Event Schedule

Times for this Event are in Eastern Time (EDT/EST))

The Summit will be open from 8AM to 6PM.

  • Welcome
  • Broken Authentication: Fixing one of the most critical web application security risks 8:50 am

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.
    Click to Expand

    Panel Participants:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions at Auth0

    Collapse This Item

  • Small businesses deserve big protection 9:10 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Morning Coffee Break
  • A Modern Approach to Information Protection 9:45 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • Your Ransomware Hostage Rescue Guide 10:05 am

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage? 

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage by ransomware and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate at KnowBe4

    Collapse This Item

  • Expert Panel: Users-Centric Security 10:25 am

    Users-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

    Click to Expand

    Panel Participants:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Joe Vozzella
    Joe Vozzella

    Joe Vozzella

    Senior Field Engineering Manager

    Eric Eddy
    Eric Eddy

    Eric Eddy

    Technical Engineer

    Collapse This Item

  • Morning Break
  • Mitigating Risk using the MITRE ATT&CK framework 11:10 am

    Presented by Morphisec

    The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for risk assessment and deep defense stack optimization.

    Click to Expand

    Panel Participants:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • Top 4 Reasons Why Privileged Access Management Implementations Fail 11:30 am

    Presented by Remediant

    It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems. 

    Click to Expand

    Panel Participants:

    JD Sherry
    JD Sherry

    JD Sherry

    Chief Strategy Officer

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing : Principles of Security Management Partner 12:10 pm

    Presented by SEI

    It’s no secret that many small to medium sized companies struggle to implement and manage a cybersecurity program, and buying a set of tools to protect a singular attack vector won’t be a viable solution. These companies may also met with challenges like accessing talent, sifting through tools, evaluating vendors and keeping up with attackers. We’re introducing SEI IT Services—a security management partner that could be beneficial to your firm.

    Click to Expand

    Panel Participants:

    Steve Bomberger
    Steve Bomberger

    Steve Bomberger

    Head of IT Services

    Collapse This Item

  • Keynote: The China Cyber Threat 12:20 pm

    Understanding the Bigger Picture (and What it Means to Your Organization)

    In this fireside chat discussion, Author, consultant and frequent television commentator for Bloomberg, MSNBC, and CNN, Dr. Ward will discuss the geopolitical intricacies related to cyberthreats coming from Communist China and Russia.  Based on the ground-breaking work in his book “China’s Vision of Victory,” and his work with the US Department of Defense, other agencies and consulting for Fortune 500 organizations, Dr. Ward will take questions from the audience and discuss in more detail some of the key threats from afar. 

    Expect this talk to touch on state-sponsored hacking, and consider the government support for this type of “grey crime,” as well as how the rise of military and economic power in the Indo-Pacific affects the world’s new strategic balance.

    Click to Expand

    Panel Participants:

    Dr. Jonathan D. T. Ward
    Dr. Jonathan D. T. Ward

    Dr. Jonathan D. T. Ward

    Founder & Author - Atlas Organization

    Collapse This Item

  • Are You Ready for Intelligent SOC? 1:10 pm

    Presented by Netenrich

    Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

    Click to Expand

    Panel Participants:

    Brandon Hoffman
    Brandon Hoffman

    Brandon Hoffman

    Head of Security Strategy & CISO

    Collapse This Item

  • Latest network-layer DDoS trends and the rise of ransom-driven attacks 1:30 pm

    Presented by Cloudflare

    Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks. 

     

    In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:

    • Key trends and shifts in the DDoS landscape
    • Ransom-based attacks: what are they and how to respond?
    • Steps organizations can take to better protect their networks
    Click to Expand

    Panel Participants:

    Trey Guinn
    Trey Guinn

    Trey Guinn

    Head of Solution Engineering

    Collapse This Item

  • Afternoon Coffee Break
  • Expert Panel: Cybersecurity Landscape 2:05 pm

    Managing all Types of Risk in Today's Cybersecurity Landscape

    Risk comes from all angles in 2021. Users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the region.

    Click to Expand

    Panel Participants:

    David Telehowski
    David Telehowski

    David Telehowski

    Director, Security Engineering - Auth0

    Alex Kirk
    Alex Kirk

    Alex Kirk

    Global Principal - Suricata

    Justin Estadt
    Justin Estadt

    Justin Estadt

    Head of Product, IT Services

    Doug Dangremond
    Doug Dangremond

    Doug Dangremond

    CRO

    Collapse This Item

  • Rethinking data protection in the age of ransomware 2:35 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Get beyond compliance and achieve real data security 2:55 pm

    Presented by Imperva

    To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future.We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.

    Click to Expand

    Panel Participants:

    Terry Ray
    Terry Ray

    Terry Ray

    SVP Strategy and Imperva Fellow

    Collapse This Item

  • Afternoon Break
  • Expert Panel: Ransomware 3:30 pm

    Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Head of Attack Surface Analysis at Palo Alto Networks

    Michael Hiskey
    Michael Hiskey

    Michael Hiskey

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Andrew “Drew” Daniels
    Andrew “Drew” Daniels

    Andrew “Drew” Daniels

    CIO/CISO

    Jeff Williams
    Jeff Williams

    Jeff Williams

    Special Agent

    Steve Garrett
    Steve Garrett

    Steve Garrett

    Vice President of Customer Success

    Collapse This Item

  • Shift Left – The imperative need for code security 3:55 pm

    Presented by Check Point

    As we transform our organizations leveraging the cloud more every day we protect these multi-cloud environments with continuous and automated security and compliance. Today more than ever this same security should be integrated into the CI/CD pipeline with Infrastructure as Code Security for DevSecOps. This session will discuss shifting cloud security left into your CI/CD pipeline stopping misconfigurations, policy violations and potential malware present in 3rd party modules

    Click to Expand

    Panel Participants:

    Mark Ostrowski
    Mark Ostrowski

    Mark Ostrowski

    Security Evangelist, Office of the CTO

    Collapse This Item

  • 2020 Threats in Review 4:20 pm

    Presented by Darktrace

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.

    Click to Expand

    Panel Participants:

    Brianna Leddy
    Brianna Leddy

    Brianna Leddy

    Director of Analysis at Darktrace

    Collapse This Item

  • CISO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Bernie Cowens
    Bernie Cowens

    Bernie Cowens

    Chief Security Officer - Utility Technology Solutions

    Stan Mierzwa
    Stan Mierzwa

    Stan Mierzwa

    Director & Lecturer, Center for Cybersecurity - Kean University

    Gene Barskiy
    Gene Barskiy

    Gene Barskiy

    Head of IT and Security - Fisk Alloy

    Suresh Chawdhary
    Suresh Chawdhary

    Suresh Chawdhary

    Head of Security and Privacy - NOKIA

    Christopher Frenz
    Christopher Frenz

    Christopher Frenz

    AVP of IT Security, Mount Sinai South Nassau

    Tim Rohrbaugh
    Tim Rohrbaugh

    Tim Rohrbaugh

    CISO - JetBlue Airways

    Collapse This Item

  • Summit Final closing Session
Partners