• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • Breakfast Briefing: Silver Linings: Immune System Technology for Cloud & SaaS 8:35 am

    Presented by Darktrace

    Cloud and SaaS platforms have created digital environments where businesses can innovate, collaborate, and share more than ever before. However, this is often at the cost of visibility and control. 

    Join Nabil Zoldjalali, Darktrace’s Director of Cloud Security, as he discusses the challenges of securing cloud and SaaS applications, and learn why Cyber AI is best-in-class in protecting organizations’ dynamic workforces and constantly-changing digital infrastructure. 

    Find out how Cyber AI thwarted: 

    •       Developer misuse of AWS cloud infrastructure 
    •       Attempted infiltration via an Office 365 account 
    •       Threat actors targeting a vulnerability with Shodan  

     

    Click to Expand

    Panel Participants:

    Nabil Zoldjalali
    Nabil Zoldjalali

    Nabil Zoldjalali

    Director of Cloud Security at Darktrace

    Collapse This Item

  • Welcome / Introductions
  • Keynote Speaker: Cyber Kills 9:20 am

    Cyber incidents kill. They have killed before. They will kill again.

    Cyber incidents kill. They have killed before. They will kill again.

    Even though the cyber industry constantly strives to raise the world’s awareness about emerging threats, it seems like we have neglected to talk about the thing that will soon become the center of the cybersecurity domain – life-threatening cyber threats (LTTs).

    Even the current cybersecurity industry standards (e.g., NIST Cybersecurity framework) fail to discuss (and even mention) this threat category, let alone explain how such threats should be incorporated in the risk management process in a way that would allow security experts and decision-makers to identify and tackle such threats effectively.

    In this talk, we will discuss this threat, review past incidents that have resulted in casualties, and dive into effective risk management strategies. We will define the different LTTs subcategories (e.g. direct and indirect), understand who can be affected by such threats (most of enterprises, business and individuals), and how.

    We will discuss incentives, discover why these attacks almost never happen even though they are possible, and see why this is about to change. We will revisit the relationship between physical security and cybersecurity.

     Lastly, we will understand why the cyber industry must adopt the right mindset when human lives are at stake and incorporate this notion into their standards, policies, and methodologies.

    Click to Expand

    Panel Participants:

    Menny Barzilay
    Menny Barzilay

    Menny Barzilay

    CEO at Cytactic

    Collapse This Item

  • Secure Your Last Line of Defense 10:15 am

    Presented by Arcserve

    Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses.

    Click to Expand

    Panel Participants:

    Ahsan Siddiqui
    Ahsan Siddiqui

    Ahsan Siddiqui

    Director of Product Management at Arcserve

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 11:00 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.

    Highlights include:

    • Live detection for attacks targeting Active Directory
    • Attack surface reduction at both Active Directory and the endpoint
    • Continuous visibility to AD changes that introduce new exposures
    • Addressing Active Directory assurance to reduce risks and pass Red team tests
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • 2021 State of Secure Identity Report 11:20 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Ian Hassard
    Ian Hassard

    Ian Hassard

    Senior Manager, Product Management at Auth0

    Collapse This Item

  • Expert Panel Discussion: Cloud Clarity in 2022 11:40 am

    Cloud Clarity in 2022: Strategy, Execution & Alignment

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.

    Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Allison Pryor
    Allison Pryor

    Allison Pryor

    Senior Security Specialist Solutions Architect at Amazon Web Services

    Joe Ficocello
    Joe Ficocello

    Joe Ficocello

    CIO at Shipman & Goodwin LLP

    Collapse This Item

  • Lunch Break
  • Zero Trust Security for Everywhere Workplace 12:40 pm

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

    Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO at Ivanti

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 1:00 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Know Your Adversary: An Overview of the Cybercrime Ecosystem 1:20 pm

    Most organizations have realized that cybercrime is a serious threat to their balance sheet and reputation, potentially even their existence, and cybersecurity spending is a fast growing share of their overall IT-budgets. The expansion in attack surface driven by digital transformation and a more organized and sophisticated cybercrime industry have created an arms race between organizations and threat actors. At the moment, the criminals are winning. 

    In this presentation, Jacob Ingerslev, the Head of Global Cyber Risk at The Hartford insurance companies, will talk about how cybercrime has morphed into a highly adaptable and organized industry where different levels of actors participate in buying and selling cybercrime services and information obtained from compromised organizations.

    Live Q&A to Follow

    Click to Expand

    Presenter:

    Jacob Ingerslev
    Jacob Ingerslev

    Jacob Ingerslev

    Head of Global Cyber Risk at The Hartford

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 2:25 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Your Ransomware Hostage Rescue Guide 2:45 pm

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage? 

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage by ransomware and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate at KnowBe4

    Collapse This Item

  • Expert Panel Discussion: 100 Ransomware Attacks Since Colonial Pipeline 3:10 pm

    100 Ransomware Attacks Since Colonial Pipeline: What Have We Learned?

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first, what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Head of Attack Surface Analysis at Palo Alto Networks

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:50 pm

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Panel Participants:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • CISO RoundTable 4:30 pm

    Panel Participants:

    Eric Hussey
    Eric Hussey

    Eric Hussey

    CISO at PTC

    John Slaughter
    John Slaughter

    John Slaughter

    Chief Information Officer at Alliant Health Solutions

    Mark Mayberry
    Mark Mayberry

    Mark Mayberry

    Chief Technology Officer at Stanley Black & Decker

    Michael L. Woodson
    Michael L. Woodson

    Michael L. Woodson

    Director of Information Security and Privacy at Sonesta International Hotels Corporation

    Justin Hickey
    Justin Hickey

    Justin Hickey

    CISO at Fairfield University

    Jeffrey Brown
    Jeffrey Brown

    Jeffrey Brown

    CISO at State Of Connecticut

    Collapse This Item

  • Closing Session + Prize Drawing
  • August 19th - Hartford Rooftop Community Reception!
  • New England Cybersecurity Community Rooftop Reception! 4:00 pm

    Although this is an online event, Community Members have expressed interest in gathering together again in-person.  For the first time, the day following the event will have a New England Cybersecurity Community Rooftop Reception! Join Connecticut Community Members in an informal environment with food, refreshments and networking on Thursday, August 19th at 4pm.

    More Details Here

     

     

    Click to Expand

    Collapse This Item

Partners