Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

  • Welcome / Introductions
  • Welcome Address 8:45 am

    Featuring Florida Lieutenant Govener Jeanette Nunez

    Speaker:

    Jeanette Núñez
    Jeanette Núñez

    Jeanette Núñez

    Florida Lieutenant Governor & Chair, Florida Cyber Task Force

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 9:00 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization. 

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks. 

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement. 

    Highlights include: 

    • Live detection for attacks targeting Active Directory 
    • Attack surface reduction at both Active Directory and the endpoint 
    • Continuous visibility to AD changes that introduce new exposures 
    • Addressing Active Directory assurance to reduce risks and pass Red team tests
    Click to Expand

    Speaker:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • As the Cyber World Turns: A Strategy to Increase Security Efficiency 9:20 am

    Presented by Check Point Software Technologies

    Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, Chief Security Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:

    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
    Click to Expand

    Speaker:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Chief Security Evangelist

    Collapse This Item

  • The Dark Web: Exposing the Business of Cybercrime 9:40 am

    Presented by Armor Defense

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service—allowing non-traditional and unskilled hackers to wreak havoc in ways previously unheard of. Criminals don’t have to be skilled to get your data;they just need to know where and who to go to for help. 

    This session aims to expose the inner workings and business of the cyber underground, focusing on the following: 

    • Cryptocurrency – The impact digital currency has had on the rate of growth of cybercrime
    • Cybercrime-as-a-service – The expansion of services offered by skilled hackers and for low cost
    • Money laundering and money mules – Ways criminals are skirting around laws and regulations to get paid
    • Mitigating risk – How businesses can protect themselves from all levels of cybercriminals with an emphasis on the importance of investing in proactive threat-hunting
    Click to Expand

    Speaker:

    Joone Nijjar
    Joone Nijjar

    Joone Nijjar

    Product Manager

    Collapse This Item

  • Expert Panel Discussion: User-Centric Security 10:00 am

    User-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

    Click to Expand

    Panel Participants:

    Mandy Mckenzie
    Mandy Mckenzie

    Mandy Mckenzie

    Director of Product Management for Awareness Training

    Joelle H. Dvir
    Joelle H. Dvir

    Joelle H. Dvir

    Attorney at McDonald Hopkins

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:50 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Speaker:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 11:10 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Speaker:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Faking It: Stopping Impersonation Attacks with Cyber AI 11:30 am

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Find out how in this session.

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products at Darktrace

    Collapse This Item

  • Guest Appearance Featuring Francis X. Suarez, Mayor, City of Miami 11:50 am

    Panel Participants:

    Francis X. Suarez
    Francis X. Suarez

    Francis X. Suarez

    Mayor, City of Miami

    Collapse This Item

  • Lunch Break
  • Keynote: James Grant 12:20 pm

    Florida’s State of Cybersecurity

    Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center.  Tasked with developing the state’s first ever enterprise approach to technology, he will share the vision for Florida’s technology office and why partnership is foundational to its success.  To deploy a center of excellence model, he’ll be leaning on and sharing lessons learned as an entrepreneur and policy maker for those in attendance.

    Click to Expand

    Speaker:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer, State of Florida

    Collapse This Item

  • Microsoft Teams Vulnerabilities 1:10 pm

    Presented by Avanan

    Microsoft Teams has quickly become the go-to application for remote work, accelerating dramatically in usage over the last year. Millions of users turned to Microsoft Teams to help keep businesses going in 2020—and hackers have noticed. As Teams is still relatively new, much is unknown about how it operates and how hackers will approach it. 

    While the increased usage has been well-documented, what’s not been documented is whether the app is vulnerable to hacking. We will talk about discoveries that have already been made, potential risks that we see in the future, and how to best secure this relatively new communication vector. 

    This session will walk attendees through: 

    • The many inherent vulnerabilities in the platform 
    • The popular attack types 
    • How hackers act differently within Teams than they do on email
    Click to Expand

    Speaker:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Solutions Engineer

    Collapse This Item

  • Insider Risk Management: The Alternative to Traditional Data Protection is Here! 1:30 pm

    Presented by Code42

    We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.

    Click to Expand

    Speaker:

    Tommy Todd
    Tommy Todd

    Tommy Todd

    Vice President of Security

    Collapse This Item

  • Zero Trust Tips from Cisco’s SVP, Chief Security & Trust Officer 2:05 pm

    Presented by Duo Security

     Interested in bringing zero trust to your workforce but unsure of where to begin? This talk will cover the basics of workforce zero trust and best practices for implementation at organizations big and small. Practical learnings from Cisco’s rollout to its 100,000+ users will be shared to help you get started on your journey and plan for success.

    Click to Expand

    Speaker:

    Brad Arkin
    Brad Arkin

    Brad Arkin

    SVP, Chief Security & Trust Officer at Cisco

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 2:25 pm

    Presented by Veeam Software

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Speakers:

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy at Veeam Software

    Collapse This Item

  • The Rise of Secure Access Service Edge (SASE) 2:45 pm

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

    • The core components of a SASE platform like Bitglass.
    • The functionality you need to secure cloud, web, and remote access use cases.
    • Architectural considerations you should keep in mind when comparing SASE vendors.
    Click to Expand

    Speaker:

    Kevin Sheu
    Kevin Sheu

    Kevin Sheu

    Senior VP at Bitglass

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth 3:10 pm

    New Strategies for 2021

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Panel Participants:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Chief Security Evangelist

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Justin Fier
    Justin Fier

    Justin Fier

    Director of Cyber Intelligence & Analytics at Darktrace

    Collapse This Item

  • The Exodus of Endpoints: A Journey of Endpoints Through Hostile Conditions 3:55 pm

    Presented by ManageEngine

    Learn how the recent pandemic drove the endpoint to scattered remoteness and brought about the convergence of management and security. Are we trading productivity for security? Join our session to know more.

    Click to Expand

    Speaker:

    Santhosh Narasimhamoorthy
    Santhosh Narasimhamoorthy

    Santhosh Narasimhamoorthy

    Technical Evangelist

    Collapse This Item

  • Navigating Enterprise Security in a Post-Compromise Reality 4:15 pm

    Presented by ExtraHop Networks

    Every organization gets compromised – it’s how fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.

    Click to Expand

    Speaker:

    Dan Greer
    Dan Greer

    Dan Greer

    Director of Engineering at ExtraHop

    Collapse This Item

  • CISO Panel 4:35 pm

    Panel Participants:

    Jim Routh
    Jim Routh

    Jim Routh

    Former CISO - Virsec

    Tom Bray
    Tom Bray

    Tom Bray

    Chief Information Security Officer (CISO) at HealthPlan Services

    Jon West
    Jon West

    Jon West

    CISO & Privacy Officer - GuideWell Source

    Anil Varghese
    Anil Varghese

    Anil Varghese

    Chief Information Security Officer at Mad Mobile

    Perla G. Rolon Grau
    Perla G. Rolon Grau

    Perla G. Rolon Grau

    CIO - Retirement System University of Puerto Rico

    Collapse This Item

  • Summit Closing Session & Prize Drawing