Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Summit will be open from 8AM to 6PM.

  • Welcome
  • Disrupting Lateral Movement by Securing Active Directory 8:55 am

    Presented by Attivo

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

     In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.  Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • A Modern Approach to Information Protection 9:15 am

    Presented by Proofpoint

     Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover: 

    • Modern data security challenges 
    • The convergence of data and threat protection to secure data from internal and external threats 
    • How people-centric investigations lead to more rapid investigative outcomes
    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • Morning Coffee Break
  • Small businesses deserve big protection 9:50 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • The Ultimate Vendor Risk Assessment Checklist 10:10 am

    Presented by OneTrust

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches. 

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including: 

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts
    Click to Expand

    Panel Participants:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Director, Product Management at OneTrust

    Collapse This Item

  • DevOps, Security & the Cloud - Expert Panel Discussion 10:30 am

    DevOps Security and the Cloud

    DevOps enables you to release features and bug fixes faster than ever before. However, traditional security activities can’t seem to keep up with this fast-paced tempo. How can you make sure security doesn’t get left behind? Ignoring security bugs won’t make them go away. Slowing down the DevOps team isn’t an option. How can we make DevOps, and DevSecOps work well in the fast-paced cloud environment we live in?

    Click to Expand

    Special Guest Moderator:

    Merritt Baer
    Merritt Baer

    Merritt Baer

    Principal, AWS OCISO at Amazon Web Services

    Jonathan Knudsen
    Jonathan Knudsen

    Jonathan Knudsen

    Technical Evangelist - Synopsys

    Carlo Beronio
    Carlo Beronio

    Carlo Beronio

    Director Systems Engineering West/Central at Attivo Networks

    Jason Madey
    Jason Madey

    Jason Madey

    Security Strategist

    Collapse This Item

  • The Pilot's Checklist 11:05 am

    Presented by Capsule8

    Discovering risk in a new age of threats and infrastructure transformation. To keep up as technology modernizes around them, security teams need to support speed, stability, and scalability while also protecting and responding to incidents in all infrastructure environments. The landscape is shifting rapidly, are you ready to adapt?

    Click to Expand

    Panel Participants:

    Jason Madey
    Jason Madey

    Jason Madey

    Security Strategist

    Collapse This Item

  • Lunch Break
  • Keynote: Emergency CISA Briefing: Directive 21-02: Microsoft Exchange On-Prem Vulnerabilities 12:00 pm

    Klint Walker: Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    NOTE: Patch Immediately! Don’t Wait for this Presentation! 

    In what has been called “Operation Exchange Marauder,” an active exploitation of multiple zero-day Microsoft Exchange vulnerabilities was uncovered just this past week, and has kept the Department of Homeland Security (DHS)  Cyber Infrastructure Security Agency (CISA) busy, with their second major Alert of the year. 

    Emergency Directive (ED) 21-02 may be even more concerning than the preceding ED 21-01 (SolarWinds Orion Sunburst Supply Chain Attack), and could potentially impact more organizations. Our CISA Cybersecurity Advisor, Klint Walker, will go over what is known to date about these critical vulnerabilities in Microsoft Exchange products. Successful exploitation of these vulnerabilities allows an attacker to access on-premises Exchange servers, enabling them to gain persistent system access and control of an enterprise network. 

    Details so far suggest that Advanced Persistent Threat (APT) nation-state actors have used these vulnerabilities to steal email. The data also suggested that webshells have been deployed to numerous organizations that give the attackers ready access to exfiltrate data. 

    Join this important keynote to get the latest from the central agency responsible for assisting organizations responsible for critical infrastructure across the US. 

    Click to Expand

    Panel Participants:

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Collapse This Item

  • Gaining Visibility into Virtual Environments 12:50 pm

    Presented by Gigamon

    With the shift to the cloud we gain scalability, but we lose visibility. In this session, we will discuss the problems we encounter and the options we have to get back the visibility into the data.

    • Come learn what the options are
    • How to gain deeper hybrid cloud visibility
    • Scale faster, manage more easily
    • Some of the pros and cons

    By the end of the session, you’ll have the knowledge on how you can get back control of the data and keep an eye out for bad guys.

    Click to Expand

    Panel Participants:

    James Mandelbaum
    James Mandelbaum

    James Mandelbaum

    Senior Security Engineer

    Collapse This Item

  • Afternoon Coffee Break
  • The Dark Web: Exposing the Business of Cybercrime 1:30 pm

    Presented by Armor Defense

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service—allowing non-traditional and unskilled hackers to wreak havoc in ways previously unheard of. Criminals don’t have to be skilled to get your data;they just need to know where and who to go to for help.

    This session aims to expose the inner workings and business of the cyber underground, focusing on the following:

    • Cryptocurrency – The impact digital currency has had on the rate of growth of cybercrime
    • Cybercrime-as-a-service – The expansion of services offered by skilled hackers and for low cost
    • Money laundering and money mules – Ways criminals are skirting around laws and regulations to get paid
    • Mitigating risk – How businesses can protect themselves from all levels of cybercriminals with an emphasis on the importance of investing in proactive threat-hunting
    Click to Expand

    Panel Participants:

    Joone Nijjar
    Joone Nijjar

    Joone Nijjar

    Product Manager

    Collapse This Item

  • Top 5 Reasons Why Privilege Access Management Implementations Fail 1:50 pm

    Presented by Remediant

    It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.

    Join Remediant in this presentation to:

    • Learn the five reasons why privileged access management implementations fail;· Identify areas in your IAM program where you can reduce admin access risk
    • Capitalize on existing investments, while improving your risk posture.
    Click to Expand

    Panel Participants:

    JD Sherry
    JD Sherry

    JD Sherry

    Chief Strategy Officer

    Collapse This Item

  • Users-Centric Security - Expert Panel Discussion 2:15 pm

    Users-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

    Click to Expand

    Panel Participants:

    Amish Kohli
    Amish Kohli

    Amish Kohli

    Cloud Security Solutions Architect

    David Hanighen
    David Hanighen

    David Hanighen

    Chief Information Security Officer - Logix Federal Credit Union

    Courtney Elder
    Courtney Elder

    Courtney Elder

    VP Information Security GRC

    Tony Lee
    Tony Lee

    Tony Lee

    Vice President, Global Services Technical Operations

    Collapse This Item

  • Afternoon Break
  • Your Ransomware Hostage Rescue Guide 3:00 pm

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage? 

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage by ransomware and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate at KnowBe4

    Collapse This Item

  • Rethinking your data protection strategy in the age of ransomware. 3:00 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • CISO Panel 3:45 pm

    Panel Participants:

    Allen Ohanian
    Allen Ohanian

    Allen Ohanian

    Chief Information Security Officer - Los Angeles County Department of Children and Family Services

    Gary Weessies
    Gary Weessies

    Gary Weessies

    CISO and HIPAA Compliance Officer - Keystone Medical Group

    Bryan Galloway
    Bryan Galloway

    Bryan Galloway

    Director of Information Security - Enphase Energy

    Kevin McDonald
    Kevin McDonald

    Kevin McDonald

    Chief Operating & Chief Information Security Officer - Alvaka Networks

    Greg DeBrecourt
    Greg DeBrecourt

    Greg DeBrecourt

    Former CISM/CISO - Aerovironment Inc.

    Jeffrey Johnson
    Jeffrey Johnson

    Jeffrey Johnson

    Former Vice President, Head of Security (CISO and Regional Security Officer) at Siemens Healthcare

    David Hanighen
    David Hanighen

    David Hanighen

    Chief Information Security Officer - Logix Federal Credit Union

    Collapse This Item

  • Day One Closing Session
  • Day Two
  • Welcome / Introductions
  • Are You Ready for Intelligent SOC? 9:10 am

    Presented by Netenrich

    Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

    Click to Expand

    Panel Participants:

    Brandon Hoffman
    Brandon Hoffman

    Brandon Hoffman

    Head of Security Strategy & CISO

    Collapse This Item

  • Mitigating Risk using the MITRE ATT&CK framework 9:30 am

    Presented by Morphisec

    The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for risk assessment and deep defense stack optimization

    Click to Expand

    Panel Participants:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Collapse This Item

  • Morning Coffee Break
  • Latest network-layer DDoS trends and the rise of ransom-driven attacks 10:05 am

    Presented by Cloudflare

    Unprecedented changes in how people live and work around the world since the COVID-19 pandemic led to changing patterns of Internet usage. And as our reliance on the Internet surged, so did the frequency, sophistication, and distribution of cyberattacks. 

     

    In this talk, Cloudflare’s Head of Solution Engineering will discuss the latest DDoS attack trends observed over Cloudflare’s network. Join this talk to understand:

    • Key trends and shifts in the DDoS landscape
    • Ransom-based attacks: what are they and how to respond?
    • Steps organizations can take to better protect their networks
    Click to Expand

    Panel Participants:

    Trey Guinn
    Trey Guinn

    Trey Guinn

    Head of Solution Engineering

    Collapse This Item

  • The Rise of Secure Access Service Edge (SASE) 10:25 am

    Presented by Bitglass

    Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

    • Why organizations need SASE
    • The key components of SASE offerings
    • How SASE architectures impact performance
    Click to Expand

    Panel Participants:

    Jacob Serpa
    Jacob Serpa

    Jacob Serpa

    Senior Product Manager

    Collapse This Item

  • Defense in Depth - Expert Panel Discussion 10:45 am

    Defense in Depth (3rd Party Risk)/Defense-in-Depth: Data, Networks & Infrastructure

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Panel Participants:

    Netta Schmeidler
    Netta Schmeidler

    Netta Schmeidler

    VP of Product Management

    Steve Poeppe
    Steve Poeppe

    Steve Poeppe

    Vice President, Solution Architect

    Negisa Taymourian
    Negisa Taymourian

    Negisa Taymourian

    Cloud Security Evangelist

    Collapse This Item

  • Cybersecurity and Duty of Care 11:20 am

    Presented by Logically

    2020 was an unprecedented year for cyber risk. Work from home, a fluid regulatory environment, increased cyber-attacks and ballooning litigation expenses underscore the new paradigm facing IT and Cyber Security management. Traditional risk management and effective investment will become increasingly difficult in this paradigm. IT and Cyber Security leaders will have to focus on prioritization of risk and risk mitigation in context of the impact to the organization. This presentation will introduce you to the concept of cyber security “Duty of Care” and provide guidance on how leadership can leverage it to reduce risk in the environment in the future.

    Click to Expand

    Panel Participants:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Lunch Break
  • Keynote: Cryptocurrency and Blockchain Technology in a Public Underground World. 12:05 pm

    William Callahan - U.S. DEA Special Agent in Charge (Ret.)

    Much has been written, good and bad, about cryptocurrency, and its effect on cybersecurity. As the value of a single Bitcoin approaches US $50,000 – it’s clear that its usage is not only for illicit activity.  That said, there has long been a connection in the use of these currencies in relation to cybercrime, especially with regard, but not limited to, ransomware.

    Based on his long tenure as a Special Agent in Charge at the United States Drug Enforcement Administration (DEA), William Callahan will discuss how Crypto and Blockchain have impacted Cybercrime. He’ll explain how the illicit uses have grown, with relatable stories from his professional career, and why it’s important for every cybersecurity executive to know how to protect themselves and their organizations from threat actors.

    Mr. Callahan will also detail the training and certifications available, both free online classes as well as certificate courses for qualified professionals.

    Outline

    • Overview of Cryptocurrency and Blockchain Technology
      • Intended Impact of Society
      • Intended Impact of Financial Institutions (fees, correspondent banking)
      • Public Ledger
    • Illicit Use
      • Drug Trafficking (Darkweb, common drugs)
      • Human Trafficking/Child Exploitation
      • Foreign and Domestic Terrorism (Islamic Extremists, Capitol Hill Rioters)
      • Tor, Telegram, social media apps
    • Training and Certification
      • Free Resources: Podcasts, Videos
      • Blockchain Analysis
      • Certified Cryptocurrency Course by Blockchain Intelligence Group (Discount Code to be provided to attendees)

     

    Click to Expand

    Panel Participants:

    William Callahan
    William Callahan

    William Callahan

    U.S. DEA Special Agent in Charge (Ret.)

    Collapse This Item

  • Extortionware: Your Privacy Problems Made Public 1:00 pm

    Presented by OneLogin

    Over the last decade, ransomware has increasingly become the most popular option for hackers to monetize the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.

    Click to Expand

    Panel Participants:

    Lonnie Benavides
    Lonnie Benavides

    Lonnie Benavides

    Head of Infrastructure and Application Security

    Collapse This Item

  • Afternoon Coffee Break
  • Protecting MS365 1:40 pm

    Presented by Cisco

    With the migration of email to the cloud, it is more important than ever to protect users from account takeover, phishing, and business email compromise attacks. Join this session to learn how Cloud Mailbox Defense is leveraging the native APIs provided by Microsoft to bring Cisco security as close to the mailbox as possible.

    Click to Expand

    Panel Participants:

    Christian Clasen
    Christian Clasen

    Christian Clasen

    Technical Engineer

    Collapse This Item

  • 2020 Threats in Review 2:00 pm

    Presented by DarkTrace

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.

    Click to Expand

    Panel Participants:

    Brianna Leddy
    Brianna Leddy

    Brianna Leddy

    Director of Analysis at Darktrace

    Collapse This Item

  • Compliance & Automation - Expert Panel Discussion 2:20 pm

    Compliance & Automation in Cybersecurity

    Managing compliance needs as a continuous, organizational process (as opposed to a reactive response), amid the ever-increasing myriad of industry regulations and legislation has become a full time job for most CISOs.  Automation – including artificial intelligence and machine learning will help, and are perhaps more critical than ever. As CRPA comes into play and brings the US closer to GDPR, there are also a number of touchpoints where the CDO and CISO interplay will be crucial over the coming months.

    In this panel, our experts will discuss the current issues with regard to compliance, monitoring, and reporting.  They’ll also talk about policy decisions and regulations that have kept them busy of late, and what we can expect more of in 2021.

    Click to Expand

    Panel Participants:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Director, Product Management at OneTrust

    Ron Kehoe
    Ron Kehoe

    Ron Kehoe

    Senior Security Engineer

    Jake Bernstein
    Jake Bernstein

    Jake Bernstein

    Partner - K&L Gates

    Diane Reynolds
    Diane Reynolds

    Diane Reynolds

    Partner, Chair of the Cybersecurity, Data Protection & Privacy Practice - McElroy, Deutsch, Mulvaney & Carpenter, LLP

    Collapse This Item

  • Afternoon Break
  • Earn More Trust Through Vulnerability Management Best Practices 3:10 pm

    Presented by Synack

    COVID has brought on a set of security challenges that has security teams pivoting and spinning up new applications to meet the unique demands of quarantine and remote work. When external and even internal environments demand that you move quickly, how do you measure and communicate changes? And how do you build trust with customers, staff and the board, ensuring data and other investments are protected? Join Synack’s VP of Operations, Nick Harrahill, for a discussion on how to meet these unique demands.

    You’ll learn: 

    • Best practices security leaders can pursue to harden vulnerability programs
    • How leveraging a continuous crowdsourced testing model can help measure and communicate security posture
    • How to maximize trust with customers and throughout organizations
    Click to Expand

    Panel Participants:

    Nick Harrahill
    Nick Harrahill

    Nick Harrahill

    VP of Operations at Synack

    Collapse This Item

  • Summit Final closing Session
Partners