Event Schedule

Times for this Event are in Pacific Time (PDT/PST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Disrupting Lateral Movement by Securing Active Directory 9:10 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization. 

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks. 

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement. 

    Highlights include: 

    • Live detection for attacks targeting Active Directory 
    • Attack surface reduction at both Active Directory and the endpoint 
    • Continuous visibility to AD changes that introduce new exposures 
    Click to Expand

    Panel Participants:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE

    Collapse This Item

  • The Ultimate Vendor Risk Assessment Checklist 10:10 am

    Presented by Onetrust

    Vendor risk assessments are essential to truly understand the security, privacy, and compliance programs of the third parties you work with. As a result, nearly every organization endures an endless back-and-forth with third parties. Lengthy questionnaires, broken processes, time-consuming reviews;these challenges are common, and as such, there are concrete steps your organization can take to save time and reduce assessment-related headaches. 

    In this webinar, we’ll outline the ultimate checklist for better vendor risk assessments, including: 

    • Actionable takeaways to quickly improve your assessment operations
    • Long-term changes you can make to set yourself up for success
    • Real advice and lessons learned from leading assessment experts
    Click to Expand

    Panel Participants:

    Jason Sabourin
    Jason Sabourin

    Jason Sabourin

    Product Manager

    Collapse This Item

  • Expert Panel Discussion: OT/ICS 10:30 am

    Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    In this panel, our experts will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.

    Click to Expand

    Collapse This Item

  • Office, Home or Hybrid - manage and secure endpoints anywhere, anytime 11:20 am

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Alex Peters
    Alex Peters

    Alex Peters

    Endpoint Security Executive

    Collapse This Item

  • Get Rich Quick with Ransomware: A Lazy Hacker's Perspective for Enterprises 11:55 am

    Presented by Axis Security

    Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.

    Click to Expand

    Panel Participants:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO

    Collapse This Item

  • Lunch Break
  • Lunch Break Sponsor 12:15 pm
  • Keynote Speaker 12:25 pm
  • Faking It: Stopping Impersonation Attacks with Cyber AI 1:05 pm

    Presented by Darktrace

    Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. 

    Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. 

    In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. 

    Click to Expand

    Panel Participants:

    Mariana Pereira
    Mariana Pereira

    Mariana Pereira

    Director of Email Security Products

    Collapse This Item

  • Rethinking data protection in the age of ransomware 1:25 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Expert Panel Discussion: Protecting Users - Identity, Endpoints and Access Management 2:00 pm

    Protecting Users - Identity, Endpoints and Access Management

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up? 

    Click to Expand

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 2:30 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
    • Details the findings on how risk-based is the way to get ahead in vulnerability management
    • Lays out several factors that drive better remediation performance
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder

    Collapse This Item

  • Compliance & Automation in Cybersecurity 2:45 pm

    Managing compliance needs as a continuous, organizational process (as opposed to a reactive response), amid the ever-increasing myriad of industry regulations and legislation has become a full time job for most CISOs.  Automation – including artificial intelligence and machine learning will help, and are perhaps more critical than ever. As CRPA comes into play and brings the US closer to GDPR, there are also a number of touchpoints where the CDO and CISO interplay will be crucial over the coming months. 

    In this session, we will discuss the current issues with regard to compliance, monitoring, and reporting.  Policy decisions and regulations that have kept CISOs busy of late, and what we can expect more of in 2021 will also be addressed.

    Click to Expand

    Collapse This Item

  • Expert Panel Discussion: Regulations, SolarWinds & CMMC 3:25 pm

    Regulations, SolarWinds & CMMC

    NIST and the MITRE ATT&CK framework give us ways to talk about exposure, classify risks and talk to our teams about how to address them.  CMMC is a solid requirement that can serve as a bar for an understanding of cybersecurity preparedness.  With all that said, how ready are most organizations to comply with the new requirements?  Do the regulatory changes go far enough? What else did we learn from the SolarWinds hack that cannot be addressed with regulation?  What changes have organizations put in place to address supply chain and other third-party risk in their environment? 

    Click to Expand

    Collapse This Item

  • Supply Chain & Third Party Risk Management 3:50 pm

    A supply chain encompasses the entire network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.  The ultimate goal of an effective supply chain is lower costs of doing business thus resulting in higher profits and improved customer satisfaction.  The process of bringing in a third party involves identifying, assessing and controlling all the various risks that can develop over the entire lifecycle of such relationships. 

    Click to Expand

    Collapse This Item

  • Operational Technology (OT) & Industrial Control Systems (ICS): Cybersecurity Concerns 4:10 pm

    Since the Stuxnet worm was first discovered back in 2010, attacks related to SCADA systems have been of concern. While manufacturing and utility organizations tend to talk about them more, there are wide implications across the cybersecurity landscape that touch on ICS and OT systems of all kinds. 

    In this session we will talk about why these types of attacks represent a primary concern, and what state-of-the-art looks like in terms of building protections.

    Click to Expand

    Collapse This Item

  • Ciso Panel 4:30 pm

    Panel Participants:

    Jeffrey Johnson
    Jeffrey Johnson

    Jeffrey Johnson

    CISO, Sr. Director - Siemens Healthcare

    Collapse This Item

  • Closing Session + Prize Drawing