Registration

Tue. Dec 14 — Wed. Dec 15

Registration for qualified senior cybersecurity professionals. Subject to approval.

  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST)

The Summit will be open from 8AM to 6PM.

  • DAY ONE
  • Welcome / Introductions
  • Keynote: State of Cyber 2021 CISA Briefing 9:25 am
    Add to Calendar20211214 9:25 am20211214 9:45 amAmerica/ChicagoKeynote: State of Cyber 2021 CISA Briefing

    The headlines that grabbed attention throughout 2021 were dotted with ransomware, nation-state attacks, and new regulatory and compliance requirements. Part of the Department of Homeland Security (DHS), the over 2,000-person Cyber Infrastructure Security Agency (CISA) is responsible for protecting federal networks and offering security advice to critical infrastructure operators, small businesses, and local governments.

    In this exclusive briefing for the State of Cyber 2021 audience, Region 5 Cybersecurity Advisor (Indiana), Integrated Operations Division JD Henry will highlight how CISA has responded to these threats.  He will further detail the latest thinking from the agency, and the goals set forth by its new Director Jen Easterly, who was unanimously confirmed by Congress in July.

    .

    The headlines that grabbed attention throughout 2021 were dotted with ransomware, nation-state attacks, and new regulatory and compliance requirements. Part of the Department of Homeland Security (DHS), the over 2,000-person Cyber Infrastructure Security Agency (CISA) is responsible for protecting federal networks and offering security advice to critical infrastructure operators, small businesses, and local governments.

    In this exclusive briefing for the State of Cyber 2021 audience, Region 5 Cybersecurity Advisor (Indiana), Integrated Operations Division JD Henry will highlight how CISA has responded to these threats.  He will further detail the latest thinking from the agency, and the goals set forth by its new Director Jen Easterly, who was unanimously confirmed by Congress in July.

    Click to Expand

    Speaker:

    JD Henry
    JD Henry

    JD Henry

    Cyber Security Advisor (Region V), Cybersecurity State Coordinator at State of Indiana

    Collapse This Item

  • AI & ML in Cybersecurity: Can We ‘Science the Heck’ Out of Trouble? 9:45 am
    Add to Calendar20211214 9:45 am20211214 10:05 amAmerica/ChicagoAI & ML in Cybersecurity: Can We ‘Science the Heck’ Out of Trouble?

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Presented by Attivo Networks

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Click to Expand

    Collapse This Item

  • The USSS Cyber Fraud Task Force Model 10:25 am
    Add to Calendar20211214 10:25 am20211214 10:45 amAmerica/ChicagoThe USSS Cyber Fraud Task Force Model

    .

    Speaker:

    Thomas Landry
    Thomas Landry

    Thomas Landry

    Special Agent in Charge – St. Louis Field Office

    Collapse This Item

  • The Payment Card Industry: Is My Money Safe? 10:45 am
    Add to Calendar20211214 10:45 am20211214 11:05 amAmerica/ChicagoThe Payment Card Industry: Is My Money Safe?

    The Payment Card Industry faces not only legislative challenges but significant cybersecurity issues as well. Learn how Mastercard protects its payment transaction and corporate networks from the latest cyberattacks.

    Presented by Mastercard International

    The Payment Card Industry faces not only legislative challenges but significant cybersecurity issues as well. Learn how Mastercard protects its payment transaction and corporate networks from the latest cyberattacks.

    Click to Expand

    Speaker:

    Dan Unger
    Dan Unger

    Dan Unger

    Manager - Security Monitoring and Response at Mastercard

    Collapse This Item

  • Cyber Enabled Fraud: Understanding & Managing the Growing Threat 11:25 am
    Add to Calendar20211214 11:25 am20211214 11:45 amAmerica/ChicagoCyber Enabled Fraud: Understanding & Managing the Growing Threat

    As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent. 

    In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches through leveraging intelligence, data, technology, and process.

    Presented by TikTok

    As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent. 

    In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches through leveraging intelligence, data, technology, and process.

    Click to Expand

    Speaker:

    Jeff Dant
    Jeff Dant

    Jeff Dant

    Global Financial Crimes Lead, Global Security Organization at TikTok

    Collapse This Item

  • Lunch Break
  • Broken Authentication: Fixing One of the Most Critical Web Application Security Risks 12:45 pm
    Add to Calendar20211214 12:45 pm20211214 1:05 pmAmerica/Chicago Broken Authentication: Fixing One of the Most Critical Web Application Security Risks

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.
    Click to Expand

    Speaker:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions at Auth0

    Collapse This Item

  • Securing the Modern API Ecosystem 1:05 pm
    Add to Calendar20211214 1:05 pm20211214 1:25 pmAmerica/ChicagoSecuring the Modern API Ecosystem

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Speaker:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth: New Strategies for 2022 1:30 pm
    Add to Calendar20211214 1:30 pm20211214 2:00 pmAmerica/ChicagoExpert Panel Discussion: Defense in Depth: New Strategies for 2022

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

    .

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

    Click to Expand

    Panel Participants:

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Director Security Evangelist - Global at Noname Security

    Chris Adkins
    Chris Adkins

    Chris Adkins

    Senior Director, Proactive Services at Blue Voyant

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 2:20 pm
    Add to Calendar20211214 2:20 pm20211214 2:40 pmAmerica/ChicagoRethinking Data Protection in the Age of Ransomware

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • The Next Class of Browser-Based Attacks 2:40 pm
    Add to Calendar20211214 2:40 pm20211214 3:00 pmAmerica/ChicagoThe Next Class of Browser-Based Attacks

    There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success. 

    Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive. 

    During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include: 

    • The anatomy of recent browser-based attacks 
    • Exposing why network security today is broken 
    • The technology approach proven to eliminate these threats

    Presented by Menlo Security

    There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success. 

    Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive. 

    During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include: 

    • The anatomy of recent browser-based attacks 
    • Exposing why network security today is broken 
    • The technology approach proven to eliminate these threats
    Click to Expand

    Speaker:

    Mark Guntrip
    Mark Guntrip

    Mark Guntrip

    Sr. Director of Cybersecurity Strategy at Menlo Security

    Collapse This Item

  • Why You Need a First and Last Line of Defense to Protect Against Ransomware 3:15 pm
    Add to Calendar20211214 3:15 pm20211214 3:35 pmAmerica/ChicagoWhy You Need a First and Last Line of Defense to Protect Against Ransomware

    Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore. Take the Colonial Pipeline attack as an example. What if you could stay safe from ransomware, however it may attempt to get into your network? Join this event to learn how to stop ransomware infections with a first line and last line of defense approach from the cloud edge to the endpoint. Learn how this layered defense approach can help provide ultimate visibility with ultimate responsiveness against ransomware.

    Presented by CISCO

    Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore. Take the Colonial Pipeline attack as an example. What if you could stay safe from ransomware, however it may attempt to get into your network? Join this event to learn how to stop ransomware infections with a first line and last line of defense approach from the cloud edge to the endpoint. Learn how this layered defense approach can help provide ultimate visibility with ultimate responsiveness against ransomware.

    Click to Expand

    Speaker:

    Eric Howard
    Eric Howard

    Eric Howard

    Technical Engineering Leader at CISCO

    Collapse This Item

  • Day One Closing
  • DAY TWO
  • Welcome / Introductions
  • Small Businesses Deserve Big Protection 9:25 am
    Add to Calendar20211214 9:25 am20211214 9:45 amAmerica/ChicagoSmall Businesses Deserve Big Protection

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Presented by CISCO

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Speaker:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 9:45 am
    Add to Calendar20211215 9:45 am20211215 10:05 amAmerica/ChicagoRemote Work – The Wild West of Endpoint Management

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    Product Manager at baramundi

    Collapse This Item

  • Expert Panel Discussion: 2022 Trends & Directions 10:10 am
    Add to Calendar20211215 10:10 am20211215 10:40 amAmerica/ChicagoExpert Panel Discussion: 2022 Trends & Directions

    What will define cybersecurity in 2022?  What carries over from 2021?

    2021 was a busy year for cybersecurity professionals.  The impacts from attacks like SolarWinds, Colonial Pipeline, Hafnium and Kaseya rippled through the industry — and spurred changes in the way we look at ransomware, threat actors, nation-state attacks, supply chain, and third-party risk.  Moreover, the latest Executive Order on Cybersecurity and infrastructure bills will cause us to reevaluate some practices, and refine processes and procedures.

    In this panel discussion, experts will bring in various opinions and points of views on what they expect to shape the next 12 months, and what cybersecurity leaders in the audience can do to prepare.

    .

    What will define cybersecurity in 2022?  What carries over from 2021?

    2021 was a busy year for cybersecurity professionals.  The impacts from attacks like SolarWinds, Colonial Pipeline, Hafnium and Kaseya rippled through the industry — and spurred changes in the way we look at ransomware, threat actors, nation-state attacks, supply chain, and third-party risk.  Moreover, the latest Executive Order on Cybersecurity and infrastructure bills will cause us to reevaluate some practices, and refine processes and procedures.

    In this panel discussion, experts will bring in various opinions and points of views on what they expect to shape the next 12 months, and what cybersecurity leaders in the audience can do to prepare.

    Click to Expand

    Panel Participants:

    George Cassels
    George Cassels

    George Cassels

    Director of Technology, Enterprise at Telos

    Ami Luttwak
    Ami Luttwak

    Ami Luttwak

    Chief Technology Officer & Co-Founder at Wiz

    Peter Klimek
    Peter Klimek

    Peter Klimek

    Director of Technology at Imperva

    John Capello
    John Capello

    John Capello

    VP Product Strategy at Nasuni

    Collapse This Item

  • Partnering With CISA to Help Secure American Infrastructure 11:00 am
    Add to Calendar20211215 11:00 am20211215 11:20 amAmerica/ChicagoPartnering With CISA to Help Secure American Infrastructure

    CISA leads the national effort to protect and enhance the resilience of the Nation’s physical and cyber infrastructure. The responsibility of this mission is becoming increasingly important, because in today’s globally interconnected world, our critical infrastructure and American way of life face a wide array of serious cyber risks. As the agency evolves to meet modern security challenges, governmental entities and the private sector must work together as a critical partners in the whole-of-nation effort. The time to bolster cyber defenses is now. Nation-state adversaries are investing significantly in building world-class intrusion capabilities. We are seeing this trend manifest with the proliferation of ransomware actors right here in our region. Cybersecurity is a shared responsibility, and CISA relies on teamwork and partnerships because collaboration is the foundation of our collective success. Cooperation, information sharing, and action – across both public and private sectors – are central to CISA’s mission. We are all in this together.

    Presented by DHS

    CISA leads the national effort to protect and enhance the resilience of the Nation’s physical and cyber infrastructure. The responsibility of this mission is becoming increasingly important, because in today’s globally interconnected world, our critical infrastructure and American way of life face a wide array of serious cyber risks. As the agency evolves to meet modern security challenges, governmental entities and the private sector must work together as a critical partners in the whole-of-nation effort. The time to bolster cyber defenses is now. Nation-state adversaries are investing significantly in building world-class intrusion capabilities. We are seeing this trend manifest with the proliferation of ransomware actors right here in our region. Cybersecurity is a shared responsibility, and CISA relies on teamwork and partnerships because collaboration is the foundation of our collective success. Cooperation, information sharing, and action – across both public and private sectors – are central to CISA’s mission. We are all in this together.

    Click to Expand

    Speaker:

    Phil Kirk
    Phil Kirk

    Phil Kirk

    Region VII Director for the Office of Infrastructure Protection in the Department of Homeland Security’s National Protection and Programs Directorate

    Collapse This Item

  • 25 Years of InfraGard 11:20 am
    Add to Calendar20211215 11:20 am20211215 11:40 amAmerica/Chicago25 Years of InfraGard

    How InfraGard got started, what they do, and the importance of the public private partnership 

    Presented by FBI

    How InfraGard got started, what they do, and the importance of the public private partnership 

    Click to Expand

    Speaker:

    David Wren
    David Wren

    David Wren

    President at InfraGard St. Louis

    Collapse This Item

  • State of Cyber 2021 FBI Briefing: Ransomware and IC3 Reporting 11:40 am
    Add to Calendar20211215 11:40 am20211215 12:00 pmAmerica/ChicagoState of Cyber 2021 FBI Briefing: Ransomware and IC3 Reporting

    Ransomware is understood as an evolving, growing and significant threat to US businesses, government, infrastructure and individuals. Since ransomware attacks began gaining prominence in 2013, ransomware’s evolution and recognized trends have challenged the public and private sectors’ abilities to prevent such attacks. As part of the FBI’s cyber mission to impose risk and consequences on cyber adversaries, the FBI aims to add to the discussion of this reality and approaches this ever-adapting threat with coordinated efforts and response to enable a whole-of-government action. Critical elements to this mitigation strategy are communication and reporting to better help track ransomware attackers, target the criminal ecosystem, educate the public, and ultimately hold ransomware actors accountable under US law.

    Presented by FBI

    Ransomware is understood as an evolving, growing and significant threat to US businesses, government, infrastructure and individuals. Since ransomware attacks began gaining prominence in 2013, ransomware’s evolution and recognized trends have challenged the public and private sectors’ abilities to prevent such attacks. As part of the FBI’s cyber mission to impose risk and consequences on cyber adversaries, the FBI aims to add to the discussion of this reality and approaches this ever-adapting threat with coordinated efforts and response to enable a whole-of-government action. Critical elements to this mitigation strategy are communication and reporting to better help track ransomware attackers, target the criminal ecosystem, educate the public, and ultimately hold ransomware actors accountable under US law.

    Click to Expand

    Collapse This Item

  • Lunch Break
  • Demo Session 12:15 pm
    Add to Calendar20211215 12:15 pm20211215 12:35 pmAmerica/ChicagoDemo Session

    Presented by ThreatLocker

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 12:45 pm
    Add to Calendar20211215 12:45 pm20211215 1:05 pmAmerica/Chicago Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks

     Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Presented by Cybereason

     Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Speaker:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 1:05 pm
    Add to Calendar20211215 1:05 pm20211215 1:25 pmAmerica/ChicagoIntroduction to Risk-Based Vulnerability Management

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities. 

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first. 

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he: 

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge 
    • Details the findings on how risk-based is the way to get ahead in vulnerability management 
    • Lays out several factors that drive better remediation performance 
    • Provides steps for setting up a successful risk-based vulnerability management program

     

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities. 

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first. 

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he: 

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge 
    • Details the findings on how risk-based is the way to get ahead in vulnerability management 
    • Lays out several factors that drive better remediation performance 
    • Provides steps for setting up a successful risk-based vulnerability management program

     

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: Empowering Users 1:30 pm
    Add to Calendar20211215 1:30 pm20211215 1:50 pmAmerica/ChicagoExpert Panel Discussion: Empowering Users

    .

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 2:15 pm
    Add to Calendar20211215 2:15 pm20211215 2:35 pmAmerica/ChicagoMoving Beyond Password to Delight & Secure Users

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Collapse This Item

  • A Realistic Take on Zero Trust 2:35 pm
    Add to Calendar20211215 2:35 pm20211215 2:55 pmAmerica/ChicagoA Realistic Take on Zero Trust

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Presented by Lookout

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Click to Expand

    Collapse This Item

  • Rise of Secure Access Service Edge (SASE) 3:00 pm
    Add to Calendar20211215 3:00 pm20211215 3:20 pmAmerica/ChicagoRise of Secure Access Service Edge (SASE)

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    Click to Expand

    Collapse This Item

  • Keynote: Donna Gregory 3:30 pm
    Add to Calendar20211215 3:30 pm20211215 4:00 pmAmerica/ChicagoKeynote: Donna Gregory

    .

    Speaker:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at the FBI Cyber Division, Internet Crime Complaint Center (IC3)

    Collapse This Item

  • Summit Final Closing Session
Partners Register