• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Low Hanging Fruit -- How Better AD Visibility Improves Your Defense Against All Types of Attackers (Including Ransomware!) 8:50 am

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Small Businesses Deserve Big Protection 9:10 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 9:50 am

    Presented by TigerGraph

    The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss: 

    -How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment. 

    -Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.

    Click to Expand

    Panel Participants:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Collapse This Item

  • Don’t Phreak Out: Bring VOIP, P2P, and Server-Initiated Access into the Zero Trust Era 10:10 am

    Presented by Axis Security

    It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.

     

    Click to Expand

    Panel Participants:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • Expert Panel Discussion: Beyond Kaseya & SolarWinds 10:30 am

    Beyond Kaseya & SolarWinds: Supply Chain & Third-Party Risk Management for 2021

    Even before the Kaseya MSP attack and the SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. Nation-State actors, or ransomware/cybercrime gangs that are state-tolerated have proven to be a massive attack vector. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create “a perfect storm” threat for modern cyber executives.

    In this panel, our experts will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.

    Click to Expand

    Panel Participants:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Ken Pyle
    Ken Pyle

    Ken Pyle

    Graduate Professor of CyberSecurity at Chestnut Hill College, Exploit Developer, Author, Speaker, Researcher and Partner at CYBIR

    Collapse This Item

  • Faking It: Self-Learning AI: Redefining Enterprise Security 11:20 am

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with an autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Find out how in this session.

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products at Darktrace

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 11:40 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attacks and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Lunch Break
  • Keynote 12:25 pm

    Presidential Protection Detail Notes for the Savvy CISO: Protect, Train and Practice

    Most known for the protection segment of their dual mission, the US Secret Service has been primarily responsible for the investigation of financial crimes since its inception in 1865.  This keynote presentation from Assistant Special Agent in Charge of the Philadelphia Field Office will bridge these two worlds, and build on the highly-acclaimed keynote she presented last year,  “How to protect your enterprise the way the U.S. Secret Service protects the President”.

    ASAIC Cerra will use video examples, including the attempted assassination of President Reagan, to explain how the smooth operation by agents witnessed therein are the product of training, education, communication and practice.  She’ll further expand how CISOs and other cybersecurity leaders can use some of the same techniques to assure their incident response plans are flawlessly executed at a time of crisis.

    The presentation will stress the importance of practicing incident response plans, equating the Secret Service procedures around protective advances. This includes important lessons on staffing, communications, and empowering employees. She’ll talk about tactics used to vet intelligence that can be applied to cyber threat intelligence, responding to adverse events, as well as evolving and maintaining roles of team members.

    Finally, Ms. Cerra will talk about how to make employee training personal for maximal effect. Assuring the right people are trained, and that they gain the cybersecurity-oriented mindset that can put an organization in the best stance for preventing cyber incidents.

    Click to Expand

    Speaker:

    Hazel Cerra
    Hazel Cerra

    Hazel Cerra

    Assistant to the Special Agent in Charge at USSS - DHS

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 1:10 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Rise of Secure Access Service Edge (SASE) 1:30 pm

    Presented by Bitglass

    Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment.

    In this presentation, you will learn: 

    • The core components of a SASE platform like Bitglass.
    • The functionality you need to secure cloud, web, and remote access use cases.
    • Architectural considerations you should keep in mind when comparing SASE vendors
    Click to Expand

    Panel Participants:

    Jonathan Andresen
    Jonathan Andresen

    Jonathan Andresen

    Senior Director at BitGlass

    Collapse This Item

  • Expert Panel Discussion: The Cybersecurity Skills Shortage 2:05 pm

    The Cybersecurity Skills Shortage

    This Expert Panel Discussion will explore the issues around cybersecurity jobs from breaking into the field, to the relative need for certifications, formal education, on-the-job training and more. Our experts will discuss the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.

    Click to Expand

    Panel Participants:

    Naomi Buckwalter
    Naomi Buckwalter

    Naomi Buckwalter

    Director of Information Security & IT at Beam Technologies

    Michael Osterman
    Michael Osterman

    Michael Osterman

    Principle Analyst at Osterman Research

    Doug Britton
    Doug Britton

    Doug Britton

    CEO at Haystack Solutions

    Ian McShane
    Ian McShane

    Ian McShane

    Field CTO at Arctic Wolf

    Collapse This Item

  • Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks 2:30 pm

    Presented by Cybereason

    Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success.

    Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk.

    WHY SHOULD I ATTEND?

    – Learn about the latest ransomware trends

    – Dissect discoveries from Cybereason’s Nocturnus team

    – Become empowered to defend against ransomware

    Click to Expand

    Panel Participants:

    Maggie MacAlpine
    Maggie MacAlpine

    Maggie MacAlpine

    Security Strategist at Cybereason

    Collapse This Item

  • Why You Need a First and Last Line of Defense to Protect Against Ransomware 2:50 pm

    Presented by Cisco

    Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore. Take the Colonial Pipeline attack as an example. What if you could stay safe from ransomware, however it may attempt to get into your network? Join this event to learn how to stop ransomware infections with a first line and last line of defense approach from the cloud edge to the endpoint. Learn how this layered defense approach can help provide ultimate visibility with ultimate responsiveness against ransomware.

    Click to Expand

    Panel Participants:

    Eric Howard
    Eric Howard

    Eric Howard

    Technical Engineering Leader at CISCO

    Collapse This Item

  • Expert Panel Discussion: Protecting Users - Identity, Endpoints and Access Management 3:25 pm

    This Expert Panel Discussion will explore the issues around cybersecurity jobs from breaking into the field, to the relative need for certifications, formal education, on-the-job training and more.  Our experts will discuss the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.

    Click to Expand

    Panel Participants:

    Zakk Karrazzi
    Zakk Karrazzi

    Zakk Karrazzi

    Chief Security Strategist at Attivo

    Michael F. D. Anaya
    Michael F. D. Anaya

    Michael F. D. Anaya

    Head of Attack Surface Analysis at Palo Alto Networks

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Application Security Beyond Effective Bot Mitigation 3:55 pm

    Presented by Shape Security

    The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms. 

    Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.

    Click to Expand

    Panel Participants:

    Partha Sarathy
    Partha Sarathy

    Partha Sarathy

    Global Fraud Strategist at Shape Security

    Collapse This Item

  • Attackers Go Mobile in the Face of a Global Pandemic 4:15 pm

    Presented by Lookout

    The pandemic has changed everything- the way we live, the way we work and the way we protect what’s important to us. The most impactful change to enterprises was the transition to hybrid work and how it shifted the threat landscape for mobile attacks. 

    Everyone relies on their mobile devices to connect to enterprise infrastructure, making both personal and corporate assets susceptible to sophisticated threat actors. In response to heightened security measures, threat actors are getting creative; perpetuating the cat-and-mouse game between attackers and their targets. 

    In this session, we’ll look at how the mobile threat landscape has shifted over the course of the transition toward widespread hybrid work, how some of the most successful attackers have manipulated unsuspecting users into compromising their devices and discuss solutions for mitigating these attacks.

    Click to Expand

    Panel Participants:

    Kristina Balaam
    Kristina Balaam

    Kristina Balaam

    Senior Security Intelligence Researcher at Lookout

    Collapse This Item

  • CISO RoundTable 4:40 pm

     

    Submit your bio for consideration to participate on our CISO RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Naomi Buckwalter
    Naomi Buckwalter

    Naomi Buckwalter

    Director of Information Security & IT at Beam Technologies

    Endre Walls
    Endre Walls

    Endre Walls

    EVP, CISO at Customers Bancorp, Inc. & Customers Bank

    Jeff Hudesman
    Jeff Hudesman

    Jeff Hudesman

    CISO at Pinwheel

    Steven Branigan
    Steven Branigan

    Steven Branigan

    CISO at City of Philadelphia

    Collapse This Item

  • Closing Session + Prize Drawing
Partners