Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • Breakfast Briefing: Security & Compliance from Endpoint to Cloud 9:10 am

    Presented by Armor Defense

    According to Enterprise Technology Research (ETR), 72% of the total global workforce is currently working remotely and the number of employees permanently working remotely will double in 2021 to 34.4%. With these figures, companies now more than ever must ensure their assets, especially their endpoints, are protected from threats.

    Armor now extends security protection and visibility beyond your public, private and hybrid cloud environments to your endpoint devices all in one solution. Armor Anywhere with EDR detects and blocks behavioral anomalies, fileless and signatureless malwares, ransomware, and more across your customers’ distributed endpoints in real time.

    Click to Expand

    Panel Participants:

    Ike Nwabah
    Ike Nwabah

    Ike Nwabah

    Vice President of Markets and Insights

    Collapse This Item

  • Welcome
  • Broken Authentication: Fixing one of the most critical web application security risks 9:40 am

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.
    Click to Expand

    Panel Participants:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions at Auth0

    Collapse This Item

  • Pull your SOC up with continuous validation and optimization 10:00 am

    Presented by Cymulate

    Protecting your organization requires vigilance and skills combined with effective controls and detections, just having a SOC is not enough.  SOCs vary in size, scope and staffing across various industries, outsourced and in-house, they exist to monitor, detect, and respond to evolving threats.  Guarding against failures in the security architecture is not just about selecting the right tools and suppliers;it requires constant validation of your people, processes, and technology. 

    Attend this session to learn: 

    • Why SOC validation is crucial in confronting threat evolutions.
    • The elements of a continuous SOC validation and improvement program.
    • How continuous and automated red teaming and BAS make SOC validation achievable with existing resources.
    Click to Expand

    Panel Participants:

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Lead of Solution Architecture

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 10:45 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Director to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.

    Highlights include:

    • Live detection for attacks targeting Active Directory
    • Attack surface reduction at both Active Directory and the endpoint
    • Continuous visibility to AD changes that introduce new exposures
    • Addressing Active Directory assurance to reduce risks and pass Red team tests
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • Small businesses deserve big protection 11:05 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Expert Panel Discussion: Cloud Security 2021 11:25 am

    Cloud Security 2021: What’s New, What Changes

    Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers.  Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.

    This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed.

    Click to Expand

    Panel Participants:

    Duncan Godfrey
    Duncan Godfrey

    Duncan Godfrey

    VP of Security Engineering at Auth0

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    JT Clay
    JT Clay

    JT Clay

    Technical Engineer

    Jonathan Reiber
    Jonathan Reiber

    Jonathan Reiber

    Jonathan Reiber, Senior Director, Cybersecurity Strategy and Policy

    Collapse This Item

  • Lunch Break
  • Keynote: Digital Forensics: Insights from the Secret Service Atlanta Field Lab! 12:30 pm

    Digital Forensics: Insights from the Secret Service Atlanta Field Lab!

    Local, state, and federal law enforcement agencies across the Southeast rely on the US Secret Service Regional Forensic Lab, headed by Technical Staff Assistant Alan Davis.  He will share (as much as allowed) some of the cutting-edge practices used by the lab for prosecuting criminals.  It’s not just ransomware and business email compromise – but also robberies and homicides that have a cyber element; this is where the Digital Forensics Lab comes in. 

    Ever wondered what happens to those confiscated laptops? Server images with advanced malware? How about when digging information from a biometric-locked mobile device that can prove to be the lynchpin of a criminal investigation?  These agents spend their days working behind the scenes, doing the stuff we’ve all seen depicted in the movies and TV crime dramas. 

    More importantly, they will explain for the Data Connectors audience what cybersecurity leaders can do to make themselves more secure. They’ll cover how to assure employee user agreements are in place, how to think about logging and audit, systems to consider, relationships to have in advance of a breach that could save you from problems down the road. Relating local stories that may seem familiar from headlines, this exclusive insight into the digital forensics’ lab will be a unique opportunity to learn about the innovative and exciting tactics used by the Secret Service to protect citizens and financial infrastructure. 

    Click to Expand

    Panel Participants:

    Alan Davis
    Alan Davis

    Alan Davis

    Operational Manager – USSS ATL RCC DEFL

    Collapse This Item

  • As the Cyber World Turns: A Strategy to Increase Security Efficiency 1:25 pm

    Presented by Check Point

    Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, Chief Security Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:

    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
    Click to Expand

    Panel Participants:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Collapse This Item

  • Rethinking data protection in the age of ransomware 1:45 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Cybersecurity and Duty of Care 2:20 pm

    Presented by Logically

     2020 was an unprecedented year for cyber risk. Work from home, a fluid regulatory environment, increased cyber-attacks and ballooning litigation expenses underscore the new paradigm facing IT and Cyber Security management. Traditional risk management and effective investment will become increasingly difficult in this paradigm. IT and Cyber Security leaders will have to focus on prioritization of risk and risk mitigation in context of the impact to the organization. This presentation will introduce you to the concept of cyber security “Duty of Care” and provide guidance on how leadership can leverage it to reduce risk in the environment in the future.

    Click to Expand

    Panel Participants:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 2:40 pm

    Presented by Veeam Software

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Panel Participants:

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy at Veeam Software

    Collapse This Item

  • Office, Home or Hybrid - manage and secure endpoints anywhere, anytime 3:10 pm

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth 3:30 pm

    Defense in Depth: New Strategies for 2021

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Panel Participants:

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Lead of Solution Architecture

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Day One Closing Session
  • Day Two
  • Welcome / Introductions
  • A Modern Approach to Information Protection 9:15 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover: 

    • Modern data security challenges 
    • The convergence of data and threat protection to secure data from internal and external threats 
    • How people-centric investigations lead to more rapid investigative outcomes
    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director at Proofpoint

    Collapse This Item

  • THE LAST LINE OF DEFENSE: DATA PROTECTION 9:35 am

    Presented by Pure Storage

    With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense. 

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • Threat-Informed Defense and Purple Team Operations: Lessons from the Pentagon and U.S. Cyber Command 10:20 am

    Presented by AttackIQ

    The cybersecurity community is evolving from a fortress mentality of “network defense” to a “threat-informed defense” approach to achieve cybersecurity effectiveness, with purple team operations at the center. Why is this happening and what does this transition mean? Over the last decade, the U.S. military has been at the forefront of the transition to threat-informed defense operations, first in the intelligence-operations bond that developed after September 11, 2001, and then in cybersecurity. Traditionally in cybersecurity, “blue” team defenders focused their strategies on meeting baseline cybersecurity best-practices: correcting misconfigurations, administering patches, and deploying commercial products. Red teams have traditionally been smaller, and testing has occurred periodically and not at the requisite scale to validate the blue team’s defense effectiveness. If blue teams fail to orient towards the most important threats, however, resources are wasted. Absent effective testing, security controls fail. To improve cybersecurity effectiveness, security teams are transitioning to a threat-informed defense strategy with the MITRE ATT&CK framework, a purple team construct of red and blue teams, and an automated testing platform combined into an engine of optimization. In this talk, author and former Chief Strategy Officer for Cyber Policy Jonathan Reiber will outline the evolution of threat-informed defense, discuss the value of MITRE ATT&CK and purple team operations, and show security teams how to move forward towards cybersecurity effectiveness. Participants will leave with a clear plan for how to affect change in their organizations and deliver results.

    Click to Expand

    Panel Participants:

    Jonathan Reiber
    Jonathan Reiber

    Jonathan Reiber

    Jonathan Reiber, Senior Director, Cybersecurity Strategy and Policy

    Collapse This Item

  • The Dark Web: Exposing the Business of Cybercrime 10:40 am

    Presented by Armor Defense

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service—allowing non-traditional and unskilled hackers to wreak havoc in ways previously unheard of. Criminals don’t have to be skilled to get your data;they just need to know where and who to go to for help. 

    This session aims to expose the inner workings and business of the cyber underground, focusing on the following: 

    Cryptocurrency – The impact digital currency has had on the rate of growth of cybercrime 

    Cybercrime-as-a-service – The expansion of services offered by skilled hackers and for low cost 

    Money laundering and money mules – Ways criminals are skirting around laws and regulations to get paid 

    Mitigating risk – How businesses can protect themselves from all levels of cybercriminals with an emphasis on the importance of investing in proactive threat-hunting

    Click to Expand

    Panel Participants:

    Joone Nijjar
    Joone Nijjar

    Joone Nijjar

    Product Manager

    Collapse This Item

  • Guest Keynote: Fireside Chat - Tye Hayes, CIO, City of Atlanta 11:00 am

    Panel Participants:

    Tye Hayes
    Tye Hayes

    Tye Hayes

    CIO - City of Atlanta

    Collapse This Item

  • Lunch Break
  • Lunch Briefing Sponsor: A Perspective on Network Detection and Response Platforms 11:50 am

    Presented by Gigamon

    As organizations continue to implement changing workforce modes and transition to the cloud, Information Security and Incident Response teams are faced with the challenge of maintaining security visibility in hybrid architectures, while detecting treats with a high degree of confidence and responding to attacks quickly.

    The presentation explores Network Detection and Response platforms as a critical component of a security operations ecosystem that address the rise of hybrid infrastructures. A representative NDR architecture is presented along with integration and operational considerations, including a look at how a guided-SaaS, cloud-native NDR solution simplifies and streamlines security operations.

    The complementary relationship between SIEM, perimeter defense systems, EDR and NDR systems is viewed, illustrating a new model where highly functional subsystems integrate with SIEM and SOAR applications.

    Click to Expand

    Panel Participants:

    Dale Guise
    Dale Guise

    Dale Guise

    Principal Security Architect

    Collapse This Item

  • Keynote: Unified Cyber Risk and Control Lifecycle 12:15 pm

    Unified Cyber Risk and Control Lifecycle

    • A central challenge for any organization seeking to unify or streamline their compliance requirements into a single, more efficient activity is how the organization will address different requirements. A requirement can be covered by many controls and a control may cover many requirements. We often need to be compliant with multiple standards and regulations that may have related or overlapping requirements.  
    • When we measure compliance to various regulations, mandates, and policies in a piecemeal fashion it often results in duplication of effort and redundant controls. It is for this reason Allstate has built a unified controls framework and begun centralization of all cybersecurity control details and questionnaires into a single ecosystem.  We’d like to share some of the lessons learned on this multi-year journey and how other organizations can benefit from implementing similar initiatives.
    Click to Expand

    Panel Participants:

    Ken Durr
    Ken Durr

    Ken Durr

    Information Security Senior Manager - Allstate Insurance Company

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 12:55 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Top tips for minimizing email security threats 1:15 pm

    Presented by Cisco

    Email continues to be the most effective way to gain a foothold in a business network and is often where successful compromises or breaches start. It’s the primary vector for malware infection because it effortlessly puts malicious payloads in front of the user, putting them one click away from exploitation. In this session, email security expert, Rob Marchi, shares how to overcome these challenges and how you can proactively address these ongoing issues with top tips for minimizing email security threats.

     

    Click to Expand

    Panel Participants:

    Rob Marchi
    Rob Marchi

    Rob Marchi

    Sr Product Manager

    Collapse This Item

  • Faking It: Stopping Impersonation Attacks with Cyber AI 1:55 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products at Darktrace

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 2:15 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Expert Panel Discussion: Managing the Insider Threat 2:35 pm

    Managing the Insider Threat

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses.  Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Most importantly, organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Panel Participants:

    Eyal Benishti
    Eyal Benishti

    Eyal Benishti

    CEO and Founder at IRONSCALES

    Daniel Stiegman
    Daniel Stiegman

    Daniel Stiegman

    Manager, Threat Intelligence Group

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    E.J. Hilbert
    E.J. Hilbert

    E.J. Hilbert

    Former FBI Cyber Agent, CISO & Founder at KCECyber

    Collapse This Item

  • Delivery Failed: Preventing ransomware by detecting its precursors 3:20 pm

    Presented by Red Canary

    Ransomware doesn’t magically materialize across endpoints at an organization. Adversaries often use other malware or legitimate tools to deliver it. Whether it’s during lateral movement, command and control, or data exfiltration, defenders have multiple opportunities to detect precursor activity and prevent a ransomware infection long before anything gets encrypted. 

    In this talk, we’re going to discuss trojans, offensive tools, file transfer utilities, and other software that frequently precedes a full blown ransomware infection. As it turns out, many ransomware precursors are very conspicuous, and if you can stop them in their tracks, you can prevent a ransomware incident. 

    Attendees will walk away from this talk with specific and detailed guidance on how to observe and detect the threats that often lead to a ransomware infection.

    Click to Expand

    Panel Participants:

    Brian Donohue
    Brian Donohue

    Brian Donohue

    Sr. Information Security Specialist

    Collapse This Item

  • CISO Panel 3:40 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Tamika Bass
    Tamika Bass

    Tamika Bass

    Cybersecurity Technology Director at Gannett Fleming

    Gaurav Singal
    Gaurav Singal

    Gaurav Singal

    CIO and VP - Georgia Lottery Corporation

    Jason Maddox
    Jason Maddox

    Jason Maddox

    Director of Information Technology and Chief Information Security Officer - Roark Capital Group

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Head of Attack Surface Analysis at Palo Alto Networks

    Collapse This Item

  • Summit Final closing Session
Partners