Registration

Wed. Apr 13 — Thu. Apr 14

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $200.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Conference will be open from 9:00 AM to 5:30 PM both days.

  • DAY ONE
  • Welcome / Introductions
  • Special Welcome - Resident Agent in Charge, USSS Austin Field Office 10:20 am

    In this short introduction, Resident Agent in Charge Steven Hampton will give an interview of how the US Secret Service works cybercrime investigations. He will discuss some of the trends, why cybersecurity leaders presented with a situation should bring in the USSS early, and give an understanding of some of the breadth and depth of help the Bureau can provide and the global reach it offers.  

    His talk will include some of the regional trends his office has seen, recent cases and investigations, and things that local cyber executives should know that could help them in cyber threat situations. 

    Click to Expand

    Speaker :

    Steven Hampton
    Steven Hampton

    Steven Hampton

    Resident Agent in Charge (RAIC) at Department of Homeland Security

    Collapse This Item

  • Cybercrime Trends 10:30 am

    Speaker:

    Scott Riddick
    Scott Riddick

    Scott Riddick

    Special Agent at US Secret Service

    Collapse This Item

  • Put Your Business Ahead of Disruption: MDR in Action 11:05 am

    Presented by eSentire

    As new threats are constantly born, how proactive is your company about cybersecurity? Put your business ahead of disruption and build a more responsive cybersecurity operation to protect your business from cybercrime. Brent Feller, Director of Solutions Architects at eSentire will share how eSentire’s Managed Detection and Response solution stops threats before they become a business disrupting event. He will cover real, recent attacks and how we stopped them in their tracks.

    Click to Expand

    Speaker:

    Brent Feller
    Brent Feller

    Brent Feller

    Director of Solutions Architects at eSentire

    Collapse This Item

  • Making Music From Cloud Security Noise 11:30 am

    Presented by Orca Security

    The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.

    Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust. 

    Click to Expand

    Speaker:

    Doug Hudson
    Doug Hudson

    Doug Hudson

    VP Strategic Alliances & Joint Ventures at Orca Security

    Collapse This Item

  • Cloud Security Challenges Created by the Lightspeed Transition of 2020/21: What Happened to Zero Trust? 11:55 am

    As people, applications and data have shifted over the past two years, so has the focus for networking security. In the new hybrid work reality, where fully remote staff may never see the inside of an office (much less on-site network and firewall), cyber leaders have adapted with cloud and SaaS applications.

    However, the shift was so fast that all too often user privileges were left artificially high. A liberal view on permissions and access management expedited set-up, but left gaps for lateral movement – be they from a leaked credential or a rogue insider. This extends back into the engine room, as good security in a cloud-first environment needs to be baked in at the DevSecOps level.

    Experts on this panel will talk about the requirements for understanding the enterprise risk introduced in these scenarios. They’ll debate the effectiveness of browser isolation, how to apply a more zero-trust-centric view, visibility/addressing “Shadow IT” and how to get a better balance between friction and security.

    Click to Expand

    Panel Participants:

    Doug Hudson
    Doug Hudson

    Doug Hudson

    VP Strategic Alliances & Joint Ventures at Orca Security

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Brad Pinkston
    Brad Pinkston

    Brad Pinkston

    Director, Alliances Solution Architecture at Menlo Security

    Drew Hunt
    Drew Hunt

    Drew Hunt

    VP, Strategy at Net Abstraction

    Collapse This Item

  • Lunch Break
  • A Realistic View of the State of Secrets Sprawl in Corporate Codebases 1:25 pm

    Presented by GitGuardian

    Secrets like API keys are sprawling through the internet at an alarming rate. A research project released in March uncovered 6 million leaked secrets publicly. This presentation reviews that research and uses recent breaches to show how adversaries discover and exploit secrets to breach organizations.

    Click to Expand

    Panel Participants:

    Daniel Walsh
    Daniel Walsh

    Daniel Walsh

    Head of Code Security Advisory at GitGuardian

    Collapse This Item

  • Beyond SOAR: Defining the Enabling Processes & Technology for a Modern SOC 1:45 pm

    Analysts started talking about Security Orchestration, Automation and Response some time ago, and over that period so much as changed.  Gartner now has a Market Guide on the topic, and there are solutions that fit into each SOAR element: Security incident response platforms (SIRPs), Security orchestration and automation (SOA), and Threat intelligence platforms (TIPs). But what are the processes that need to be in place first?  What other elements are needed to make the modern Security Operations Center (SOC) hum in 2022?

    Our expert panelists will talk about different approaches, tuning existing systems, and where new technology fits in when needed.  They will share their points of view and take live questions from the audience to explain more.

     

    Click to Expand

    Panel Participants:

    Jamar Beall
    Jamar Beall

    Jamar Beall

    Director, Solutions Architecture at Deepwatch

    Brian Smith
    Brian Smith

    Brian Smith

    CTO, Co-founder at Spyderbat

    Jim Johnson
    Jim Johnson

    Jim Johnson

    Director, Pre-Sales Engineering at Arctic Wolf Networks

    Collapse This Item

  • Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 2:50 pm

    Presented by TigerGraph

    The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss: 

    -How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment. 

    -Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.

    Click to Expand

    Speaker:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Collapse This Item

  • Fast and Furious Attacks: Using AI to Surgically Respond 3:15 pm

    Presented by Darktrace

    Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Senior Cyber Security Executive, Blake Goins, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.  

    Topic for this session– Autonomous Response 

    • Explore today’s threats and challenges 
    • How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough
    Click to Expand

    Speaker:

    Blake Goins
    Blake Goins

    Blake Goins

    Senior Cyber Security Executive at Darktrace

    Collapse This Item

  • Cyber Executive RoundTable 4:00 pm

    Submit your bio for consideration to participate on our Austin Cybersecurity Conference Cyber Executive RoundTable

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Gavin Grounds
    Gavin Grounds

    Gavin Grounds

    Exec. Director Cyber Security Strategy and Information Risk Management at Verizon

    Ted Layne
    Ted Layne

    Ted Layne

    Chief Security Officer at Fairway Independent Mortgage Corporation

    John Frushour
    John Frushour

    John Frushour

    Vice President & Deputy Chief Information Security Officer at New York-Presbyterian Hospital, Department of Information Technology

    John Sapp
    John Sapp

    John Sapp

    VP, Information Security & CISO at Texas Mutual Insurance Company

    Ashley Rose
    Ashley Rose

    Ashley Rose

    CEO and Co-founder at Living Security

    Collapse This Item

  • Day One Closing Session 4:50 pm
  • Networking Reception and Happy Hour 5:00 pm
  • DAY TWO
  • Welcome / Introductions
  • Special Welcome - Robert Russell, Acting Regional Director, Region 6 (AR, OK, TX, LA, NM), CISA 9:25 am

    The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its “Shields Up” warning in mid-February. Working with other agencies, important information is updated regularly at cisa.gov/shields-up.  Consolidating that information and a host of the intelligence that CISA has made available, Mr. Robert Russell, Acting Director for CISA Region 6 will go over the nature of the current threats posed by these and other pressing headlines.

    Click to Expand

    Panel Participants:

    Robert Russell
    Robert Russell

    Robert Russell

    Acting Regional Director, Region 6 (AR, OK, TX, LA, NM) at Department of Homeland Security

    Collapse This Item

  • CIS Controls in the Real World 9:40 am

    Presented by Sentinel IPS

    The Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense is a publication of best practice guidelines for computer security. The project was initiated early in 2008 in response to extreme data losses experienced by organizations in the US defense industrial base.

    In this presentation, Sentinel CEO and long-time cybersecurity industry veteran Ted Grenloh will talk through a deep-dive on the tangible effect that best practices like the CIS Controls have on network security.  

    Managed Network Detection and Response (MNDR) and Active Threat Intelligence provide crucial components for a modern Defense-in-Depth strategy, but it’s the years of data and experience that make it easy to see which organizations are on top of their security game … and which could really benefit from the guidance CIS Controls provide.

    The discussion will walk through several of the CIS Controls, review the Version 8 (V8) updates, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep networks safe and secure.

    Click to Expand

    Speaker:

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Collapse This Item

  • It’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365 10:05 am

    Presented by Tenfold

    In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services. 

    Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.

    Click to Expand

    Speaker:

    Patryk Stachowiak
    Patryk Stachowiak

    Patryk Stachowiak

    Chief Product Evangelist at tenfold Security

    Collapse This Item

  • Ransomware Prevention (Or the Closest You Can Come to It): Pre-Attack Practices 10:30 am

    So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits.  Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.

    Click to Expand

    Panel Participants:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Brian Freedman
    Brian Freedman

    Brian Freedman

    Director, Global Engineering at QOMPLX

    Jay Paz
    Jay Paz

    Jay Paz

    Senior Director of Delivery at Cobalt Labs

    Kevin O’Connor
    Kevin O’Connor

    Kevin O’Connor

    Director of Threat Research at Adlumin

    Collapse This Item

  • Redefining the MSSP Relationship: Partner With A Co-Fiduciary 11:20 am

    Presented by SEI Sphere

     A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.

    Click to Expand

    Panel Participants:

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Collapse This Item

  • The Reason Why Ransomware is Really HEATing Up 11:45 am

    Presented by Menlo Security

    When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

    Click to Expand

    Speaker:

    Brad Pinkston
    Brad Pinkston

    Brad Pinkston

    Director, Alliances Solution Architecture at Menlo Security

    Collapse This Item

  • Lunch Break
  • Demo Session- Automated Secret Detection 12:25 pm

    Presented by GitGuardian

    Speaker:

    Daniel Walsh
    Daniel Walsh

    Daniel Walsh

    Head of Code Security Advisory at GitGuardian

    Collapse This Item

  • Keynote Fireside Chat: John Kindervag 12:50 pm

    After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.

    John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity. 

    In this Keynote Fireside Chat, John will talk about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape.

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Leading Across the Aisle: Achieving DevSecOps Through and Across Teams 2:00 pm

    Presented by ShiftLeft

    As technology advances to achieve new levels of efficiency, Security and Engineering leaders alike are taking a fresh look at the processes they have in place. “Shifting security left” means making fixes earlier in application development where less time is required from developers and software becomes more secure before it even goes out the door. But for decades, AppSec has evolved around slow and siloed tools.  As automation takes over and AppSec becomes an integrated part of DevOps, a new culture of collaboration and enablement between Security and Engineering is necessary for success.

    Click to Expand

    Speaker:

    Mike Manginella
    Mike Manginella

    Mike Manginella

    Director, Application Security at ShiftLeft

    Collapse This Item

  • Evolving Threat Hunting to Adversary Hunting Using Threat Intelligence: Utilizing Dark Web and Underground Sources to Understand the Motivation, Social Network and Next Action of an Adversary 2:25 pm

    Presented by Cybersixgill

    Today’s organizations face unprecedented challenges in battling cyber threats. Between increasingly sophisticated cybercriminals, rapidly expanding digital assets and attack surfaces, and a legal landscape that threatens to punish those companies that fail to adequately protect their customers’ privacy rights, it’s not hard to see why cybersecurity professionals are buckling under the mounting pressure. Within this complex new cyber threat battleground, organizations cannot afford to continue relying on passive, reactive defense, and instead, must leverage the tools and methodologies to facilitate a truly proactive and preemptive cyber defensive program. Threat hunting is a powerful tool enabling companies to take a proactive approach to building organizational cyber resilience. 

    But most hunting expeditions focus on threats – leaving the adversary free to launch another set of attacks with different tactics. We need to evolve threat hunting into a hunt for the adversary. The deep and dark web, and other closed sources, provide valuable insights into the motivations and activities of threat actors. Over the course of this session, we will provide a tour of the underground, understand the motivations behind the actions of threat actors, their social networks, and how to anticipate their next steps.

    Click to Expand

    Speaker:

    Edan Cohen
    Edan Cohen

    Edan Cohen

    Lead Threat Intelligence Specialist at Cybersixgill

    Collapse This Item

  • Will the Real Zero Trust Please Stand Up? 2:50 pm

    Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today.  It is a complex concept that unifies many different facets of cybersecurity.  Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures.  As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats.

    Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts.

    Click to Expand

    Panel Participants:

    Ran Barth
    Ran Barth

    Ran Barth

    Director of Security Engineering at Salt Security

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Patryk Stachowiak
    Patryk Stachowiak

    Patryk Stachowiak

    Chief Product Evangelist at tenfold Security

    Collapse This Item

  • Keynote - FBI IC3: Cybercrime Data Collection and Analysis 3:35 pm

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime.  In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.

    Click to Expand

    Speaker:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 4:05 pm

    Panel Participants:

    Steven Hampton
    Steven Hampton

    Steven Hampton

    Resident Agent in Charge (RAIC) at Department of Homeland Security

    Clarke Skoby
    Clarke Skoby

    Clarke Skoby

    Advanced Digital Forensics Expert and Technical Staff Assistant at USSS - Houston Field Office

    Nick Nesbitt
    Nick Nesbitt

    Nick Nesbitt

    Special Agent at the Texas Department of Public Safety

    Mike Galdo
    Mike Galdo

    Mike Galdo

    Assistant United States Attorney (AUSA) in Charge of Cybercrime, United States Attorney's Offices

    Ernesto Ballesteros
    Ernesto Ballesteros

    Ernesto Ballesteros

    Cybersecurity State Coordinator (CSC) for the State of Texas

    Collapse This Item

  • Conference Closing Session 5:25 pm
  • Networking Reception and Happy Hour 5:30 pm
Partners Register