
Conference
Miami
Cybersecurity Conference
South Florida is on its way to becoming the newest Silicon Valley — particularly if local leadership has anything to do with it. As more and more tech companies pour into the Sunshine State, it’s vital for cybersecurity leaders to maintain and improve their skills, and stay ahead of the latest trends and threats. Attend the Miami Cybersecurity Conference and stay on top of your organization’s security needs.
You’ll sit alongside thought leaders and luminaries, and hear from experts to gather insights on the latest insights in cybersecurity. These conferences gather cyber professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities.
Take a look at all Data Connectors has to offer here!
Date
Tue. Nov 09 — Wed. Nov 10
-
Featured Speakers
Merritt Baer
Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments
Matt TesauroExpert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments
Ran BarthExpert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments
Henry FrithExpert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments
Merritt BaerCISO RoundTable
Marcia MainCISO RoundTable
Jameeka Green AaronCISO RoundTable
James J.W. GrantCISO RoundTable
James J.W. GrantKeynote: Creating Florida’s First Cybersecurity Program: Lessons Learned So Far
Jamie PortellFeatured Keynote: Pseudonymity: Catching Cyber-Criminals via Crypto-Tracing
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Conference will be open from 11:30AM to 5PM, Tuesday, November 9th and 9AM to 3PM, Wednesday, November 10th.
- DAY ONE
- Welcome / Introductions
-
Malware Threats Q3: An Analysis of 113M Files & the Evasive, Unknown Malware Inside 12:10 pm
From August to September, Votiro’s research team has been aggregating and analyzing proprietary data on the threats that made it through detection-based security solutions like email gateways, AV, and sandboxing. Join Henry Frith, VP of Customer Success, as he overviews the statistics from 113M files analyzed and explains the stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions:Â
- See the latest trends in malware delivery via filesÂ
- Learn common techniques that hackers use to evade detection-based security toolsÂ
- View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year
Panel Participants:
-
The State of Secure Identity 12:40 pm
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.Â
During this session, we’ll provide greater insight into which industries are:Â
– Most highly targeted by credential stuffing attacksÂ
– Most highly targeted by SQL injection attacksÂ
– Leading the way in MFA adoption to improve overall security postureÂ
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Panel Participants:
-
Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 1:05 pm
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Panel Participants:
-
Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments 1:45 pm
89% of CISOs say microservices, containers, and Kubernetes have created application security blind spots. As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities. With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear.
In this panel, our experts will discuss some of the various approaches to address these issues. The discussion will cover challenges faced by teams of all sizes, and processes, tools and methods that are in use to address.
Panel Participants:
-
Risk Mitigation Strategies for TCP/IP Vulnerabilities in OT 2:20 pm
Join this session to dive into the industry’s most comprehensive study of TCP/IP vulnerabilities. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.
Join this discussion to learn about:
- Recently discovered vulnerabilities and how they impact the NicheStack TCP/IP stack
- Organizations and devices with the highest potential to be affected
- How to assess and mitigate risk and protect enterprise networks
Panel Participants:
-
Remote Work – The Wild West of Endpoint Management 2:45 pm
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session, we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.
Panel Participants:
-
Ransomware Resilience 3:30 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption.Â
Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from a ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:55 pm
It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack?Â
If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.
Panel Participants:
-
CISO RoundTable 4:20 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Community Networking Reception
- DAY TWO
- Welcome / Introductions
-
Secure Your Last Line of Defense 9:10 am
Introduce yourself to OneXafe 4400, our immutable storage appliance. A new addition to the new Arcserve. Achieve the 3-2-1-1 best practice, by adding another layer of backup via the retention of immutable data. Create the perfect ransomware tool kit.
IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1…is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.
Panel Participants:
-
Securing the Modern API Ecosystem 9:25 am
APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.
Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:
- API discovery and inventory management
- continuous vulnerability identification and testing
- runtime prevention and detection
Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.
Panel Participants:
-
Should I Buy an EDR, PAM, or DLP? How Do I Know? 9:50 am
The information security space is awash in point technology solutions. As a defender, how does one choose where to spend a limited security budget when faced with this sea of choices? We are debilitated by too many choices and similarity of products in security where even experienced practitioners find it difficult to understand the rapid technological evolution and the trade-offs in play.Â
When clear objectives, goals, and decision-making criteria are not present, people often make buying decisions based on less scientific considerations: what they perceive “everyone else” is buying, unsubstantiated “gut feelings,” pre-existing relationships with vendors or sales individuals, or even who invites them to the best parties or nominates them for the most coveted industry awards.Â
The practice of information security is maturing rapidly. This transition to more scientific approaches to prioritizing security investments is becoming the standard to justify value. Security practitioners must embrace these mature approaches to strategic defense planning and resource allocation. This presentation will discuss ways to make the best choices to maximize defense coverage with appropriate resource allocation.
Panel Participants:
-
Keynote: Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 10:35 am
Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center. Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.
Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age. Protecting citizens, assets, information and infrastructure is the building block for stable government services.
Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors. He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.
Panel Participants:
-
Self-Learning AI: Redefining Enterprise Security 11:30 am
In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data, and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done. How self-learning AI:Â
- Detects, investigates, and responds to threats – even while you are OOTOÂ
- Protects your entire workforce and the digital environment – wherever they are, whatever the dataÂ
- Defends against zero-day and other advanced attacks – without disrupting the organization
Panel Participants:
-
Rise of Secure Access Service Edge (SASE) 11:55 am
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.
In this presentation, you will learn:Â
- The core components of a SASE platform like Bitglass.
- The functionality you need to secure cloud, web, and remote access use cases.
- Architectural considerations you should keep in mind when comparing SASE vendors
Panel Participants:
- Demo Sessions / Lunch Break
-
Demo Session: Neurons for Zero Trust Access 12:25 pm
Ivanti Neurons for Zero Trust Access (nZTA) creates a secure connection from the device to web-based, on-premises and in the cloud applications, which enhances security, productivity, and compliance while dramatically improving administrative and end user experiences. In this demonstration, Raul Amezcua, Ivanti Systems Engineer, will show how to set up applications secured by nZTA and manage the service.
Panel Participants:
-
Expert Panel Discussion: Recover from Ransomware: Coming Back After an Attack 1:00 pm
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 1:40 pm
DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected? (escapes or false negatives), Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.
Panel Participants:
-
IoT: Promise and Peril for the Unsecured 2:15 pm
Managed and Unmanaged IoT devices bring the promise of productivity, efficiency, and collaboration, yet they offer little in the form of needed security and instead are creating new security gaps and risk exposures for organizations.
In this presentation, you will learn:
- What is an IoT device (you might be surprised)
- The impact of IoT on the expanding attack surface
- Tales from the field – Casinos, Smart Cities, Healthcare, Manufacturing
- Key essentials to bringing control and reducing business risk
Panel Participants:
-
Global Growth of Data Privacy Laws 2:40 pm
Today ransomware attacks are rampant and looking to steal personal data of individuals leading to heavy fines due to data breaches. With these data breaches, growing privacy laws come into enforcement and can impact Trust, Goodwill and Reputation of a company. Today’s organizations need to understand why they need to be privacy compliant and have strong data protection workflows in place.
Panel Participants:
-
Featured Keynote: Pseudonymity: Catching Cyber-Criminals via Crypto-Tracing 3:05 pm
While most cyber-crime investigations are along the lines of “follow the money to the servers, then from the servers to the cybercriminals,” pseudonymous crypto-currency makes this a tricky business. Jamie Portell, Special Agent, USPS, OIG, CCU will share for the first time with the Miami Cybersecurity Conference audience details of the take-down of “Wall Street Market.” This Dark Web marketplace was one of the biggest networks for contraband sales of various goods.
This exclusive keynote will answer the question “Are Criminals Anonymous?” While their transactions through crypto-wallets may seem to protect them, savvy investigators who use some of the same tactics your SOC can leverage to counter cybercrime have a lot to share that can benefit cybersecurity leaders across the private sector.
Special Agent Portell will also talk about some of the key Advanced Persistent Threats (APTs) important to organizations, especially those active in South Florida. He’ll bring that together with a discussion of best practices, and government and private sector collaboration that can help combat threat actors of all shapes and sizes.
Panel Participants:
- Conference Final Closing Session
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners