Registration

Tue. Nov 23

Registration for qualified senior cybersecurity professionals. Subject to approval.

  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • 10 Biggest and Boldest Insider Threats Incidents of 2021 8:50 am
    Add to Calendar20211123 8:50 am20211123 9:10 amAmerica/Los_Angeles10 Biggest and Boldest Insider Threats Incidents of 2021

    Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams. Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat. Many organisations are learning that the hard way.

    Join us for this presentation with Brian Reed to explore some of the biggest insider attacks of 2021 – and what you can do to avoid similar threats. You’ll learn:

    • The unexpected ways insiders can steal money, disrupt business and tarnish your brand
    • How third-party vendors can pose as big of an insider threat as your employees
    • Tricks that outside attackers use to gain insider access 
    • Tips for managing insider threats and risks in your organization

    Presented by Proofpoint

    Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams. Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat. Many organisations are learning that the hard way.

    Join us for this presentation with Brian Reed to explore some of the biggest insider attacks of 2021 – and what you can do to avoid similar threats. You’ll learn:

    • The unexpected ways insiders can steal money, disrupt business and tarnish your brand
    • How third-party vendors can pose as big of an insider threat as your employees
    • Tricks that outside attackers use to gain insider access 
    • Tips for managing insider threats and risks in your organization
    Click to Expand

    Speaker:

    Brian Reed
    Brian Reed

    Brian Reed

    Cybersecurity Strategy at Proofpoint

    Collapse This Item

  • Using Data Protection for Ransomware Recovery 9:15 am
    Add to Calendar20211123 9:15 am20211123 9:35 amAmerica/Los_AngelesUsing Data Protection for Ransomware Recovery

    With the growth of ransomware and cybercrime, Data Protection is rapidly becoming the go to solution to help organizations recover from a Ransomware event and avoid paying the Ransom and hope your data made available. Current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical.

     Join this session to learn best practices of how to evaluate your current data protection solution and what changes you may need to make to be ready to recover from a Ransomware event.

    Presented by Pure Storage

    With the growth of ransomware and cybercrime, Data Protection is rapidly becoming the go to solution to help organizations recover from a Ransomware event and avoid paying the Ransom and hope your data made available. Current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical.

     Join this session to learn best practices of how to evaluate your current data protection solution and what changes you may need to make to be ready to recover from a Ransomware event.

    Click to Expand

    Speaker:

    David Huskisson
    David Huskisson

    David Huskisson

    Director, Data Protection Solutions at Pure Storage

    Collapse This Item

  • The Ultimate Vendor Risk Assessment Checklist 9:50 am
    Add to Calendar20211123 9:50 am20211123 10:10 amAmerica/Los_AngelesThe Ultimate Vendor Risk Assessment Checklist

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches.

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including:

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts

    Presented by OneTrust

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches.

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including:

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts
    Click to Expand

    Speaker:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Product Manager at OneTrust

    Collapse This Item

  • Securing the Modern API Ecosystem 10:10 am
    Add to Calendar20211123 10:10 am20211123 10:30 amAmerica/Los_AngelesSecuring the Modern API Ecosystem

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Speaker:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Collapse This Item

  • Expert Panel Discussion: Planning Your 2022 Cybersecurity Budget 10:30 am
    Add to Calendar20211123 10:30 am20211123 11:00 amAmerica/Los_AngelesExpert Panel Discussion: Planning Your 2022 Cybersecurity Budget

    As 2021 draws to a close, CISOs and other cybersecurity leaders turn their attention to budgeting and planning for 2022. Resources, new technologies, and staffing all take a part—getting the balance right can be tricky.

    Cybersecurity headlines have made asking for more budget somewhat easier; however, managing line items and spending wisely will always be the core focus.

    In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.

     

    .

    As 2021 draws to a close, CISOs and other cybersecurity leaders turn their attention to budgeting and planning for 2022. Resources, new technologies, and staffing all take a part—getting the balance right can be tricky.

    Cybersecurity headlines have made asking for more budget somewhat easier; however, managing line items and spending wisely will always be the core focus.

    In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.

     

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Tony Anscombe
    Tony Anscombe

    Tony Anscombe

    Chief Security Evangelist at ESET North America

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Curtis Blais
    Curtis Blais

    Curtis Blais

    CISO - Cybera

    Collapse This Item

  • Ransomware Resilience 11:15 am
    Add to Calendar20211123 11:15 am20211123 11:35 amAmerica/Los_AngelesRansomware Resilience

    Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs. 

    Join this live session and hear how your company can: 

    • Instantly resume operations post-attack 
    • Reduce your data loss from days to seconds/minutes 
    • Test and isolate data to ensure a safe recovery

    Presented by Zerto

    Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs. 

    Join this live session and hear how your company can: 

    • Instantly resume operations post-attack 
    • Reduce your data loss from days to seconds/minutes 
    • Test and isolate data to ensure a safe recovery
    Click to Expand

    Speaker:

    Ken Smallwood
    Ken Smallwood

    Ken Smallwood

    Solutions Engineer at Zerto

    Collapse This Item

  • To Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution 11:35 am
    Add to Calendar20211123 11:35 am20211123 11:55 amAmerica/Los_AngelesTo Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution

    Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. 

    Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily. 

    Join us to discover how Okta’s pre-built identity solutions: 

    • Accelerates time to market 
    • Lowers the total cost of ownership (TCO) of Application Development 
    • Focuses resources on Core Application Functionality 
    • Reduces the Risk of a Security and Compliance Breach 
    • Helps ensure a better user experience

    Presented by Okta

    Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. 

    Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily. 

    Join us to discover how Okta’s pre-built identity solutions: 

    • Accelerates time to market 
    • Lowers the total cost of ownership (TCO) of Application Development 
    • Focuses resources on Core Application Functionality 
    • Reduces the Risk of a Security and Compliance Breach 
    • Helps ensure a better user experience
    Click to Expand

    Speaker:

    Dimitri Melchior
    Dimitri Melchior

    Dimitri Melchior

    Director, Solutions Engineers at Okta

    Collapse This Item

  • Lunch Break
  • Keynote: From the Ransomware Frontlines: R-Rated Takeaways 12:25 pm
    Add to Calendar20211123 12:25 pm20211123 1:10 pmAmerica/Los_AngelesKeynote: From the Ransomware Frontlines: R-Rated Takeaways

    For every ransomware attack that hits the news, hundreds of others go uncovered and several are effectively stopped. Jaycee Roth has handled nearly every possible attack scenario and along her team, has investigated well over 1000 ransomware incidents. In this session, Jaycee dissects the latest ransomware TTPs, including double and triple extortion, the exponential growth of the initial access marketplace, and practical steps proven to work (if deployed in time).  

    KEY TAKEAWAYS 

    • How initial access brokers are leveraging 0-days and a wide variety of CVEs to fuel more destructive ransomware attacks
    • What adversaries look for during reconnaissance, how to spot them, and a clever tactic to misguide them 
    • Encryption, exfiltration, and DDOS – the rise of the triple extortion and what it means for blue teams 
    • Which steps precede ransomware detonation? Effective precursors to monitor for and how to act before detonation

    From the Ransomware Frontlines: R-Rated Takeaways

    For every ransomware attack that hits the news, hundreds of others go uncovered and several are effectively stopped. Jaycee Roth has handled nearly every possible attack scenario and along her team, has investigated well over 1000 ransomware incidents. In this session, Jaycee dissects the latest ransomware TTPs, including double and triple extortion, the exponential growth of the initial access marketplace, and practical steps proven to work (if deployed in time).  

    KEY TAKEAWAYS 

    • How initial access brokers are leveraging 0-days and a wide variety of CVEs to fuel more destructive ransomware attacks
    • What adversaries look for during reconnaissance, how to spot them, and a clever tactic to misguide them 
    • Encryption, exfiltration, and DDOS – the rise of the triple extortion and what it means for blue teams 
    • Which steps precede ransomware detonation? Effective precursors to monitor for and how to act before detonation
    Click to Expand

    Speaker:

    Jaycee Roth
    Jaycee Roth

    Jaycee Roth

    Associate Managing Director, Cyber Risk at Kroll

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 1:10 pm
    Add to Calendar20211123 1:10 pm20211123 1:30 pmAmerica/Los_AngelesRansomware Decoded: Understanding & Preventing Modern Ransomware Attacks

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Speaker:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 1:30 pm
    Add to Calendar20211123 1:30 pm20211123 1:50 pmAmerica/Los_AngelesWhy Office 365 Backup is ESSENTIAL

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Presented by Veeam

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Speakers:

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy at Veeam Software

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Collapse This Item

  • A Realistic Take on Zero Trust 2:05 pm
    Add to Calendar20211123 2:05 pm20211123 2:25 pmAmerica/Los_AngelesA Realistic Take on Zero Trust

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Presented by Lookout

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Click to Expand

    Speaker:

    Hank Schless
    Hank Schless

    Hank Schless

    Senior Manager, Security Solutions at Lookout

    Collapse This Item

  • Improving Cyber Resilience Against Ransom Attacks 2:25 pm
    Add to Calendar20211123 2:25 pm20211123 2:45 pmAmerica/Los_AngelesImproving Cyber Resilience Against Ransom Attacks

    Ransomware and Ransom DDoS attacks have been targeting many Canadian companies. Cloudflare’s Cybersecurity expert, Ameet Naik, will describe these types of attacks, differences and impacts to businesses, best practices to minimize risks, and some recommendations for companies to improve cyber resiliency against all threats.

    This session will help you:

    • Learn more about industry trends for Ransomware and Ransom DDoS
    • Understand how organizations can mitigate these threats
    • Implement proactive defenses to prevents ransomware attacks against your organization

    Presented by Cloudflare

    Ransomware and Ransom DDoS attacks have been targeting many Canadian companies. Cloudflare’s Cybersecurity expert, Ameet Naik, will describe these types of attacks, differences and impacts to businesses, best practices to minimize risks, and some recommendations for companies to improve cyber resiliency against all threats.

    This session will help you:

    • Learn more about industry trends for Ransomware and Ransom DDoS
    • Understand how organizations can mitigate these threats
    • Implement proactive defenses to prevents ransomware attacks against your organization
    Click to Expand

    Speaker:

    Ameet Naik
    Ameet Naik

    Ameet Naik

    Director - Cybersecurity Strategy at Cloudflare

    Collapse This Item

  • Expert Panel Discussion: Cloud Clarity in 2022: Strategy, Execution & Alignment 2:45 pm
    Add to Calendar20211123 2:45 pm20211123 3:15 pmAmerica/Los_AngelesExpert Panel Discussion: Cloud Clarity in 2022: Strategy, Execution & Alignment

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.

    Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.

    .

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.

    Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.

    Click to Expand

    Panel Participants:

    Brian Reed
    Brian Reed

    Brian Reed

    Cybersecurity Strategy at Proofpoint

    Justin Henkel
    Justin Henkel

    Justin Henkel

    Head of CISO Center of Excellence at OneTrust

    Robert Falzon
    Robert Falzon

    Robert Falzon

    Engineering Office of the CTO

    Andrew Vezina
    Andrew Vezina

    Andrew Vezina

    VP and CISO at Equitable Bank

    Collapse This Item

  • CISO RoundTable 3:45 pm
    Add to Calendar20211123 3:45 pm20211123 4:30 pmAmerica/Los_AngelesCISO RoundTable

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    .

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Dr. Chandana Unnithan
    Dr. Chandana Unnithan

    Dr. Chandana Unnithan

    Chief Security and Informatics Officer (CSIO) - Lifeguard Digital Health

    Tamika Bass
    Tamika Bass

    Tamika Bass

    Cybersecurity Technology Director at Gannett Fleming

    Deepak Rout
    Deepak Rout

    Deepak Rout

    Global Executive and Trusted Advisor at Microsoft

    Andrew Vezina
    Andrew Vezina

    Andrew Vezina

    VP and CISO at Equitable Bank

    Sabino C Marquez
    Sabino C Marquez

    Sabino C Marquez

    Chief Information Security Officer & Dir., Privacy Operations - Allocadia Software, Inc.

    Collapse This Item

  • Closing Session + Prize Drawing
Partners Register