
Virtual Summit
New York City 2021
Virtual Cybersecurity Summit
The New York City Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Have a burning question?
Click here to submit a question for one of the live, interactive panels.
Date
Wed. Mar 24
Event Schedule
Times for this Event are in Eastern Time (EDT/EST))
The Summit will be open from 8AM to 6PM.
- Welcome
-
Broken Authentication: Fixing one of the most critical web application security risks 8:50 am
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.
This session will provide:
- An overview of broken authentication;
- Why it’s so dangerous;
- The types of threats that can take advantage of this vulnerability;
- How you can prevent this most critical application security risk.
Panel Participants:
-
Small businesses deserve big protection 9:10 am
Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.
Panel Participants:
- Morning Coffee Break
-
A Modern Approach to Information Protection 9:45 am
Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021?
Panel Participants:
-
Your Ransomware Hostage Rescue Guide 10:05 am
Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage?
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.
In this webcast we will cover:
- What new scary ransomware strains are in the wild
- Am I infected?
- I’m infected, now what?
- Proven methods of protecting your organization
- How to create your human firewall
Don’t get held hostage by ransomware and become a statistic!
Panel Participants:
-
Expert Panel: Users-Centric Security 10:25 am
Users-Centric Security
Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense. Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?
Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover… as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions. Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.
Panel Participants:
- Morning Break
-
Mitigating Risk using the MITRE ATT&CK framework 11:10 am
The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for risk assessment and deep defense stack optimization.
Panel Participants:
-
Top 4 Reasons Why Privileged Access Management Implementations Fail 11:30 am
It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.
Panel Participants:
- Lunch Break
-
Lunch Sponsor / Briefing : Principles of Security Management Partner 12:10 pm
It’s no secret that many small to medium sized companies struggle to implement and manage a cybersecurity program, and buying a set of tools to protect a singular attack vector won’t be a viable solution. These companies may also met with challenges like accessing talent, sifting through tools, evaluating vendors and keeping up with attackers. We’re introducing SEI IT Services—a security management partner that could be beneficial to your firm.
Panel Participants:
-
Keynote: The China Cyber Threat 12:20 pm
Understanding the Bigger Picture (and What it Means to Your Organization)
In this fireside chat discussion, Author, consultant and frequent television commentator for Bloomberg, MSNBC, and CNN, Dr. Ward will discuss the geopolitical intricacies related to cyberthreats coming from Communist China and Russia. Based on the ground-breaking work in his book “China’s Vision of Victory,” and his work with the US Department of Defense, other agencies and consulting for Fortune 500 organizations, Dr. Ward will take questions from the audience and discuss in more detail some of the key threats from afar.
Expect this talk to touch on state-sponsored hacking, and consider the government support for this type of “grey crime,” as well as how the rise of military and economic power in the Indo-Pacific affects the world’s new strategic balance.
Panel Participants:
-
Are You Ready for Intelligent SOC? 1:10 pm
Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.
Panel Participants:
-
Latest network-layer DDoS trends and the rise of ransom-driven attacks 1:30 pm
Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks.
In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:
- Key trends and shifts in the DDoS landscape
- Ransom-based attacks: what are they and how to respond?
- Steps organizations can take to better protect their networks
Panel Participants:
- Afternoon Coffee Break
-
Expert Panel: Cybersecurity Landscape 2:05 pm
Managing all Types of Risk in Today's Cybersecurity Landscape
Risk comes from all angles in 2021. Users, vendors, partners, systems. In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the region.
Panel Participants:
-
Rethinking data protection in the age of ransomware 2:35 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Get beyond compliance and achieve real data security 2:55 pm
To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future.We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.
Panel Participants:
- Afternoon Break
-
Expert Panel: Ransomware 3:30 pm
Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
Shift Left – The imperative need for code security 3:55 pm
As we transform our organizations leveraging the cloud more every day we protect these multi-cloud environments with continuous and automated security and compliance. Today more than ever this same security should be integrated into the CI/CD pipeline with Infrastructure as Code Security for DevSecOps. This session will discuss shifting cloud security left into your CI/CD pipeline stopping misconfigurations, policy violations and potential malware present in 3rd party modules
Panel Participants:
-
2020 Threats in Review 4:20 pm
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.
Panel Participants:
-
CISO Panel 4:25 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Final closing Session
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners