
Conference
Austin
Cybersecurity Conference
The world is watching as Austin becomes the Silicon Valley of the south, giving cybersecurity professionals in the region unprecedented opportunities. Gain the edge at the Austin Cybersecurity Conference, where experts and executives meet to discuss the vast threat landscape facing the nation and the local community alike.
Sit alongside other IT professionals and gather insights through a series of educational sessions, Q&As, roundtable discussions and meaningful keynotes. Get access to industry leaders and luminaries, who will be there to answer your questions and impart vital information that you can use to grow your organization’s security posture.
Book your room at the JW Marriot Austin here!
Room Rate: $299
Date Range: 4/12 – 4/14
Cutoff date: March 26
Date
Wed. Apr 13 — Thu. Apr 14
-
Featured Speakers
Steven Hampton
Special Welcome - Resident Agent in Charge, USSS Austin Field Office
Scott RiddickCybercrime Trends
Gavin GroundsCyber Executive RoundTable
Ted LayneCyber Executive RoundTable
John FrushourCyber Executive RoundTable
John SappCyber Executive RoundTable
Ashley RoseCyber Executive RoundTable
Robert RussellSpecial Welcome - Robert Russell, Acting Regional Director, Region 6 (AR, OK, TX, LA, NM), CISA
John KindervagKeynote Fireside Chat: John Kindervag
Donna GregoryKeynote - FBI IC3: Cybercrime Data Collection and Analysis
Steven HamptonCyber Inter-Agency Cooperation Panel
Clarke SkobyCyber Inter-Agency Cooperation Panel
Nick NesbittCyber Inter-Agency Cooperation Panel
Mike GaldoCyber Inter-Agency Cooperation Panel
Ernesto BallesterosCyber Inter-Agency Cooperation Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 9:00 AM to 5:30 PM both days.
- DAY ONE
- Welcome / Introductions
-
Special Welcome - Resident Agent in Charge, USSS Austin Field Office 10:20 am
In this short introduction, Resident Agent in Charge Steven Hampton will give an interview of how the US Secret Service works cybercrime investigations. He will discuss some of the trends, why cybersecurity leaders presented with a situation should bring in the USSS early, and give an understanding of some of the breadth and depth of help the Bureau can provide and the global reach it offers.
His talk will include some of the regional trends his office has seen, recent cases and investigations, and things that local cyber executives should know that could help them in cyber threat situations.
Speaker :
- Cybercrime Trends 10:30 am
-
Put Your Business Ahead of Disruption: MDR in Action 11:05 am
As new threats are constantly born, how proactive is your company about cybersecurity? Put your business ahead of disruption and build a more responsive cybersecurity operation to protect your business from cybercrime. Brent Feller, Director of Solutions Architects at eSentire will share how eSentire’s Managed Detection and Response solution stops threats before they become a business disrupting event. He will cover real, recent attacks and how we stopped them in their tracks.
Speaker:
-
Making Music From Cloud Security Noise 11:30 am
The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.
Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust.
Speaker:
-
Cloud Security Challenges Created by the Lightspeed Transition of 2020/21: What Happened to Zero Trust? 11:55 am
As people, applications and data have shifted over the past two years, so has the focus for networking security. In the new hybrid work reality, where fully remote staff may never see the inside of an office (much less on-site network and firewall), cyber leaders have adapted with cloud and SaaS applications.
However, the shift was so fast that all too often user privileges were left artificially high. A liberal view on permissions and access management expedited set-up, but left gaps for lateral movement – be they from a leaked credential or a rogue insider. This extends back into the engine room, as good security in a cloud-first environment needs to be baked in at the DevSecOps level.
Experts on this panel will talk about the requirements for understanding the enterprise risk introduced in these scenarios. They’ll debate the effectiveness of browser isolation, how to apply a more zero-trust-centric view, visibility/addressing “Shadow IT” and how to get a better balance between friction and security.
Panel Participants:
- Lunch Break
-
A Realistic View of the State of Secrets Sprawl in Corporate Codebases 1:25 pm
Secrets like API keys are sprawling through the internet at an alarming rate. A research project released in March uncovered 6 million leaked secrets publicly. This presentation reviews that research and uses recent breaches to show how adversaries discover and exploit secrets to breach organizations.
Panel Participants:
-
Beyond SOAR: Defining the Enabling Processes & Technology for a Modern SOC 1:45 pm
Analysts started talking about Security Orchestration, Automation and Response some time ago, and over that period so much as changed. Gartner now has a Market Guide on the topic, and there are solutions that fit into each SOAR element: Security incident response platforms (SIRPs), Security orchestration and automation (SOA), and Threat intelligence platforms (TIPs). But what are the processes that need to be in place first? What other elements are needed to make the modern Security Operations Center (SOC) hum in 2022?
Our expert panelists will talk about different approaches, tuning existing systems, and where new technology fits in when needed. They will share their points of view and take live questions from the audience to explain more.
Panel Participants:
-
Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 2:50 pm
The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss:
-How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment.
-Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.
Speaker:
-
Fast and Furious Attacks: Using AI to Surgically Respond 3:15 pm
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Senior Cyber Security Executive, Blake Goins, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
Topic for this session– Autonomous Response
- Explore today’s threats and challenges
- How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough
Speaker:
-
Cyber Executive RoundTable 4:00 pm
Submit your bio for consideration to participate on our Austin Cybersecurity Conference Cyber Executive RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Day One Closing Session 4:50 pm
- Networking Reception and Happy Hour 5:00 pm
- DAY TWO
- Welcome / Introductions
-
Special Welcome - Robert Russell, Acting Regional Director, Region 6 (AR, OK, TX, LA, NM), CISA 9:25 am
The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its “Shields Up” warning in mid-February. Working with other agencies, important information is updated regularly at cisa.gov/shields-up. Consolidating that information and a host of the intelligence that CISA has made available, Mr. Robert Russell, Acting Director for CISA Region 6 will go over the nature of the current threats posed by these and other pressing headlines.
Panel Participants:
-
CIS Controls in the Real World 9:40 am
The Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense is a publication of best practice guidelines for computer security. The project was initiated early in 2008 in response to extreme data losses experienced by organizations in the US defense industrial base.
In this presentation, Sentinel CEO and long-time cybersecurity industry veteran Ted Grenloh will talk through a deep-dive on the tangible effect that best practices like the CIS Controls have on network security.
Managed Network Detection and Response (MNDR) and Active Threat Intelligence provide crucial components for a modern Defense-in-Depth strategy, but it’s the years of data and experience that make it easy to see which organizations are on top of their security game … and which could really benefit from the guidance CIS Controls provide.
The discussion will walk through several of the CIS Controls, review the Version 8 (V8) updates, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep networks safe and secure.
Speaker:
-
It’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365 10:05 am
In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services.
Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.
Speaker:
-
Ransomware Prevention (Or the Closest You Can Come to It): Pre-Attack Practices 10:30 am
So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.
Panel Participants:
-
Redefining the MSSP Relationship: Partner With A Co-Fiduciary 11:20 am
A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.
Panel Participants:
-
The Reason Why Ransomware is Really HEATing Up 11:45 am
When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.
Speaker:
- Lunch Break
- Demo Session- Automated Secret Detection 12:25 pm
-
Keynote Fireside Chat: John Kindervag 12:50 pm
After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.
John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.
In this Keynote Fireside Chat, John will talk about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape.
Speaker:
-
Leading Across the Aisle: Achieving DevSecOps Through and Across Teams 2:00 pm
As technology advances to achieve new levels of efficiency, Security and Engineering leaders alike are taking a fresh look at the processes they have in place. “Shifting security left” means making fixes earlier in application development where less time is required from developers and software becomes more secure before it even goes out the door. But for decades, AppSec has evolved around slow and siloed tools. As automation takes over and AppSec becomes an integrated part of DevOps, a new culture of collaboration and enablement between Security and Engineering is necessary for success.
Speaker:
-
Evolving Threat Hunting to Adversary Hunting Using Threat Intelligence: Utilizing Dark Web and Underground Sources to Understand the Motivation, Social Network and Next Action of an Adversary 2:25 pm
Today’s organizations face unprecedented challenges in battling cyber threats. Between increasingly sophisticated cybercriminals, rapidly expanding digital assets and attack surfaces, and a legal landscape that threatens to punish those companies that fail to adequately protect their customers’ privacy rights, it’s not hard to see why cybersecurity professionals are buckling under the mounting pressure. Within this complex new cyber threat battleground, organizations cannot afford to continue relying on passive, reactive defense, and instead, must leverage the tools and methodologies to facilitate a truly proactive and preemptive cyber defensive program. Threat hunting is a powerful tool enabling companies to take a proactive approach to building organizational cyber resilience.
But most hunting expeditions focus on threats – leaving the adversary free to launch another set of attacks with different tactics. We need to evolve threat hunting into a hunt for the adversary. The deep and dark web, and other closed sources, provide valuable insights into the motivations and activities of threat actors. Over the course of this session, we will provide a tour of the underground, understand the motivations behind the actions of threat actors, their social networks, and how to anticipate their next steps.
Speaker:
-
Will the Real Zero Trust Please Stand Up? 2:50 pm
Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is a complex concept that unifies many different facets of cybersecurity. Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures. As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats.
Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts.
Panel Participants:
-
Keynote - FBI IC3: Cybercrime Data Collection and Analysis 3:35 pm
Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime. In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.
Speaker:
- Cyber Inter-Agency Cooperation Panel 4:05 pm
- Conference Closing Session 5:25 pm
- Networking Reception and Happy Hour 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners