
Virtual Summit
Philadelphia 2021
Virtual Cybersecurity Summit
Life in the Northeast comes with its fair share of chaos, but few things are more chaotic these days than the world of Cybersecurity. Join the Philadelphia Virtual Cybersecurity Summit to get a handle on some of the complex and ever-changing requirements and trends in data security. After all, it’s not just a matter of protecting information and infrastructure, it’s become a matter of the health and safety of our population.
Leaders in IT are required to stay on the leading edge for their organizations to stay protected. This summit features expert discussions and panels, plus a vital keynote session, that will ensure that you get the information you need. Collect CPE credits for your time, and network with your peers in a live, interactive environment.
Get a Sneak Peak of the Keynote here.
Date
Thu. Sep 16
-
Featured Speakers
Hazel Cerra
Keynote
Naomi BuckwalterExpert Panel Discussion: The Cybersecurity Skills Shortage
Michael OstermanExpert Panel Discussion: The Cybersecurity Skills Shortage
Doug BrittonExpert Panel Discussion: The Cybersecurity Skills Shortage
Ian McShaneExpert Panel Discussion: The Cybersecurity Skills Shortage
Naomi BuckwalterCISO RoundTable
Endre WallsCISO RoundTable
Jeff HudesmanCISO RoundTable
Steven BraniganCISO RoundTable
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Summit will be open from 8AM to 6PM.
- Welcome / Introductions
-
Low Hanging Fruit -- How Better AD Visibility Improves Your Defense Against All Types of Attackers (Including Ransomware!) 8:50 am
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Panel Participants:
-
Small Businesses Deserve Big Protection 9:10 am
Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.
Panel Participants:
-
Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 9:50 am
The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss:
-How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment.
-Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.
Panel Participants:
-
Don’t Phreak Out: Bring VOIP, P2P, and Server-Initiated Access into the Zero Trust Era 10:10 am
It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.
Panel Participants:
-
Expert Panel Discussion: Beyond Kaseya & SolarWinds 10:30 am
Beyond Kaseya & SolarWinds: Supply Chain & Third-Party Risk Management for 2021
Even before the Kaseya MSP attack and the SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. Nation-State actors, or ransomware/cybercrime gangs that are state-tolerated have proven to be a massive attack vector. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create “a perfect storm” threat for modern cyber executives.
In this panel, our experts will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.
Panel Participants:
-
Faking It: Self-Learning AI: Redefining Enterprise Security 11:20 am
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with an autonomous response.
In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.
Find out how in this session.
Panel Participants:
-
Rethinking Data Protection in the Age of Ransomware 11:40 am
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attacks and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
- Lunch Break
-
Keynote 12:25 pm
Presidential Protection Detail Notes for the Savvy CISO: Protect, Train and Practice
Most known for the protection segment of their dual mission, the US Secret Service has been primarily responsible for the investigation of financial crimes since its inception in 1865. This keynote presentation from Assistant Special Agent in Charge of the Philadelphia Field Office will bridge these two worlds, and build on the highly-acclaimed keynote she presented last year, “How to protect your enterprise the way the U.S. Secret Service protects the President”.
ASAIC Cerra will use video examples, including the attempted assassination of President Reagan, to explain how the smooth operation by agents witnessed therein are the product of training, education, communication and practice. She’ll further expand how CISOs and other cybersecurity leaders can use some of the same techniques to assure their incident response plans are flawlessly executed at a time of crisis.
The presentation will stress the importance of practicing incident response plans, equating the Secret Service procedures around protective advances. This includes important lessons on staffing, communications, and empowering employees. She’ll talk about tactics used to vet intelligence that can be applied to cyber threat intelligence, responding to adverse events, as well as evolving and maintaining roles of team members.
Finally, Ms. Cerra will talk about how to make employee training personal for maximal effect. Assuring the right people are trained, and that they gain the cybersecurity-oriented mindset that can put an organization in the best stance for preventing cyber incidents.
Speaker:
-
Moving Beyond Password to Delight & Secure Users 1:10 pm
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
-
Rise of Secure Access Service Edge (SASE) 1:30 pm
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.
In this presentation, you will learn:
- The core components of a SASE platform like Bitglass.
- The functionality you need to secure cloud, web, and remote access use cases.
- Architectural considerations you should keep in mind when comparing SASE vendors
Panel Participants:
-
Expert Panel Discussion: The Cybersecurity Skills Shortage 2:05 pm
The Cybersecurity Skills Shortage
This Expert Panel Discussion will explore the issues around cybersecurity jobs from breaking into the field, to the relative need for certifications, formal education, on-the-job training and more. Our experts will discuss the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.
Panel Participants:
-
Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 2:30 pm
Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.
Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.
WHY SHOULD I ATTEND?
– Learn about the latest ransomware trends
– Dissect discoveries from Cybereason’s Nocturnus team
– Become empowered to defend against ransomware
Panel Participants:
-
Why You Need a First and Last Line of Defense to Protect Against Ransomware 2:50 pm
Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore. Take the Colonial Pipeline attack as an example. What if you could stay safe from ransomware, however it may attempt to get into your network? Join this event to learn how to stop ransomware infections with a first line and last line of defense approach from the cloud edge to the endpoint. Learn how this layered defense approach can help provide ultimate visibility with ultimate responsiveness against ransomware.
Panel Participants:
-
Expert Panel Discussion: Protecting Users - Identity, Endpoints and Access Management 3:25 pm
This Expert Panel Discussion will explore the issues around cybersecurity jobs from breaking into the field, to the relative need for certifications, formal education, on-the-job training and more. Our experts will discuss the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.
Panel Participants:
-
Application Security Beyond Effective Bot Mitigation 3:55 pm
The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms.
Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.
Panel Participants:
-
Attackers Go Mobile in the Face of a Global Pandemic 4:15 pm
The pandemic has changed everything- the way we live, the way we work and the way we protect what’s important to us. The most impactful change to enterprises was the transition to hybrid work and how it shifted the threat landscape for mobile attacks.
Everyone relies on their mobile devices to connect to enterprise infrastructure, making both personal and corporate assets susceptible to sophisticated threat actors. In response to heightened security measures, threat actors are getting creative; perpetuating the cat-and-mouse game between attackers and their targets.
In this session, we’ll look at how the mobile threat landscape has shifted over the course of the transition toward widespread hybrid work, how some of the most successful attackers have manipulated unsuspecting users into compromising their devices and discuss solutions for mitigating these attacks.
Panel Participants:
-
CISO RoundTable 4:40 pm
Submit your bio for consideration to participate on our CISO RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Closing Session + Prize Drawing
-
Partners
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners