• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Conference will be open from 8AM to 6PM.

  • DAY ONE
  • Welcome / Introductions
  • Subject Matter Expert Session - More Details To Come 12:10 pm
  • The State of Secure Identity 12:40 pm

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Panel Participants:

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 1:05 pm

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

     In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.  Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments 1:45 pm

    89% of CISOs say microservices, containers, and Kubernetes have created application security blind spots.  As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities.  With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear.

    In this panel, our experts will discuss some of the various approaches to address these issues. The discussion will cover challenges faced by teams of all sizes, and processes, tools and methods that are in use to address.

    Click to Expand

    Panel Participants:

    Merritt Baer
    Merritt Baer

    Merritt Baer

    Principal Security Architect at Amazon Web Services

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    Collapse This Item

  • Risk Mitigation Strategies for TCP/IP Vulnerabilities in OT 2:20 pm

    Presented by Forescout

    Join this session to dive into the industry’s most comprehensive study of TCP/IP vulnerabilities. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.

    Join this discussion to learn about:

    • Recently discovered vulnerabilities and how they impact the NicheStack TCP/IP stack
    • Organizations and devices with the highest potential to be affected
    • How to assess and mitigate risk and protect enterprise networks
    Click to Expand

    Panel Participants:

    Shawn Taylor
    Shawn Taylor

    Shawn Taylor

    Customer Evangelist, Head of Systems Engineering, East Region at Forescout

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 2:45 pm

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session, we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Coast Operations at baramundi

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 3:30 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 3:55 pm

    Presented by Cybereason

    It’s no secret that Ransomware presents an increasing danger to organizations–there has been a 105% increase in ransomware attacks since the beginning of COVID-19 alone, with 73% of those attacks being effective. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack? 

    If you’re concerned about ransomware, whether it’s beating today’s advancing attacks, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join Cybereason’s Kraig Faulkner as he discusses the challenges faced by today’s ransomware attacks and how to stay on top of these types of threats.

    Click to Expand

    Panel Participants:

    Kraig Faulkner
    Kraig Faulkner

    Kraig Faulkner

    Lead Systems Engineer at Cybereason

    Collapse This Item

  • CISO RoundTable 4:20 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Merritt Baer
    Merritt Baer

    Merritt Baer

    Principal Security Architect at Amazon Web Services

    Marcia Main
    Marcia Main

    Marcia Main

    Former CISO for Rally Health

    Jameeka Green Aaron
    Jameeka Green Aaron

    Jameeka Green Aaron

    CISO at Auth0

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Community Garden Party & Networking Reception
  • DAY TWO
  • Breakfast Briefing
  • Welcome / Introductions
  • Securing the Modern API Ecosystem 9:25 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.

    Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • continuous vulnerability identification and testing
    • runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Matt Tesauro
    Matt Tesauro

    Matt Tesauro

    Director Security Evangelist - Global at Noname Security

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 9:55 am

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: Recover from Ransomware: Coming Back After an Attack 10:35 am

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Shawn Taylor
    Shawn Taylor

    Shawn Taylor

    Customer Evangelist, Head of Systems Engineering, East Region at Forescout

    Joelle H. Dvir
    Joelle H. Dvir

    Joelle H. Dvir

    Attorney at McDonald Hopkins

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 11:05 am
  • Rise of Secure Access Service Edge (SASE) 11:30 am

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    In this presentation, you will learn: 

    • The core components of a SASE platform like Bitglass.
    • The functionality you need to secure cloud, web, and remote access use cases.
    • Architectural considerations you should keep in mind when comparing SASE vendors
    Click to Expand

    Panel Participants:

    Jonathan Andresen
    Jonathan Andresen

    Jonathan Andresen

    Senior Director at BitGlass

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Demo Session: Ivanti 12:00 pm
  • Keynote: Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 12:35 pm

    Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center.  Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.

    Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age.  Protecting citizens, assets, information and infrastructure is the building block for stable government services.

    Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors.  He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.

    Click to Expand

    Panel Participants:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 1:25 pm

    Presented by Fluid Attacks

    DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected? (escapes or false negatives), Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

    Click to Expand

    Panel Participants:

    Daniel Salazar
    Daniel Salazar

    Daniel Salazar

    Lead DevSecOps Engineer at Fluid Attacks

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 1:50 pm

    Session Details Coming Soon 

    Click to Expand

    Collapse This Item

  • Should I Buy an EDR, PAM, or DLP? How Do I Know? 2:15 pm

    Presented by Covail

    The information security space is awash in point technology solutions. As a defender, how does one choose where to spend a limited security budget when faced with this sea of choices? We are debilitated by too many choices and similarity of products in security where even experienced practitioners find it difficult to understand the rapid technological evolution and the trade-offs in play. 

    When clear objectives, goals, and decision-making criteria are not present, people often make buying decisions based on less scientific considerations: what they perceive “everyone else” is buying, unsubstantiated “gut feelings,” pre-existing relationships with vendors or sales individuals, or even who invites them to the best parties or nominates them for the most coveted industry awards. 

    The practice of information security is maturing rapidly. This transition to more scientific approaches to prioritizing security investments is becoming the standard to justify value. Security practitioners must embrace these mature approaches to strategic defense planning and resource allocation. This presentation will discuss ways to make the best choices to maximize defense coverage with appropriate resource allocation.

    Click to Expand

    Panel Participants:

    Jeff Schmidt
    Jeff Schmidt

    Jeff Schmidt

    VP, Cybersecurity & Trustworthiness at Covail

    Collapse This Item

  • Featured Keynote: Pseudonymity: Catching Cyber-Criminals via Crypto-Tracing 2:40 pm

    While most cyber-crime investigations are along the lines of “follow the money to the servers, then from the servers to the cybercriminals,” pseudonymous crypto-currency makes this a tricky business. Jamie Portell, Special Agent, USPS, OIG, CCU will share for the first time with the Miami Cybersecurity Conference audience details of the take-down of “Wall Street Market.” This Dark Web marketplace was one of the biggest networks for contraband sales of various goods.

    This exclusive keynote will answer the question “Are Criminals Anonymous?” While their transactions through crypto-wallets may seem to protect them, savvy investigators who use some of the same tactics your SOC can leverage to counter cybercrime have a lot to share that can benefit cybersecurity leaders across the private sector.

    Special Agent Portell will also talk about some of the key Advanced Persistent Threats (APTs) important to organizations, especially those active in South Florida. He’ll bring that together with a discussion of best practices, and government and private sector collaboration that can help combat threat actors of all shapes and sizes.

    Click to Expand

    Panel Participants:

    Jamie Portell
    Jamie Portell

    Jamie Portell

    Special Agent, Cyber Crimes Unit at U.S. Postal Service - Office of Inspector General

    Collapse This Item

  • Conference Final Closing Session
Register-->