Registration

Tue. Nov 23

Registration for qualified senior cybersecurity professionals. Subject to approval.

Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Managing the Insider Threat 8:50 am

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses.  Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Most importantly, organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • The Ultimate Vendor Risk Assessment Checklist 9:10 am

    Presented by OneTrust

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches.

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including:

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts
    Click to Expand

    Panel Participants:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Product Manager at OneTrust

    Collapse This Item

  • Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 9:50 am

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    In this session we will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.

    Click to Expand

    Collapse This Item

  • 10 Biggest and Boldest Insider Threats Incidents of 2021 10:10 am

    Presented by Proofpoint

    Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams. Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat. Many organisations are learning that the hard way.

    Join us for this presentation with Brian Reed to explore some of the biggest insider attacks of 2021 – and what you can do to avoid similar threats. You’ll learn:

    • The unexpected ways insiders can steal money, disrupt business and tarnish your brand
    • How third-party vendors can pose as big of an insider threat as your employees
    • Tricks that outside attackers use to gain insider access 
    • Tips for managing insider threats and risks in your organization
    Click to Expand

    Panel Participants:

    Brian Reed
    Brian Reed

    Brian Reed

    Cybersecurity Strategy at Proofpoint

    Collapse This Item

  • Expert Panel Discussion: Planning Your 2022 Cybersecurity Budget 10:30 am

    As 2021 draws to a close, CISOs and other cybersecurity leaders turn their attention to budgeting and planning for 2022. Resources, new technologies, and staffing all take a part—getting the balance right can be tricky.

    Cybersecurity headlines have made asking for more budget somewhat easier; however, managing line items and spending wisely will always be the core focus.

    In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.

     

    Click to Expand

    Collapse This Item

  • Securing the Modern API Ecosystem 11:20 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Collapse This Item

  • Ransomware Resilience 11:40 am

    Presented by Zerto

    Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs. 

    Join this live session and hear how your company can: 

    • Instantly resume operations post-attack 
    • Reduce your data loss from days to seconds/minutes 
    • Test and isolate data to ensure a safe recovery
    Click to Expand

    Panel Participants:

    Ken Smallwood
    Ken Smallwood

    Ken Smallwood

    Solutions Engineer at Zerto

    Collapse This Item

  • Lunch Break
  • Keynote 12:25 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • To Build or Not to Build? Key Considerations and the Advantages of a Pre-Built Identity Solution 1:10 pm

    Presented by Okta

    Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. 

    Development teams have increasingly turned to pre-built tools to offload some of the burden of application development. Identity and access management presents developers with a broad range of challenges that a trusted identity layer can help offload easily. 

    Join us to discover how Okta’s pre-built identity solutions: 

    • Accelerates time to market 
    • Lowers the total cost of ownership (TCO) of Application Development 
    • Focuses resources on Core Application Functionality 
    • Reduces the Risk of a Security and Compliance Breach 
    • Helps ensure a better user experience
    Click to Expand

    Panel Participants:

    Dimitri Melchior
    Dimitri Melchior

    Dimitri Melchior

    Sr. Solutions Engineer at Okta

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 1:30 pm

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Panel Participants:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 2:05 pm

    Presented by Veeam

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Panel Participants:

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy at Veeam Software

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy at Veeam Software

    Collapse This Item

  • Attackers Go Mobile in the Face of a Global Pandemic 2:25 pm

    Presented by Lookout

    The pandemic has changed everything- the way we live, the way we work and the way we protect what’s important to us. The most impactful change to enterprises was the transition to hybrid work and how it shifted the threat landscape for mobile attacks. 

    Everyone relies on their mobile devices to connect to enterprise infrastructure, making both personal and corporate assets susceptible to sophisticated threat actors. In response to heightened security measures, threat actors are getting creative; perpetuating the cat-and-mouse game between attackers and their targets. 

    In this session, we’ll look at how the mobile threat landscape has shifted over the course of the transition toward widespread hybrid work, how some of the most successful attackers have manipulated unsuspecting users into compromising their devices and discuss solutions for mitigating these attacks.

    Click to Expand

    Panel Participants:

    Kristina Balaam
    Kristina Balaam

    Kristina Balaam

    Senior Security Intelligence Researcher at Lookout

    Collapse This Item

  • Expert Panel Discussion: Cloud Clarity in 2022: Strategy, Execution & Alignment 2:45 pm

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this panel, experts will discuss creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.

    Requirements for the security OF the cloud, and the security IN the cloud, have accelerated, particularly in the past 18 months.

    Click to Expand

    Panel Participants:

    Brian Reed
    Brian Reed

    Brian Reed

    Cybersecurity Strategy at Proofpoint

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 3:25 pm
  • CISO RoundTable 4:30 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Collapse This Item

  • Closing Session + Prize Drawing
Register-->