
Virtual Summit
New England
Virtual Cybersecurity Summit
Cybersecurity is more that just protecting infrastructure and data; it protects lives as well. Join the New England Virtual Cybersecurity Summit for a deeper insight and extensive education on the latest developments in the industry. You’ll hear from luminaries and experts on topics ranging from AppSec and the Cloud, and get deeper insights on the current cybercrime ecosystem.
Log on to this immersive virtual environment, and gain access to the answers you’re looking for to better protect your organization. Get CPE credits for your time spent in these educational sessions and network with your peers in a fully interactive platform. You’ll walk away with a broader skill set and better resources to prepare yourself and your organization for what threats may be ahead.
The day following the event Connecticut Community Members are invited to join their peers at the New England Cybersecurity Community Rooftop Reception!
Date
Wed. Aug 18
-
Featured Speakers
Menny Barzilay
Keynote Speaker: Cyber Kills
Jacob IngerslevKnow Your Adversary: An Overview of the Cybercrime Ecosystem
Eric HusseyCISO RoundTable
John SlaughterCISO RoundTable
Mark MayberryCISO RoundTable
Michael L. WoodsonCISO RoundTable
Justin HickeyCISO RoundTable
Jeffrey BrownCISO RoundTable
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Summit will be open from 8AM to 6PM.
-
Breakfast Briefing: Silver Linings: Immune System Technology for Cloud & SaaS 8:35 am
Cloud and SaaS platforms have created digital environments where businesses can innovate, collaborate, and share more than ever before. However, this is often at the cost of visibility and control.
Join Nabil Zoldjalali, Darktrace’s Director of Cloud Security, as he discusses the challenges of securing cloud and SaaS applications, and learn why Cyber AI is best-in-class in protecting organizations’ dynamic workforces and constantly-changing digital infrastructure.
Find out how Cyber AI thwarted:
- Developer misuse of AWS cloud infrastructure
- Attempted infiltration via an Office 365 account
- Threat actors targeting a vulnerability with Shodan
Panel Participants:
- Welcome / Introductions
-
Keynote Speaker: Cyber Kills 9:20 am
Cyber incidents kill. They have killed before. They will kill again.
Cyber incidents kill. They have killed before. They will kill again.
Even though the cyber industry constantly strives to raise the world’s awareness about emerging threats, it seems like we have neglected to talk about the thing that will soon become the center of the cybersecurity domain – life-threatening cyber threats (LTTs).
Even the current cybersecurity industry standards (e.g., NIST Cybersecurity framework) fail to discuss (and even mention) this threat category, let alone explain how such threats should be incorporated in the risk management process in a way that would allow security experts and decision-makers to identify and tackle such threats effectively.
In this talk, we will discuss this threat, review past incidents that have resulted in casualties, and dive into effective risk management strategies. We will define the different LTTs subcategories (e.g. direct and indirect), understand who can be affected by such threats (most of enterprises, business and individuals), and how.
We will discuss incentives, discover why these attacks almost never happen even though they are possible, and see why this is about to change. We will revisit the relationship between physical security and cybersecurity.
Lastly, we will understand why the cyber industry must adopt the right mindset when human lives are at stake and incorporate this notion into their standards, policies, and methodologies.
Panel Participants:
-
Secure Your Last Line of Defense 10:15 am
Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses.
Panel Participants:
-
Disrupting Lateral Movement by Securing Active Directory 11:00 am
A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.
Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.
Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.
Highlights include:
- Live detection for attacks targeting Active Directory
- Attack surface reduction at both Active Directory and the endpoint
- Continuous visibility to AD changes that introduce new exposures
- Addressing Active Directory assurance to reduce risks and pass Red team tests
Panel Participants:
-
2021 State of Secure Identity Report 11:20 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Panel Participants:
-
Expert Panel Discussion: Cloud Clarity in 2022 11:40 am
Cloud Clarity in 2022: Strategy, Execution & Alignment
Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.” In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.
Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.
Panel Participants:
- Lunch Break
-
Zero Trust Security for Everywhere Workplace 12:40 pm
As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before.
Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.
Panel Participants:
-
Rethinking Data Protection in the Age of Ransomware 1:00 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Know Your Adversary: An Overview of the Cybercrime Ecosystem 1:20 pm
Most organizations have realized that cybercrime is a serious threat to their balance sheet and reputation, potentially even their existence, and cybersecurity spending is a fast growing share of their overall IT-budgets. The expansion in attack surface driven by digital transformation and a more organized and sophisticated cybercrime industry have created an arms race between organizations and threat actors. At the moment, the criminals are winning.
In this presentation, Jacob Ingerslev, the Head of Global Cyber Risk at The Hartford insurance companies, will talk about how cybercrime has morphed into a highly adaptable and organized industry where different levels of actors participate in buying and selling cybercrime services and information obtained from compromised organizations.
Live Q&A to Follow
Presenter:
-
Moving Beyond Password to Delight & Secure Users 2:25 pm
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
-
Your Ransomware Hostage Rescue Guide 2:45 pm
Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage?
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.
In this webcast we will cover:
- What new scary ransomware strains are in the wild
- Am I infected?
- I’m infected, now what?
- Proven methods of protecting your organization
- How to create your human firewall
Don’t get held hostage by ransomware and become a statistic!
Panel Participants:
-
Expert Panel Discussion: 100 Ransomware Attacks Since Colonial Pipeline 3:10 pm
100 Ransomware Attacks Since Colonial Pipeline: What Have We Learned?
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first, what to avoid, and where the traps may lie.
Panel Participants:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:50 pm
Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.
Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.
WHY SHOULD I ATTEND?
– Learn about the latest ransomware trends
– Dissect discoveries from Cybereason’s Nocturnus team
– Become empowered to defend against ransomware
Panel Participants:
- CISO RoundTable 4:30 pm
- Closing Session + Prize Drawing
- August 19th - Hartford Rooftop Community Reception!
-
New England Cybersecurity Community Rooftop Reception! 4:00 pm
Although this is an online event, Community Members have expressed interest in gathering together again in-person. For the first time, the day following the event will have a New England Cybersecurity Community Rooftop Reception! Join Connecticut Community Members in an informal environment with food, refreshments and networking on Thursday, August 19th at 4pm.
-
Partners
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners