Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Conference will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Disrupting Lateral Movement by Securing Active Directory 9:40 am

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

     In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.  Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional Vice President

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 10:05 am
  • Solutions Showcase
  • Expert Panel Discussion: Innovation in Cybersecurity - IoT, AI, ML 10:45 am

    Innovation in Cybersecurity - IoT, AI, ML

    So many quickly evolving technology advances are shaping the way we think about addressing most cybersecurity issues in 2021.  Artificial Intelligence (AI) and Machine Learning (ML) have the potential to automate and aid overworked Security Operations Centers (SOCs), The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization. 

     

    Our Expert Panel will discuss where these technologies are going, how fast they are advancing and what is coming next.

    Click to Expand

    Collapse This Item

  • The Ultimate Vendor Risk Assessment Checklist 11:20 am

    Presented by OneTrust

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches.

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including:

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts
    Click to Expand

    Panel Participants:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Product Manager

    Collapse This Item

  • Office, Home or Hybrid - manage and secure endpoints anywhere, anytime 11:45 am

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Alex Peters
    Alex Peters

    Alex Peters

    Endpoint Security Executive

    Collapse This Item

  • Demo Sessions / Lunch Break
  • Solutions Showcase
  • Keynote: John Felker 12:45 pm

    Session Details Coming Soon

    Click to Expand

    Panel Participants:

    John Felker
    John Felker

    John Felker

    President - Morse Alpha Associates

    Collapse This Item

  • Get Rich Quick with Ransomware: A Lazy Hacker's Perspective for Enterprises 1:35 pm

    Presented by Axis Security

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

     

    Click to Expand

    Panel Participants:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO

    Collapse This Item

  • Solutions Showcase
  • Faking It: Stopping Impersonation Attacks with Cyber AI 2:15 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products

    Collapse This Item

  • Rethinking data protection in the age of ransomware 2:40 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Expert Panel Discussion: Managing the Hybrid Workforce via Cloud & Endpoint 3:05 pm

    Managing the Hybrid Workforce via Cloud & Endpoint

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses.  Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Most importantly, organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • Solutions Showcase
  • Introduction to Risk-Based Vulnerability Management 3:50 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder

    Collapse This Item

  • CISO Panel 4:40 pm

     

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jeffrey Johnson
    Jeffrey Johnson

    Jeffrey Johnson

    CISO, Sr. Director - Siemens Healthcare

    Collapse This Item

  • Conference Final closing Session & Happy Hour Kick-off