Registration - Step 1 of 2

Wed. Sep 22

Registration for qualified senior cybersecurity professionals. Subject to approval.
Please submit form to proceed to the next step where you can access a VIP discount code for FREE ADMISSION.

SAVE $200 BY COMPLETING YOUR REGISTRATION TODAY*

* Savings applied with VIP code at checkout

Step 1 of 2

  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Conference will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Is Active Directory and Multi-Cloud Leaving you Exposed? 9:10 am

    Presented by Attivo Networks

    Come learn why Active Directory has become a primary target for attackers and how multi-cloud adoption is dramatically expanding your attack surface. We will discuss advanced attacks that are exploiting these weaknesses and outline steps you should take to reduce your risk of being compromised.

    Click to Expand

    Panel Participants:

    Dave Rez
    Dave Rez

    Dave Rez

    Identity Security Specialist at Attivo Networks

    Collapse This Item

  • Securing the Modern API Ecosystem 9:40 am

    Presented by Noname Security

    APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022. Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

    • API discovery and inventory management
    • Continuous vulnerability identification and testing
    • Runtime prevention and detection

    Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    Collapse This Item

  • Risk Mitigation Strategies for TCP/IP Vulnerabilities in OT 10:05 am

    Presented by Forescout

    Join this session to dive into the industry’s most comprehensive study of TCP/IP vulnerabilities. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them. 

    Join this discussion to learn about: 

    • Recently discovered vulnerabilities and how they impact the NicheStack TCP/IP stack 
    • Organizations and devices with the highest potential to be affected 
    • How to assess and mitigate risk and protect enterprise networks
    Click to Expand

    Panel Participants:

    Liran Chen
    Liran Chen

    Liran Chen

    VP, Systems Engineering- Americas at Forescout Technologies

    Collapse This Item

  • Expert Panel Discussion: Protecting Users 10:45 am

    Protecting Users - Identity, Endpoints and Access Management

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?

    Click to Expand

    Panel Participants:

    Karl Mattson
    Karl Mattson

    Karl Mattson

    CISO at Noname Security

    E.J. Hilbert
    E.J. Hilbert

    E.J. Hilbert

    Former FBI Cyber Agent, CISO & Founder at KCECyber

    Collapse This Item

  • Secure Your Last Line of Defense 11:20 am

    Presented by Arcserve

    Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses.

    Click to Expand

    Panel Participants:

    Ahsan Siddiqui
    Ahsan Siddiqui

    Ahsan Siddiqui

    Director of Product Management at Arcserve

    Collapse This Item

  • Remote Work – The Wild West of Endpoint Management 11:45 am

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    Endpoint Security Executive at baramundi

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Demo Session: Zero Trust Security for Everywhere Workplace 12:15 pm

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

    Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO at Ivanti

    Collapse This Item

  • Keynote: Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:45 pm

    If it’s not Illegal, immoral, or unethical – it’s on the table.  John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms.  Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Panel Participants:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates
    Formerly: Asst Director, CISA
    Director, NCCIC; Dept. Director, USCG Cyber Command

    Collapse This Item

  • How I Gained Access to Your Network - A Novice Hacker's Guide to the Attack Surface Galaxy 1:35 pm

    Presented by Axis Security

    Do you lay awake at night staring at the stars and wondering how you can mitigate breaches at your company? In today’s talk, we will explore some ways even a novice hacker can find your organization’s weak spots for a possible attack. Armed with this information, you can learn how to reduce the attack surface to help mitigate such threats!

     

    Click to Expand

    Panel Participants:

    Zoltan Kovacs
    Zoltan Kovacs

    Zoltan Kovacs

    Principal Security Architect at Axis Security

    Collapse This Item

  • Ransomware Resilience 2:15 pm

    Presented by Zerto

    Ransomware attacks continue to bring an elevated threat of data loss and business disruptions. Legacy backup solutions do not meet the recovery needs or SLAs your organization needs. 

    Join this live session and hear how your company can:  

    • Instantly resume operations post-attack 
    • Reduce your data loss from days to seconds/minutes 
    • Test and isolate data to ensure a safe recovery
    Click to Expand

    Panel Participants:

    Ken Smallwood
    Ken Smallwood

    Ken Smallwood

    Solutions Engineer at Zerto

    Collapse This Item

  • Expert Panel Discussion: Ransomware 3:05 pm

    100 Ransomware Attacks Since Colonial Pipeline: What Have We Learned?

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Liran Chen
    Liran Chen

    Liran Chen

    VP, Systems Engineering- Americas at Forescout Technologies

    Chad Haskell
    Chad Haskell

    Chad Haskell

    Senior Solutions Architect at Barracuda Networks, Inc.

    Ahsan Siddiqui
    Ahsan Siddiqui

    Ahsan Siddiqui

    Director of Product Management at Arcserve

    Collapse This Item

  • Automatic Vulnerability Discovery: False Promise for the DevSecOps World? 3:50 pm

    Presented by Fluid Attacks

    DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? How many vulnerabilities are discovered automatically? How many are still undetected (escapes or false negatives)? Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

    Click to Expand

    Panel Participants:

    Daniel Salazar
    Daniel Salazar

    Daniel Salazar

    Lead DevSecOps Engineer at Fluid Attacks

    Collapse This Item

  • What CISOs Get Wrong About Connected Device Product Security (And Why You Should Care) 4:15 pm

    Presented by Finite State

    With billions of connected devices powering up every year, crowded markets have created unique challenges and opportunities for device manufacturers. In this environment, competitive differentiation is key. As attackers move away from application layer attacks, connected devices are now the ultimate low-hanging fruit to offer unauthorized access to critical IT and OT networks. 

    Breaches in product security will have unprecedented impacts on device manufacturers and owners. According to Gartner, cyber-physical attacks resulting in fatal casualties will cost over $50B by 2023. Even the White House is taking note, with a new Cybersecurity EO that will add new requirements for secure software. 

    In this presentation by Finite State, we’ll take a close look at how product security breaches occur, and how the financial impact of these breaches have tangible permanent effects on industry competitors. Learn proactive approaches to product security that are being adopted by some of the world’s largest device manufacturers, as well as how to ensure that your product security strategies generate value for your customers and shareholders.

    Click to Expand

    Panel Participants:

    Jeanette Sherman
    Jeanette Sherman

    Jeanette Sherman

    Sr. Director Product Development at Finite State

    Collapse This Item

  • CISO RoundTable 4:40 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jeffrey Johnson
    Jeffrey Johnson

    Jeffrey Johnson

    CISO and Sr. Director at Siemens Healthcare

    Nemi George
    Nemi George

    Nemi George

    VP, Information Security Officer & IT Service Operations at Pacific Dental Services

    Jason Loomis
    Jason Loomis

    Jason Loomis

    CISO at MINDBODY Inc

    E.J. Hilbert
    E.J. Hilbert

    E.J. Hilbert

    Former FBI Cyber Agent, CISO & Founder at KCECyber

    Collapse This Item

  • Conference Final Closing Session & Happy Hour Kick-off
Register