• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Conference will be open from 11:30AM to 5PM, Tuesday, November 9th and 9AM to 3PM, Wednesday, November 10th.

  • DAY ONE
  • Welcome / Introductions
  • Malware Threats Q3: An Analysis of 113M Files & the Evasive, Unknown Malware Inside 12:10 pm

    Presented by Votiro

    From August to September, Votiro’s research team has been aggregating and analyzing proprietary data on the threats that made it through detection-based security solutions like email gateways, AV, and sandboxing. Join Henry Frith, VP of Customer Success, as he overviews the statistics from 113M files analyzed and explains the stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions: 

    • See the latest trends in malware delivery via files 
    • Learn common techniques that hackers use to evade detection-based security tools 
    • View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year
    Click to Expand

    Panel Participants:

    Henry Frith
    Henry Frith

    Henry Frith

    VP of Customer Success at Votiro

    Collapse This Item

  • The State of Secure Identity 12:40 pm

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 1:05 pm

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Collapse This Item

  • Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments 1:45 pm

    89% of CISOs say microservices, containers, and Kubernetes have created application security blind spots.  As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities.  With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear.

    In this panel, our experts will discuss some of the various approaches to address these issues. The discussion will cover challenges faced by teams of all sizes, and processes, tools and methods that are in use to address.

    Click to Expand

    Panel Participants:

    Merritt Baer
    Merritt Baer

    Merritt Baer

    Principal, AWS OCISO at Amazon Web Services

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Global Director of Security Evangelism at Noname Security

    Ran Barth
    Ran Barth

    Ran Barth

    Director of Security Engineering at Salt Security

    Henry Frith
    Henry Frith

    Henry Frith

    VP of Customer Success at Votiro

    Collapse This Item

  • Risk Mitigation Strategies for TCP/IP Vulnerabilities in OT 2:20 pm

    Presented by Forescout

    Join this session to dive into the industry’s most comprehensive study of TCP/IP vulnerabilities. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.

    Join this discussion to learn about:

    • Recently discovered vulnerabilities and how they impact the NicheStack TCP/IP stack
    • Organizations and devices with the highest potential to be affected
    • How to assess and mitigate risk and protect enterprise networks
    Click to Expand

    Panel Participants:

    Shawn Taylor
    Shawn Taylor

    Shawn Taylor

    Customer Evangelist, Head of Systems Engineering, East Region at Forescout

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 2:45 pm

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session, we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Panel Participants:

    Alfredo Contreras
    Alfredo Contreras

    Alfredo Contreras

    Senior Consultant at baramundi

    Collapse This Item

  • Ransomware Resilience 3:30 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. 

    Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from a ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Allen Patterson
    Allen Patterson

    Allen Patterson

    Systems & Solutions Engineer at Zerto

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:55 pm

    Presented by Cybereason

    It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack? 

    If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.

    Click to Expand

    Panel Participants:

    Kraig Faulkner
    Kraig Faulkner

    Kraig Faulkner

    Director Systems Engineering at Cybereason

    Collapse This Item

  • CISO RoundTable 4:20 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Merritt Baer
    Merritt Baer

    Merritt Baer

    Principal, AWS OCISO at Amazon Web Services

    Marcia Main
    Marcia Main

    Marcia Main

    Former CISO for Rally Health

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Community Networking Reception
  • DAY TWO
  • Welcome / Introductions
  • Secure Your Last Line of Defense 9:10 am

    Presented by Arcserve

    Introduce yourself to OneXafe 4400, our immutable storage appliance. A new addition to the new Arcserve. Achieve the 3-2-1-1 best practice, by adding another layer of backup via the retention of immutable data. Create the perfect ransomware tool kit.

    IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1…is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

    Click to Expand

    Panel Participants:

    John Benjamin
    John Benjamin

    John Benjamin

    Director of Strategic Solutions at Arcserve

    Collapse This Item

  • Securing the Modern API Ecosystem 9:25 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.

    Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Global Director of Security Evangelism at Noname Security

    Collapse This Item

  • Should I Buy an EDR, PAM, or DLP? How Do I Know? 9:50 am

    Presented by Covail

    The information security space is awash in point technology solutions. As a defender, how does one choose where to spend a limited security budget when faced with this sea of choices? We are debilitated by too many choices and similarity of products in security where even experienced practitioners find it difficult to understand the rapid technological evolution and the trade-offs in play. 

    When clear objectives, goals, and decision-making criteria are not present, people often make buying decisions based on less scientific considerations: what they perceive “everyone else” is buying, unsubstantiated “gut feelings,” pre-existing relationships with vendors or sales individuals, or even who invites them to the best parties or nominates them for the most coveted industry awards. 

    The practice of information security is maturing rapidly. This transition to more scientific approaches to prioritizing security investments is becoming the standard to justify value. Security practitioners must embrace these mature approaches to strategic defense planning and resource allocation. This presentation will discuss ways to make the best choices to maximize defense coverage with appropriate resource allocation.

    Click to Expand

    Panel Participants:

    Jeff Schmidt
    Jeff Schmidt

    Jeff Schmidt

    VP, Cybersecurity & Trustworthiness at Covail

    Collapse This Item

  • Keynote: Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 10:35 am

    Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center.  Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.

    Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age.  Protecting citizens, assets, information and infrastructure is the building block for stable government services.

    Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors.  He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.

    Click to Expand

    Panel Participants:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Self-Learning AI: Redefining Enterprise Security 11:30 am

    Presented by Darktrace

    In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing – and the challenge has gone beyond one that is human-scalable. Organizations need to urgently rethink their strategy to ensure their systems, critical data, and people are protected, wherever they are. Today’s Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours – before the damage is done. How self-learning AI: 

    • Detects, investigates, and responds to threats – even while you are OOTO 
    • Protects your entire workforce and the digital environment – wherever they are, whatever the data 
    • Defends against zero-day and other advanced attacks – without disrupting the organization
    Click to Expand

    Panel Participants:

    Andrea Dempsey
    Andrea Dempsey

    Andrea Dempsey

    Cyber Security Executive at Darktrace

    Collapse This Item

  • Rise of Secure Access Service Edge (SASE) 11:55 am

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    In this presentation, you will learn: 

    • The core components of a SASE platform like Bitglass.
    • The functionality you need to secure cloud, web, and remote access use cases.
    • Architectural considerations you should keep in mind when comparing SASE vendors
    Click to Expand

    Panel Participants:

    Gonzalo Urday
    Gonzalo Urday

    Gonzalo Urday

    Sr. Solutions Architect at Bitglass

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Demo Session: Neurons for Zero Trust Access 12:25 pm

    Presented by Ivanti

    Ivanti Neurons for Zero Trust Access (nZTA) creates a secure connection from the device to web-based, on-premises and in the cloud applications, which enhances security, productivity, and compliance while dramatically improving administrative and end user experiences. In this demonstration, Raul Amezcua, Ivanti Systems Engineer, will show how to set up applications secured by nZTA and manage the service.

    Click to Expand

    Panel Participants:

    Raul Amezcua
    Raul Amezcua

    Raul Amezcua

    Systems Engineer at Ivanti

    Collapse This Item

  • Expert Panel Discussion: Recover from Ransomware: Coming Back After an Attack 1:00 pm

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Shawn Taylor
    Shawn Taylor

    Shawn Taylor

    Customer Evangelist, Head of Systems Engineering, East Region at Forescout

    Joelle H. Dvir
    Joelle H. Dvir

    Joelle H. Dvir

    Senior Privacy Counsel at AppLovin

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Collapse This Item

  • Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 1:40 pm

    Presented by Fluid Attacks

    DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected? (escapes or false negatives), Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

    Click to Expand

    Panel Participants:

    Daniel Salazar
    Daniel Salazar

    Daniel Salazar

    Lead DevSecOps Engineer at Fluid Attacks

    Collapse This Item

  • IoT: Promise and Peril for the Unsecured 2:15 pm

    Presented by Cylera

    Managed and Unmanaged IoT devices bring the promise of productivity, efficiency, and collaboration, yet they offer little in the form of needed security and instead are creating new security gaps and risk exposures for organizations.

    In this presentation, you will learn:

    • What is an IoT device (you might be surprised)
    • The impact of IoT on the expanding attack surface
    • Tales from the field – Casinos, Smart Cities, Healthcare, Manufacturing
    • Key essentials to bringing control and reducing business risk

     

    Click to Expand

    Panel Participants:

    Salil Panicker
    Salil Panicker

    Salil Panicker

    Global Director, Technical Enablement at Cylera

    Collapse This Item

  • Global Growth of Data Privacy Laws 2:40 pm

    Presented by Secuvy

    Today ransomware attacks are rampant and looking to steal personal data of individuals leading to heavy fines due to data breaches. With these data breaches, growing privacy laws come into enforcement and can impact Trust, Goodwill and Reputation of a company. Today’s organizations need to understand why they need to be privacy compliant and have strong data protection workflows in place.

    Click to Expand

    Panel Participants:

    Vaibhav Mehrotra
    Vaibhav Mehrotra

    Vaibhav Mehrotra

    CEO & Founder at Secuvy

    Collapse This Item

  • Featured Keynote: Pseudonymity: Catching Cyber-Criminals via Crypto-Tracing 3:05 pm

    While most cyber-crime investigations are along the lines of “follow the money to the servers, then from the servers to the cybercriminals,” pseudonymous crypto-currency makes this a tricky business. Jamie Portell, Special Agent, USPS, OIG, CCU will share for the first time with the Miami Cybersecurity Conference audience details of the take-down of “Wall Street Market.” This Dark Web marketplace was one of the biggest networks for contraband sales of various goods.

    This exclusive keynote will answer the question “Are Criminals Anonymous?” While their transactions through crypto-wallets may seem to protect them, savvy investigators who use some of the same tactics your SOC can leverage to counter cybercrime have a lot to share that can benefit cybersecurity leaders across the private sector.

    Special Agent Portell will also talk about some of the key Advanced Persistent Threats (APTs) important to organizations, especially those active in South Florida. He’ll bring that together with a discussion of best practices, and government and private sector collaboration that can help combat threat actors of all shapes and sizes.

    Click to Expand

    Panel Participants:

    Jamie Portell
    Jamie Portell

    Jamie Portell

    USPS - Computer Crimes Unit at Office of Inspector General (OIG)

    Collapse This Item

  • Conference Final Closing Session
  • Partners

    Platinum Partners

    Votiro

    Gold Partners

    Attivo Networks
    Auth0
    Forescout Technologies
    Ivanti
    Noname Security

    Silver Partners

    Arcserve
    baramundi - Alternate
    Bitglass
    Covail
    Cybereason
    Cylera
    Darktrace
    Fluid Attacks
    Okta - Alternate
    Secuvy
    Zerto

    Bronze Partners

    Salt Security

    Exhibiting Partners

    Cyolo
    Kudelski Security
    NuHarbor Security
    Polarity
    Rubrik
    SECNAP Network Security
    Varonis - Alternate

    Affiliate Partners

    ISACA South Florida
    PMI South Florida
    SIM South Florida

    Collapse This Item

Partners