

    CEO of Cytactic

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 9:55 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.

    Highlights include:

    • Live detection for attacks targeting Active Directory
    • Attack surface reduction at both Active Directory and the endpoint
    • Continuous visibility to AD changes that introduce new exposures
    • Addressing Active Directory assurance to reduce risks and pass Red team tests
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE

    Collapse This Item

  • Broken Authentication: Fixing One of the Most Critical Web Application Security Risks 10:15 am

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

    This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.
    Click to Expand

    Panel Participants:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions

    Collapse This Item

  • Zero Trust Security for Everywhere Workplace 11:05 am

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

    Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 11:25 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Expert Panel Discussion: Cloud Clarity in 2022 11:45 am

    Cloud Clarity in 2022: Strategy, Execution & Alignment

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.

    Requirements for the security OF the cloud, and the security IN the cloud have accelerated, particularly in the past 18 months.

    Click to Expand

    Collapse This Item

  • Lunch Break
  • Moving Beyond Password to Delight & Secure Users 12:45 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Your Ransomware Hostage Rescue Guide 1:05 pm

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage? 

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage by ransomware and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate

    Collapse This Item

  • Know Your Adversary: An Overview of the Cybercrime Ecosystem 1:25 pm

    Most organizations have realized that cybercrime is a serious threat to their balance sheet and reputation, potentially even their existence, and cybersecurity spending is a fast growing share of their overall IT-budgets. The expansion in attack surface driven by digital transformation and a more organized and sophisticated cybercrime industry have created an arms race between organizations and threat actors. At the moment, the criminals are winning. 

    In this presentation, Jacob Ingerslev, the Head of Global Cyber Risk at The Hartford insurance companies will talk about how cybercrime has morphed into a highly adaptable and organized industry where different levels of actors participate in buying and selling cybercrime services and information obtained from compromised organizations.

    Click to Expand

    Presenter:

    Jacob Ingerslev
    Jacob Ingerslev

    Jacob Ingerslev

    Head of Global Cyber Risk, The Hartford

    Collapse This Item

  • AI & ML in Cybersecurity: Can We ‘Science the Heck’ Out of Trouble? 2:30 pm

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Click to Expand

    Collapse This Item

  • Managing the Insider Threat 2:50 pm

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses.  Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Most importantly, organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: 100 Ransomware Attacks... 3:10 pm

    100 Ransomware Attacks Since Colonial Pipeline: What have we learned?

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO

    Collapse This Item

  • Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 3:55 pm

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    In this session we will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.

    Click to Expand

    Collapse This Item

  • CISO RoundTable 4:30 pm

    Panel Participants:

    Eric Hussey
    Eric Hussey

    Eric Hussey

    Chief Information Security Officer - PTC

    James Cusson
    James Cusson

    James Cusson

    Secretariat Security Liaison at Massachusetts Executive Office of Health and Human Services

    John Slaughter
    John Slaughter

    John Slaughter

    Chief Information Officer - Alliant Health Solutions

    Mark Mayberry
    Mark Mayberry

    Mark Mayberry

    Chief Technology Officer - Stanley Black & Decker

    Michael L. Woodson
    Michael L. Woodson

    Michael L. Woodson

    Director of Information Security and Privacy, Sonesta International Hotels Corporation

    Collapse This Item

  • Closing Session + Prize Drawing
Register