
Conference
State of Cyber 2021
Government Agencies, the Public Sector, and Private Organizations are all facing what seems to be an unprecedented level of cyber attacks from nation-state actors and organized criminals. Join the St. Louis InfraGard Members Alliance, the FBI, the US Secret Service, and the Department of Homeland Security – CISA, on Dec 1st and 2nd at the State of Cyber 2021 Cybersecurity Conference. Stay ahead of the evolving cyber threat landscape and learn the the best practices to combat these actors.
Join our Community for Updates!
Take a look at all Data Connectors has to offer here!
Date
Wed. Dec 01 — Thu. Dec 02
-
Featured Speakers
Thomas Landry
The USSS Cyber Fraud Task Force Model
Brian CockrillThe USSS Cyber Fraud Task Force Model
Dan UngerThe Payment Card Industry: Is My Money Safe?
Jeff DantCyber Enabled Fraud: Understanding & Managing the Growing Threat
JD HenryKeynote: State of Cyber 2021 CISA Briefing
Richard QuinnOpening Remarks with Special Agent in Charge Richard Quinn
Phil KirkPartnering With CISA to Help Secure American Infrastructure
Erin HugState of Cyber Inter-Agency Cooperation
Angela RobinsonState of Cyber Inter-Agency Cooperation
Derek RiegerState of Cyber Inter-Agency Cooperation
Christopher CockburnState of Cyber Inter-Agency Cooperation
Brian CockrillState of Cyber Inter-Agency Cooperation
Event Schedule
Times for this Event are in Central Time (CDT/CST)
The Conference will be open from 8AM to 6PM both days.
- Welcome / Introductions
- The USSS Cyber Fraud Task Force Model 10:00 am
-
The Payment Card Industry: Is My Money Safe? 10:20 am
Presented by Mastercard International
The Payment Card Industry faces not only legislative challenges but significant cybersecurity issues as well. Learn how Mastercard protects its payment transaction and corporate networks from the latest cyberattacks.
Speaker:
-
Cyber Enabled Fraud: Understanding & Managing the Growing Threat 11:10 am
As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent.
In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches through leveraging intelligence, data, technology, and process.
Speaker:
- Lunch Break
-
The State of Secure Identity 12:30 pm
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
Low Hanging Fruit: Improve Ad Hygiene For the Easy Win 12:55 pm
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Speaker:
-
Expert Panel Discussion: Defense in Depth: New Strategies for 2022 1:20 pm
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?
Panel Participants:
-
Ransomware Resilience 2:20 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption.
Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from a ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Speaker:
-
The Next Class of Browser-Based Attacks 2:45 pm
There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success.
Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive.
During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include:
- The anatomy of recent browser-based attacks
- Exposing why network security today is broken
- The technology approach proven to eliminate these threats
Speaker:
-
Secure Your Last Line of Defense 3:10 pm
Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.
Speaker:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:55 pm
Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.
Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.
WHY SHOULD I ATTEND?
– Learn about the latest ransomware trends
– Dissect discoveries from Cybereason’s Nocturnus team
– Become empowered to defend against ransomware
Speaker:
-
Keynote: State of Cyber 2021 CISA Briefing 4:20 pm
The headlines that grabbed attention throughout 2021 were dotted with ransomware, nation-state attacks, and new regulatory and compliance requirements. Part of the Department of Homeland Security (DHS), the over 2,000-person Cyber Infrastructure Security Agency (CISA) is responsible for protecting federal networks and offering security advice to critical infrastructure operators, small businesses, and local governments.
In this exclusive briefing for the State of Cyber 2021 audience, Region 5 Cybersecurity Advisor (Indiana), Integrated Operations Division JD Henry will highlight how CISA has responded to these threats. He will further detail the latest thinking from the agency, and the goals set forth by its new Director Jen Easterly, who was unanimously confirmed by Congress in July.
Speaker:
- Community Networking Reception
- DAY TWO
- Welcome / Introductions
- Opening Remarks with Special Agent in Charge Richard Quinn 9:30 am
-
State of Cyber 2021 FBI Briefing: Ransomware and IC3 Reporting 9:50 am
Ransomware is understood as an evolving, growing and significant threat to US businesses, government, infrastructure and individuals. Since ransomware attacks began gaining prominence in 2013, ransomware’s evolution and recognized trends have challenged the public and private sectors’ abilities to prevent such attacks. As part of the FBI’s cyber mission to impose risk and consequences on cyber adversaries, the FBI aims to add to the discussion of this reality and approaches this ever-adapting threat with coordinated efforts and response to enable a whole-of-government action. Critical elements to this mitigation strategy are communication and reporting to better help track ransomware attackers, target the criminal ecosystem, educate the public, and ultimately hold ransomware actors accountable under US law.
- Case Study with Senior Special Agent Kyle Storm 10:15 am
-
25 Years of InfraGard 11:00 am
How InfraGard got started, what they do, and the importance of the public private partnership.
Speaker:
-
Partnering With CISA to Help Secure American Infrastructure 11:20 am
CISA leads the national effort to protect and enhance the resilience of the Nation’s physical and cyber infrastructure. The responsibility of this mission is becoming increasingly important, because in today’s globally interconnected world, our critical infrastructure and American way of life face a wide array of serious cyber risks. As the agency evolves to meet modern security challenges, governmental entities and the private sector must work together as a critical partners in the whole-of-nation effort. The time to bolster cyber defenses is now. Nation-state adversaries are investing significantly in building world-class intrusion capabilities. We are seeing this trend manifest with the proliferation of ransomware actors right here in our region. Cybersecurity is a shared responsibility, and CISA relies on teamwork and partnerships because collaboration is the foundation of our collective success. Cooperation, information sharing, and action – across both public and private sectors – are central to CISA’s mission. We are all in this together.
Speaker:
-
Expert Panel Discussion: 2022 Trends & Directions 11:45 am
What will define cybersecurity in 2022? What carries over from 2021?
2021 was a busy year for cybersecurity professionals. The impacts from attacks like SolarWinds, Colonial Pipeline, Hafnium and Kaseya rippled through the industry — and spurred changes in the way we look at ransomware, threat actors, nation-state attacks, supply chain, and third-party risk. Moreover, the latest Executive Order on Cybersecurity and infrastructure bills will cause us to reevaluate some practices, and refine processes and procedures.
In this panel discussion, experts will bring in various opinions and points of views on what they expect to shape the next 12 months, and what cybersecurity leaders in the audience can do to prepare.
Panel Participants:
- Lunch Break
- Demo Session 12:25 pm
-
Expert Panel Discussion: Empowering Users to Be the Best Human Firewall in Your Organization 12:45 pm
Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.
Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.
Panel Participants:
-
Remote Work – The Wild West of Endpoint Management 1:25 pm
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.
Speaker:
-
It’s Time to Actually Do Something 1:50 pm
This is not your average “you’re not doing what you should be doing” cybersecurity lecture. In this informative session, Dave Bailey, Vice President of Healthcare Services, and 12-year cybersecurity veteran, will talk through why, now more than ever before, it’s time to shift your cybersecurity approach. Coming from a healthcare industry perspective, the most at risk and hardest hit by cyber incidents, Dave will share his subject matter expertise on the importance of breaking the traditional vicious cycle and instead focus on preparation, practice, and validation to build resilience.
Speaker:
-
Get Beyond Compliance and Achieve Real Database Security 2:30 pm
To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future. We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.
Speaker:
-
Fighting Ransomware with Autonomous Response 2:55 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Lucas Ryder, Darktrace’s VP of Security, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
Speaker:
-
State of Cyber Inter-Agency Cooperation 3:20 pm
As the wrap-up to a deep agenda of material from over 20 presentations and panels at the Conference this week, the State of Cyber Panel discussion will bring together all of those discussion threads. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region. This Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.
Panel Participants:
- Conference Final Closing Session
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners