
Virtual Summit
Florida & Caribbean
The Florida & Caribbean Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. Jun 16
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
- Welcome / Introductions
- Welcome Address 8:45 am
-
Disrupting Lateral Movement by Securing Active Directory 9:00 am
A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.
Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.
Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.
Highlights include:
- Live detection for attacks targeting Active Directory
- Attack surface reduction at both Active Directory and the endpoint
- Continuous visibility to AD changes that introduce new exposures
- Addressing Active Directory assurance to reduce risks and pass Red team tests
Speaker:
-
As the Cyber World Turns: A Strategy to Increase Security Efficiency 9:20 am
Presented by Check Point Software Technologies
Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.
These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.
Join Grant Asplund, Chief Security Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:
- Increases security efficiency with a unified security architecture
- Improves your organization’s overall threat prevention profile
- Eliminates complexity caused by managing disparate systems
- Reduces total cost of ownership
Speaker:
-
The Dark Web: Exposing the Business of Cybercrime 9:40 am
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service—allowing non-traditional and unskilled hackers to wreak havoc in ways previously unheard of. Criminals don’t have to be skilled to get your data;they just need to know where and who to go to for help.
This session aims to expose the inner workings and business of the cyber underground, focusing on the following:
- Cryptocurrency – The impact digital currency has had on the rate of growth of cybercrime
- Cybercrime-as-a-service – The expansion of services offered by skilled hackers and for low cost
- Money laundering and money mules – Ways criminals are skirting around laws and regulations to get paid
- Mitigating risk – How businesses can protect themselves from all levels of cybercriminals with an emphasis on the importance of investing in proactive threat-hunting
Speaker:
-
Expert Panel Discussion: User-Centric Security 10:00 am
User-Centric Security
Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense. Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?
Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover… as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions. Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.
Panel Participants:
-
Moving Beyond Password to Delight & Secure Users 10:50 am
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Speaker:
-
Rethinking Data Protection in the Age of Ransomware 11:10 am
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Speaker:
-
Faking It: Stopping Impersonation Attacks with Cyber AI 11:30 am
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response.
In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.
Find out how in this session.
Panel Participants:
- Guest Appearance Featuring Francis X. Suarez, Mayor, City of Miami 11:50 am
- Lunch Break
-
Keynote: James Grant 12:20 pm
Florida’s State of Cybersecurity
Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center. Tasked with developing the state’s first ever enterprise approach to technology, he will share the vision for Florida’s technology office and why partnership is foundational to its success. To deploy a center of excellence model, he’ll be leaning on and sharing lessons learned as an entrepreneur and policy maker for those in attendance.
Speaker:
-
Microsoft Teams Vulnerabilities 1:10 pm
Microsoft Teams has quickly become the go-to application for remote work, accelerating dramatically in usage over the last year. Millions of users turned to Microsoft Teams to help keep businesses going in 2020—and hackers have noticed. As Teams is still relatively new, much is unknown about how it operates and how hackers will approach it.
While the increased usage has been well-documented, what’s not been documented is whether the app is vulnerable to hacking. We will talk about discoveries that have already been made, potential risks that we see in the future, and how to best secure this relatively new communication vector.
This session will walk attendees through:
- The many inherent vulnerabilities in the platform
- The popular attack types
- How hackers act differently within Teams than they do on email
Speaker:
-
Insider Risk Management: The Alternative to Traditional Data Protection is Here! 1:30 pm
We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.
Speaker:
-
Zero Trust Tips from Cisco’s SVP, Chief Security & Trust Officer 2:05 pm
Interested in bringing zero trust to your workforce but unsure of where to begin? This talk will cover the basics of workforce zero trust and best practices for implementation at organizations big and small. Practical learnings from Cisco’s rollout to its 100,000+ users will be shared to help you get started on your journey and plan for success.
Speaker:
-
Why Office 365 Backup is ESSENTIAL 2:25 pm
The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.
Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.
Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential. They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.
Speakers:
-
The Rise of Secure Access Service Edge (SASE) 2:45 pm
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:
- The core components of a SASE platform like Bitglass.
- The functionality you need to secure cloud, web, and remote access use cases.
- Architectural considerations you should keep in mind when comparing SASE vendors.
Speaker:
-
Expert Panel Discussion: Defense in Depth 3:10 pm
New Strategies for 2021
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
Panel Participants:
-
The Exodus of Endpoints: A Journey of Endpoints Through Hostile Conditions 3:55 pm
Learn how the recent pandemic drove the endpoint to scattered remoteness and brought about the convergence of management and security. Are we trading productivity for security? Join our session to know more.
Speaker:
-
Navigating Enterprise Security in a Post-Compromise Reality 4:15 pm
Presented by ExtraHop Networks
Every organization gets compromised – it’s how fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.
Speaker:
- CISO Panel 4:35 pm
- Summit Closing Session & Prize Drawing
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners