• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST)

The Conference will be open from 8AM to 6PM both days.

  • Welcome / Introductions
  • The USSS Cyber Fraud Task Force Model 10:00 am
    Add to Calendar20211201 10:00 am20211201 10:15 amAmerica/ChicagoThe USSS Cyber Fraud Task Force Model315 Chestnut St.
    St. Louis, MO 63102

    Presented by US Secret Service

    Speakers:

    Thomas Landry
    Thomas Landry

    Thomas Landry

    Special Agent in Charge – St. Louis Field Office

    Brian Cockrill
    Brian Cockrill

    Brian Cockrill

    Senior Special Agent - Technical Staff Assistant at United States Secret Service - St. Louis Field Office

    Collapse This Item

  • The Payment Card Industry: Is My Money Safe? 10:20 am
    Add to Calendar20211201 10:20 am20211201 11:05 amAmerica/ChicagoThe Payment Card Industry: Is My Money Safe?

    The Payment Card Industry faces not only legislative challenges but significant cybersecurity issues as well. Learn how Mastercard protects its payment transaction and corporate networks from the latest cyberattacks.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Mastercard International

    The Payment Card Industry faces not only legislative challenges but significant cybersecurity issues as well. Learn how Mastercard protects its payment transaction and corporate networks from the latest cyberattacks.

    Click to Expand

    Speaker:

    Dan Unger
    Dan Unger

    Dan Unger

    Manager - Security Monitoring and Response at Mastercard

    Collapse This Item

  • Cyber Enabled Fraud: Understanding & Managing the Growing Threat 11:10 am
    Add to Calendar20211201 11:10 am20211201 12:00 pmAmerica/ChicagoCyber Enabled Fraud: Understanding & Managing the Growing Threat

    As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent. 

    In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches through leveraging intelligence, data, technology, and process.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by TikTok

    As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent. 

    In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches through leveraging intelligence, data, technology, and process.

    Click to Expand

    Speaker:

    Jeff Dant
    Jeff Dant

    Jeff Dant

    Global Financial Crimes Lead, Global Security Organization at TikTok

    Collapse This Item

  • Lunch Break
  • The State of Secure Identity 12:30 pm
    Add to Calendar20211201 12:30 pm20211201 12:45 pmAmerica/ChicagoThe State of Secure Identity

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Mousa Abdeljaber

    Mousa Abdeljaber

    Director of Engineering at Auth0

    Collapse This Item

  • Low Hanging Fruit: Improve Ad Hygiene For the Easy Win 12:55 pm
    Add to Calendar20211201 12:55 pm20211201 1:15 pmAmerica/ChicagoLow Hanging Fruit: Improve Ad Hygiene For the Easy Win

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Speaker:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth: New Strategies for 2022 1:20 pm
    Add to Calendar20211201 1:20 pm20211201 1:50 pmAmerica/ChicagoExpert Panel Discussion: Defense in Depth: New Strategies for 2022

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

     

    315 Chestnut St.
    St. Louis, MO 63102

    .

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

     

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Mousa Abdeljaber

    Mousa Abdeljaber

    Director of Engineering at Auth0

    Adam Fisher
    Adam Fisher

    Adam Fisher

    Principal Security Engineer at Salt Security

    Collapse This Item

  • Ransomware Resilience 2:20 pm
    Add to Calendar20211201 2:20 pm20211201 2:40 pmAmerica/ChicagoRansomware Resilience

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption.

    Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from a ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption.

    Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from a ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Speaker:

    Kelly Lipprand
    Kelly Lipprand

    Kelly Lipprand

    Director, Systems Engineering at Zerto

    Collapse This Item

  • The Next Class of Browser-Based Attacks 2:45 pm
    Add to Calendar20211201 2:45 pm20211201 3:05 pmAmerica/ChicagoThe Next Class of Browser-Based Attacks

    There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success. 

    Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive. 

    During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include: 

    • The anatomy of recent browser-based attacks 
    • Exposing why network security today is broken 
    • The technology approach proven to eliminate these threats
    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Menlo Security

    There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success. 

    Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive. 

    During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include: 

    • The anatomy of recent browser-based attacks 
    • Exposing why network security today is broken 
    • The technology approach proven to eliminate these threats
    Click to Expand

    Speaker:

    Mark Guntrip
    Mark Guntrip

    Mark Guntrip

    Sr. Director of Cybersecurity Strategy at Menlo Security

    Collapse This Item

  • Secure Your Last Line of Defense 3:10 pm
    Add to Calendar20211201 3:10 pm20211201 3:30 pmAmerica/ChicagoSecure Your Last Line of Defense

    Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Arcserve

    Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

    Click to Expand

    Speaker:

    Chip Vacek
    Chip Vacek

    Chip Vacek

    Chief Technologist at Arcserve

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:55 pm
    Add to Calendar20211201 3:55 pm20211201 4:15 pmAmerica/ChicagoRansomware Decoded: Understanding & Preventing Modern Ransomware Attacks

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Speaker:

    Trevor Eastin
    Trevor Eastin

    Trevor Eastin

    Associate Director, Field Engineering at Cybereason

    Collapse This Item

  • Keynote: State of Cyber 2021 CISA Briefing 4:20 pm
    Add to Calendar20211201 4:20 pm20211201 5:00 pmAmerica/ChicagoKeynote: State of Cyber 2021 CISA Briefing

    The headlines that grabbed attention throughout 2021 were dotted with ransomware, nation-state attacks, and new regulatory and compliance requirements. Part of the Department of Homeland Security (DHS), the over 2,000-person Cyber Infrastructure Security Agency (CISA) is responsible for protecting federal networks and offering security advice to critical infrastructure operators, small businesses, and local governments.

     In this exclusive briefing for the State of Cyber 2021 audience, Region 5 Cybersecurity Advisor (Indiana), Integrated Operations Division JD Henry will highlight how CISA has responded to these threats.  He will further detail the latest thinking from the agency, and the goals set forth by its new Director Jen Easterly, who was unanimously confirmed by Congress in July. 

    315 Chestnut St.
    St. Louis, MO 63102

    .

    The headlines that grabbed attention throughout 2021 were dotted with ransomware, nation-state attacks, and new regulatory and compliance requirements. Part of the Department of Homeland Security (DHS), the over 2,000-person Cyber Infrastructure Security Agency (CISA) is responsible for protecting federal networks and offering security advice to critical infrastructure operators, small businesses, and local governments.

     In this exclusive briefing for the State of Cyber 2021 audience, Region 5 Cybersecurity Advisor (Indiana), Integrated Operations Division JD Henry will highlight how CISA has responded to these threats.  He will further detail the latest thinking from the agency, and the goals set forth by its new Director Jen Easterly, who was unanimously confirmed by Congress in July. 

    Click to Expand

    Speaker:

    JD Henry
    JD Henry

    JD Henry

    Cyber Security Advisor (Region V), Cybersecurity State Coordinator at State of Indiana

    Collapse This Item

  • Community Networking Reception
  • DAY TWO
  • Welcome / Introductions
  • Opening Remarks with Special Agent in Charge Richard Quinn 9:30 am
    Add to Calendar20211201 9:30 am20211201 9:45 amAmerica/ChicagoOpening Remarks with Special Agent in Charge Richard Quinn315 Chestnut St.
    St. Louis, MO 63102

    Presented by FBI

    Speaker:

    Richard Quinn
    Richard Quinn

    Richard Quinn

    Special Agent in Charge at FBI

    Collapse This Item

  • State of Cyber 2021 FBI Briefing: Ransomware and IC3 Reporting 9:50 am
    Add to Calendar20211202 9:50 am20211202 10:10 amAmerica/ChicagoState of Cyber 2021 FBI Briefing: Ransomware and IC3 Reporting

    Ransomware is understood as an evolving, growing and significant threat to US businesses, government, infrastructure and individuals. Since ransomware attacks began gaining prominence in 2013, ransomware’s evolution and recognized trends have challenged the public and private sectors’ abilities to prevent such attacks. As part of the FBI’s cyber mission to impose risk and consequences on cyber adversaries, the FBI aims to add to the discussion of this reality and approaches this ever-adapting threat with coordinated efforts and response to enable a whole-of-government action. Critical elements to this mitigation strategy are communication and reporting to better help track ransomware attackers, target the criminal ecosystem, educate the public, and ultimately hold ransomware actors accountable under US law.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by FBI

    Ransomware is understood as an evolving, growing and significant threat to US businesses, government, infrastructure and individuals. Since ransomware attacks began gaining prominence in 2013, ransomware’s evolution and recognized trends have challenged the public and private sectors’ abilities to prevent such attacks. As part of the FBI’s cyber mission to impose risk and consequences on cyber adversaries, the FBI aims to add to the discussion of this reality and approaches this ever-adapting threat with coordinated efforts and response to enable a whole-of-government action. Critical elements to this mitigation strategy are communication and reporting to better help track ransomware attackers, target the criminal ecosystem, educate the public, and ultimately hold ransomware actors accountable under US law.

    Click to Expand

    Collapse This Item

  • Case Study with Senior Special Agent Kyle Storm 10:15 am
    Add to Calendar20211202 10:15 am20211202 10:35 amAmerica/ChicagoCase Study with Senior Special Agent Kyle Storm315 Chestnut St.
    St. Louis, MO 63102

    Presented by FBI

    Speaker:

    Kyle Storm
    Kyle Storm

    Kyle Storm

    Senior Special Agent at FBI

    Collapse This Item

  • 25 Years of InfraGard 11:00 am
    Add to Calendar20211202 11:00 am20211202 11:20 amAmerica/Chicago25 Years of InfraGard

    How InfraGard got started, what they do, and the importance of the public private partnership.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by FBI

    How InfraGard got started, what they do, and the importance of the public private partnership.

    Click to Expand

    Speaker:

    David Wren
    David Wren

    David Wren

    President at InfraGard St. Louis

    Collapse This Item

  • Partnering With CISA to Help Secure American Infrastructure 11:20 am
    Add to Calendar20211202 11:20 am20211202 11:40 amAmerica/ChicagoPartnering With CISA to Help Secure American Infrastructure

    CISA leads the national effort to protect and enhance the resilience of the Nation’s physical and cyber infrastructure. The responsibility of this mission is becoming increasingly important, because in today’s globally interconnected world, our critical infrastructure and American way of life face a wide array of serious cyber risks. As the agency evolves to meet modern security challenges, governmental entities and the private sector must work together as a critical partners in the whole-of-nation effort. The time to bolster cyber defenses is now. Nation-state adversaries are investing significantly in building world-class intrusion capabilities. We are seeing this trend manifest with the proliferation of ransomware actors right here in our region. Cybersecurity is a shared responsibility, and CISA relies on teamwork and partnerships because collaboration is the foundation of our collective success. Cooperation, information sharing, and action – across both public and private sectors – are central to CISA’s mission. We are all in this together.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by DHS

    CISA leads the national effort to protect and enhance the resilience of the Nation’s physical and cyber infrastructure. The responsibility of this mission is becoming increasingly important, because in today’s globally interconnected world, our critical infrastructure and American way of life face a wide array of serious cyber risks. As the agency evolves to meet modern security challenges, governmental entities and the private sector must work together as a critical partners in the whole-of-nation effort. The time to bolster cyber defenses is now. Nation-state adversaries are investing significantly in building world-class intrusion capabilities. We are seeing this trend manifest with the proliferation of ransomware actors right here in our region. Cybersecurity is a shared responsibility, and CISA relies on teamwork and partnerships because collaboration is the foundation of our collective success. Cooperation, information sharing, and action – across both public and private sectors – are central to CISA’s mission. We are all in this together.

    Click to Expand

    Speaker:

    Phil Kirk
    Phil Kirk

    Phil Kirk

    Region VII Director for the Office of Infrastructure Protection in the Department of Homeland Security’s National Protection and Programs Directorate

    Collapse This Item

  • Expert Panel Discussion: 2022 Trends & Directions 11:45 am
    Add to Calendar20211202 11:45 am20211202 12:20 pmAmerica/ChicagoExpert Panel Discussion: 2022 Trends & Directions

    What will define cybersecurity in 2022? What carries over from 2021?

    2021 was a busy year for cybersecurity professionals. The impacts from attacks like SolarWinds, Colonial Pipeline, Hafnium and Kaseya rippled through the industry — and spurred changes in the way we look at ransomware, threat actors, nation-state attacks, supply chain, and third-party risk. Moreover, the latest Executive Order on Cybersecurity and infrastructure bills will cause us to reevaluate some practices, and refine processes and procedures.

    In this panel discussion, experts will bring in various opinions and points of views on what they expect to shape the next 12 months, and what cybersecurity leaders in the audience can do to prepare.

    315 Chestnut St.
    St. Louis, MO 63102

    .

    What will define cybersecurity in 2022? What carries over from 2021?

    2021 was a busy year for cybersecurity professionals. The impacts from attacks like SolarWinds, Colonial Pipeline, Hafnium and Kaseya rippled through the industry — and spurred changes in the way we look at ransomware, threat actors, nation-state attacks, supply chain, and third-party risk. Moreover, the latest Executive Order on Cybersecurity and infrastructure bills will cause us to reevaluate some practices, and refine processes and procedures.

    In this panel discussion, experts will bring in various opinions and points of views on what they expect to shape the next 12 months, and what cybersecurity leaders in the audience can do to prepare.

    Click to Expand

    Panel Participants:

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Senior Threat Intelligence Analyst

    Marc Ashworth
    Marc Ashworth

    Marc Ashworth

    Senior VP and CISO at First Bank

    Chris Adkins
    Chris Adkins

    Chris Adkins

    Senior Director, Proactive Services at Blue Voyant

    Tim Lund
    Tim Lund

    Tim Lund

    Director, Solutions Architects at Nasuni

    Collapse This Item

  • Lunch Break
  • Demo Session 12:25 pm
    Add to Calendar20211202 12:25 pm20211202 12:35 pmAmerica/ChicagoDemo Session315 Chestnut St.
    St. Louis, MO 63102

    Presented by ThreatLocker

    Collapse This Item

  • Expert Panel Discussion: Empowering Users to Be the Best Human Firewall in Your Organization 12:45 pm
    Add to Calendar20211202 12:45 pm20211202 1:20 pmAmerica/ChicagoExpert Panel Discussion: Empowering Users to Be the Best Human Firewall in Your Organization

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.

    Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

    315 Chestnut St.
    St. Louis, MO 63102

    .

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.

    Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

    Click to Expand

    Panel Participants:

    Jeff Dant
    Jeff Dant

    Jeff Dant

    Global Financial Crimes Lead, Global Security Organization at TikTok

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Senior Threat Intelligence Analyst

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 1:25 pm
    Add to Calendar20211202 1:25 pm20211202 1:45 pmAmerica/ChicagoRemote Work – The Wild West of Endpoint Management

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    Product Manager at baramundi

    Collapse This Item

  • It’s Time to Actually Do Something 1:50 pm
    Add to Calendar20211202 1:50 pm20211202 2:10 pmAmerica/ChicagoIt’s Time to Actually Do Something

    This is not your average “you’re not doing what you should be doing” cybersecurity lecture. In this informative session, Dave Bailey, Vice President of Healthcare Services, and 12-year cybersecurity veteran, will talk through why, now more than ever before, it’s time to shift your cybersecurity approach. Coming from a healthcare industry perspective, the most at risk and hardest hit by cyber incidents, Dave will share his subject matter expertise on the importance of breaking the traditional vicious cycle and instead focus on preparation, practice, and validation to build resilience.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by CynergisTek

    This is not your average “you’re not doing what you should be doing” cybersecurity lecture. In this informative session, Dave Bailey, Vice President of Healthcare Services, and 12-year cybersecurity veteran, will talk through why, now more than ever before, it’s time to shift your cybersecurity approach. Coming from a healthcare industry perspective, the most at risk and hardest hit by cyber incidents, Dave will share his subject matter expertise on the importance of breaking the traditional vicious cycle and instead focus on preparation, practice, and validation to build resilience.

    Click to Expand

    Speaker:

    Dave Bailey
    Dave Bailey

    Dave Bailey

    Vice President of Healthcare Services at CynergisTek

    Collapse This Item

  • Get Beyond Compliance and Achieve Real Database Security 2:30 pm
    Add to Calendar20211202 2:30 pm20211202 2:50 pmAmerica/ChicagoGet Beyond Compliance and Achieve Real Database Security

    To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future. We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.

    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Imperva

    To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future. We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.

    Click to Expand

    Collapse This Item

  • Fighting Ransomware with Autonomous Response 2:55 pm
    Add to Calendar20211202 2:55 pm20211202 3:15 pmAmerica/ChicagoFighting Ransomware with Autonomous Response

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.

    Join Lucas Ryder, Darktrace’s VP of Security, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

    This presentation will discuss: 

    • Recent ransomware threat trends, including double extortion and RDP attacks 
    • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   
    • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
    315 Chestnut St.
    St. Louis, MO 63102

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.

    Join Lucas Ryder, Darktrace’s VP of Security, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

    This presentation will discuss: 

    • Recent ransomware threat trends, including double extortion and RDP attacks 
    • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   
    • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
    Click to Expand

    Speaker:

    Lucas Ryder
    Lucas Ryder

    Lucas Ryder

    VP of Cybersecurity at Darktrace

    Collapse This Item

  • State of Cyber Inter-Agency Cooperation 3:20 pm
    Add to Calendar20211202 3:20 pm20211202 4:15 pmAmerica/ChicagoState of Cyber Inter-Agency Cooperation

    As the wrap-up to a deep agenda of material from over 20 presentations and panels at the Conference this week, the State of Cyber Panel discussion will bring together all of those discussion threads.  Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region. This Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.

    315 Chestnut St.
    St. Louis, MO 63102

    .

    As the wrap-up to a deep agenda of material from over 20 presentations and panels at the Conference this week, the State of Cyber Panel discussion will bring together all of those discussion threads.  Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region. This Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.

    Click to Expand

    Panel Participants:

    Erin Hug
    Erin Hug

    Erin Hug

    Cyber Intelligence Analyst, Cybersecurity Forensics & Intelligence Unit at Missouri State Highway Patrol

    Angela Robinson
    Angela Robinson

    Angela Robinson

    Cybersecurity Specialist with the Department of Public Safety (DPS)

    Derek Rieger
    Derek Rieger

    Derek Rieger

    Deputy Director of the St. Louis Fusion Center

    Christopher Cockburn
    Christopher Cockburn

    Christopher Cockburn

    Cybersecurity Advisor at CISA

    Brian Cockrill
    Brian Cockrill

    Brian Cockrill

    Senior Special Agent - Technical Staff Assistant at United States Secret Service - St. Louis Field Office

    Collapse This Item

  • Conference Final Closing Session
Partners Register