• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST)

The Conference will be open from 12PM to 6PM Wednesday, October 6th and 8AM to 4PM Thursday, October 7th.

  • DAY ONE
  • Welcome / Introductions
  • Expert Panel Discussion: Ransomware Prevention/Preparation, or the Closest You Can Come to It (Pre-Attack Practices) 12:10 pm

    Unless you’ve been under a rock, you’ve seen some big ransomware headlines. Moreover, ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. In this panel, our experts will talk about best practices, tactics and tricks for prevention and preparation. [NOTE: Post-Attack concepts will be discussed separately in a panel this afternoon]  Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    Click to Expand

    Panel Participants:

    Brian Smith
    Brian Smith

    Brian Smith

    CTO, Co-founder at Spyderbat

    Nick Houck
    Nick Houck

    Nick Houck

    Senior Security Strategist at Attivo

    Jason Jones
    Jason Jones

    Jason Jones

    Lead Solutions Engineer at ExtraHop

    Anand Singh
    Anand Singh

    Anand Singh

    Global CISO at Alkami

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 12:45 pm

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

    In this session, Nick Houck will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. 

    Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Nick Houck
    Nick Houck

    Nick Houck

    Senior Security Strategist at Attivo

    Collapse This Item

  • The State of Secure Identity 2021 1:10 pm

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Expert Panel Discussion: Empowering Users to Be the Best Human Firewall in Your Organization 1:45 pm

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.  

    Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

    Click to Expand

    Panel Participants:

    Dan Tyrrell
    Dan Tyrrell

    Dan Tyrrell

    Manager, Professional Services at Cobalt Labs Inc

    William Smarr
    William Smarr

    William Smarr

    US Secret Service Special Agent in Charge - Dallas Field Office

    Syam Maddimsetty
    Syam Maddimsetty

    Syam Maddimsetty

    Director, IT Security & Compliance at Overhead Door Corporation

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 2:20 pm

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Panel Participants:

    Trevor Eastin
    Trevor Eastin

    Trevor Eastin

    Field Lead Engineer at Cybereason

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 2:45 pm

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Coast Operations at baramundi

    Collapse This Item

  • Understanding the Fundamental Transition from On-Premises to Private Access Cloud 3:30 pm

    Presented by Menlo Security

    Discussing the transition to the cloud from traditional premise environments. How the sudden shift in workforce requirements have increased the need for security and remote access, and how the distributed model has evolved security architectures.

    Click to Expand

    Panel Participants:

    Brad Pinkston
    Brad Pinkston

    Brad Pinkston

    Director, OEM and Alliances Solution Architecture at Menlo Security

    Collapse This Item

  • Tips for Making the Zero Trust Enterprise a Reality 3:55 pm

    Presented by Bitglass

    It has never been more important to understand how zero-trust network access can better secure your remote and hybrid working environment. People are the new enterprise perimeter and protecting them and the data they access is mission critical.

    Click to Expand

    Panel Participants:

    Alfredo Federico
    Alfredo Federico

    Alfredo Federico

    Business Development at Bitglass

    Collapse This Item

  • CISO RoundTable 4:20 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Patrick Benoit
    Patrick Benoit

    Patrick Benoit

    Global Head of Cyber GRC / BISO at CBRE

    Anand Singh
    Anand Singh

    Anand Singh

    Global CISO at Alkami

    Dave Belanger
    Dave Belanger

    Dave Belanger

    CISO at Maxor National Pharmacy Services

    Chuck Springer
    Chuck Springer

    Chuck Springer

    CISO at First American Payment System

    Cecil Pineda
    Cecil Pineda

    Cecil Pineda

    Cybersecurity and Data Privacy at Critical Start

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Community Garden Party & Networking Reception
  • DAY TWO
  • Breakfast Briefing
  • Welcome / Introductions
  • CISO Author Interview - Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future 9:30 am

    The Greater DFW Area is blessed with a great many learned CISOs, and we’re pleased to have George Finney, CISO from Southern Methodist University (SMU) as part of the agenda for the Dallas Cybersecurity Summit.

    Today, we’ll dig into his latest book, “Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future.”  Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. This book examines security challenges using lessons learned from psychology, neuroscience, history, and economics.

    Spanning those habits – literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception – are stories that assert that cybersecurity is not a technology problem; it’s a people problem.

    In this “fireside chat” style Q&A, George will be interviewed by our moderator Michael.  He will share some of the lessons from the book, experiences on learnings from his 20+ year CISO career and talk about his inspirations.

    Click to Expand

    Panel Participants:

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Collapse This Item

  • Securing the Modern API Ecosystem 9:50 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Collapse This Item

  • Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments 10:35 am

    89% of CISOs say microservices API, containers, and Kubernetes have created application security blind spots. As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities. With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear. 

    In this panel, our experts will discuss some of the various approaches to address these issues. The discussion will cover challenges faced by teams of all sizes, and processes, tools and methods that are in use to address. 

     

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Giora Engel
    Giora Engel

    Giora Engel

    CEO & Co-Founder at Neosec

    Gavin Grounds
    Gavin Grounds

    Gavin Grounds

    Exec. Director Cyber Security Strategy and Information Risk Management at Verizon

    Collapse This Item

  • Self Learning AI: Redefining Enterprise Security 11:05 am

    Presented by Darktrace

    In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done 

    In this session, learn how self-learning AI: 

    • Detects, investigates and responds to threats – even while you are OOTO 
    • Protects your entire workforce and digital environment – wherever they are, whatever the data 
    • Defends against zero-days and other advanced attacks – without disrupting the organization
    Click to Expand

    Panel Participants:

    Colby Franklin
    Colby Franklin

    Colby Franklin

    Cyber Security Manager at Darktrace

    Collapse This Item

  • Remote Workforce: Authorization Intercept, Recording & Tracking 11:30 am

    Presented by CarbonHelix

    Learn what benefits organizations gain from the latest security controls around remote access including session recording, authorization intercept on demand and modeling of remote user behavior. How ZTNA and SASE are making this possible without major investments in products, manpower, infrastructure or change and why the remote worker also enjoys faster access performance to their applications and services.

    Click to Expand

    Panel Participants:

    Mark Precious
    Mark Precious

    Mark Precious

    CTO at CarbonHelix

    David DeLozier
    David DeLozier

    David DeLozier

    Solutions Design at CarbonHelix

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Demo Session: Neurons for Zero Trust Access 12:20 pm

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

    Join Ivanti’s Global Systems Engineer, Khal Taha, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Collapse This Item

  • Keynote: Ransomware Investigations and Actionable Intelligence from DarkSide and REvil 12:45 pm

    Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to be a lucrative modus operandi for criminal groups and state-actors looking to launder funds and evade sanctions. Cryptocurrency intelligence products, such as CipherTrace Inspector, can remove the financial incentives from ransomware perpetrators without risking brute force attacks. In May 2021, US-based Colonial Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from DarkSide severely hindered the refinery’s operations. In March 2020, a DOJ Verified complaint illustrated how North Korea launched sophisticated attacks on cryptocurrency exchanges to finance their WMD program by laundering hundreds of millions of dollars’ worth of the stolen cryptocurrency through several banks and cryptocurrency exchanges. An uptick in Iranian and DPRK state-sponsored ransomware also led to OFAC issuing an advisory in October 2020 to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. 

    Learn how investigators were able to utilize blockchain analysis tools to follow the illicit flow of funds and see exactly how bad actors moved stolen crypto to virtual asset service providers and, eventually, banks.   

     Objectives: 

    • Examine how blockchain analytics enabled investigators to follow the flow of funds in recent ransomware cases like DarkSide (Colonial Pipeline)
    • Explore the role banks play in converting crypto to fiat  
    • Understand how ransomware is used to evade sanctions  
    • Look at the risks financial institutions face by processing ransomware payments for customers  
    • Learn which methods North Korean hackers have used to steal, obfuscate, and launder their crypto  
    Click to Expand

    Panel Participants:

    Pamela Clegg
    Pamela Clegg

    Pamela Clegg

    VP of Financial Investigations at CipherTrace

    Collapse This Item

  • The Automation Journey: Where's the Wall 1:40 pm

    Presented by Swimlane

    Gartner says 69% of Boards of Directors accelerated their digital business initiatives following COVID-19 disruption. This has made organizations shorten the time to integrate technologies, reduce the effort it takes to update them, and reduce development costs. We will discuss the automation journey and where we are seeing where most organizations hit the ‘automation’ wall.

    Click to Expand

    Panel Participants:

    Bryon Page
    Bryon Page

    Bryon Page

    Director, Solutions Architecture at Swimlane

    Collapse This Item

  • Automatic Vulnerability Discovery: False Promise for the DevSecOps world? 2:20 pm

    Presented by Fluid Attacks

    DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected (escapes or false negatives)? Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

    Click to Expand

    Panel Participants:

    Daniel Salazar
    Daniel Salazar

    Daniel Salazar

    Lead DevSecOps Engineer at Fluid Attacks

    Collapse This Item

  • The Art & Science of Cloud Security 2:45 pm

    Presented by Lookout

    Come learn about the beauty of the cloud while applying the right “science” to securing your multiple cloud services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy work of art.

    Click to Expand

    Panel Participants:

    Hank Schless
    Hank Schless

    Hank Schless

    Senior Manager, Security Solutions at Lookout

    Collapse This Item

  • Guest Keynote: Grounds’ Rules for Cyber Risk Quantification (CRQ) 3:10 pm

    A Realist’s Guide on Why CRQ is a Prerequisite and How to Do It Right.

    In almost all areas of business and corporate management, we speak in terms of facts, figures and real fiscal currencies. So why do cybersecurity leaders opt for gradients (low, medium, high, critical) and colors (Green, Amber, Red… “traffic light” chart)?

    This keynote will analyze the key reasons why qualitative risk methods and relative ratings are woefully inadequate and do not meet basic business needs; and delve into their weakness as it pertains to the inputs and conclusions.  

    Adding business context and factoring in criticality, potential revenue impact, and likelihood to occur are a start; however, vulnerabilities rated (relatively) based on their technical characteristics and overall exploitability will not build an accurate risk picture. Gavin will then expand on specific techniques on how to quickly adopt a meaningful quantitative risk management (QRM) methodology and framework that is not exclusively built around minimizing Annualized Loss Expectancy (ALE).

    Specific working examples will highlight why ALE-based risk quantification is only a part of the equation. Further, the talk will expand on how using QRM can go beyond risk reduction to deliver measurable and quantifiable analysis to support business enablement and rationalize cybersecurity controls and investment levels. 

    In essence, his session will help business leaders to understand how to factor cyber risk and technology services risk into business risk in a meaningful, quantifiable fashion.

    Click to Expand

    Panel Participants:

    Gavin Grounds
    Gavin Grounds

    Gavin Grounds

    Exec. Director Cyber Security Strategy and Information Risk Management at Verizon

    Collapse This Item

  • Conference Final Closing Session