Registration

Wed. Feb 16 — Thu. Feb 17

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $200.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for the Raleigh - RTP Cybersecurity Conference are in Eastern Time (EDT/EST).

The Conference will be open from 12:00 PM to 6:00 PM, February 16th and 8:00 AM to 6:00 PM, February 17th.

  • DAY ONE
  • Welcome to the Raleigh - RTP Cybersecurity Conference
  • Special Welcome from FBI SAC Bobby Wells 12:10 pm

    Speaker:

    Bobby Wells
    Bobby Wells

    Bobby Wells

    Special Agent in Charge, FBI Charlotte Field Office

    Collapse This Item

  • Getting It Just Right: Achieving Least Privilege in Cloud and Hybrid Environments 12:25 pm

    Presented by Authomize

    Achieving Least Privilege has emerged as a critical goal for the modern enterprise. Getting Least Privilege right has always been a difficult task, and moving to the cloud has not made it any easier. Lock down too much and you can’t get business done. Lock down too little and see your corporate data up for sale to the highest bidder. This gets even more complicated in multi-cloud and hybrid environments, where access controls are fragmented and enforcing unified policies becomes extremely difficult.

    Click to Expand

    Speaker:

    Peter Clark
    Peter Clark

    Peter Clark

    Director, Solutions Engineering at Authomize

    Collapse This Item

  • Security Through Maturity: Assess and Improve your Cloud Infrastructure Security 12:50 pm

    Presented by Ermetic

    When securing your AWS, Azure or GCP environment, the stakes are high — and so may be your blood pressure! With so many different variables to consider when designing and implementing a security strategy, you need a clear framework for setting priorities and building a plan of action.

    Best practices and compliance standards are a good first step. But they don’t give you a tool for assessing the maturity of your current cloud security practices and a roadmap for continuous improvement.

    We created a modern framework that defines the key guidelines for a comprehensive cloud security strategy. It is lightweight and easy to understand and serves as a guide for prioritizing and implementing security controls and procedures in a way that will make stakeholders open to collaborating with you.

    In this session you will learn how to:

    -Gain a clear picture of where your organization currently stands on its path to a secure cloud environment
    -Design a cloud security strategy for your enterprise with clear and practical milestones
    -Create a common language between various stakeholders in your organization
    -Leverage an automated solution to improve your security

    Click to Expand

    Speaker:

    Garrett Bechler
    Garrett Bechler

    Garrett Bechler

    Senior Director of Systems Engineering at Ermetic

    Collapse This Item

  • Defense in Depth: New Strategies for 2022 1:15 pm

    The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation over the next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization. 

    In this panel discussion at the Raleigh – RTP Cybersecurity Conference, industry experts will dive into why is IoT Security so often overlooked, how the pandemic changed the way we look at IoT security, how additional security can add issues in terms of connectivity or updates and how to overcome and so much more.

    Click to Expand

    Panel Participants:

    Ran Barth
    Ran Barth

    Ran Barth

    Director of Security Engineering at Salt Security

    Peter Clark
    Peter Clark

    Peter Clark

    Director, Solutions Engineering at Authomize

    Scott Gillis
    Scott Gillis

    Scott Gillis

    Director at Exabeam

    Tim Evans
    Tim Evans

    Tim Evans

    Cofounder and SVP, Chief of Strategy at Adlumin

    Collapse This Item

  • Why SOCs Fail - The Maturity Model Required for Cyber Resilience 2:15 pm

    Presented by Exabeam

    Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

    Key Learnings:

    • Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
    • How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
    • Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
    Click to Expand

    Speaker:

    Scott Gillis
    Scott Gillis

    Scott Gillis

    Director at Exabeam

    Collapse This Item

  • Artificial Intelligence: Friend or Foe in the Context of Ransomware 2:40 pm

    Presented by The Teneo Group

    The industrial revolution was powered by coal and steam. They were the power that enabled innovation and propelled the world down the road that has brought us to where we are today.

    The next revolution is on the horizon, and it’s an information revolution. Smartphones, smart homes, and smart assistants are proliferating our lives. Artificial intelligence is becoming an integral contributor to how this technology adds value to our lives. The capabilities of the cyber security ecosystem must keep pace with this evolution.

    During this session we will cover how artificial intelligence is being used to fuel the next generation of cyber security ecosystems. We will see how it can be used to improve accuracy, speed and efficiency of enforcement technologies while enhancing the information used to make business and security decisions.

    On the other hand, how could AI & Machine Learning be used against us? If we have the technology, so do our adversaries.

    Click to Expand

    Speaker:

    Aaron Rose
    Aaron Rose

    Aaron Rose

    Security Architect - Office of the CTO at the Teneo Group

    Collapse This Item

  • Keynote - Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 3:05 pm

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Raleigh – RTP Cybersecurity Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    Formerly: Asst Director, CISA; Director, NCCIC

    Collapse This Item

  • NC National Guard Cyber Security Response Force: Capabilities Brief 4:10 pm

    In this short presentation, Seth Barun, Cyber/Mission Command Branch Chief will overview the capabilities and accomplishments of the Cyber Security Response Force (CSRF) over the past year, and highlight its goals for 2022 and beyond.

    Click to Expand

    Speaker:

    Seth Barun
    Seth Barun

    Seth Barun

    Cyber/Mission Command Branch Chief, 113th STB BN CDR

    Collapse This Item

  • Cyber Executive RoundTable 4:25 pm

    Submit your bio for consideration to participate on our Cyber Executive RoundTable

    at the Raleigh – RTP Cybersecurity Conference to

    [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Scott Dickinson
    Scott Dickinson

    Scott Dickinson

    CISO - AnMed Health

    Devon Ackerman
    Devon Ackerman

    Devon Ackerman

    MD & Head of Incident Response at Kroll Cyber Risk

    Robert Reynolds
    Robert Reynolds

    Robert Reynolds

    Chief Information Security Officer at Town of Chapel Hill

    Carlota Sage
    Carlota Sage

    Carlota Sage

    vCISO at Fractional CISO

    Anthony Foust
    Anthony Foust

    Anthony Foust

    Global Chief Information Security Officer - Belron Group

    Collapse This Item

  • Day One Closing Session 5:15 pm
  • Happy Hour Reception 5:25 pm
  • DAY TWO
  • Welcome to the Raleigh - RTP Cybersecurity Conference
  • Special Welcome from the USSS 9:15 am

    Speaker:

    Kip Monroe
    Kip Monroe

    Kip Monroe

    Resident Agent in Charge at Raleigh Field Office, USSS

    Collapse This Item

  • Keynote - Cyber Enabled Fraud: Understanding & Managing the Growing Threat 9:35 am

    As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent.

    Based on his work with the Financial Services Information Sharing and Analysis Center (FS-ISAC) Threat Intelligence Committee Fraud Working Group, Mr. Dant will share some of the details of the Threat Viewpoint Fraud Mitigation Framework he authored. Over his career with the US Secret Service, and continuing into his work in private sector banking, Jeff worked with colleagues across the industry to better integrate information security and fraud investigation. The framework outlines common taxonomies, definitions, and areas of focus common to Information Security and Fraud Groups that can help facilitate better collaboration across, and especially between organizations in the sector.

    In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches that leverage intelligence, data, technology, and process.

    Attendees will understand how internal groups, as well as Managed Security Services Providers (MSSPs) play a role in the “kill chain,” based on the familiar Lockheed concept. They will also see some practical examples of how threat actors employ artificial intelligence and machine learning to gain access, which lies at the intersection of credential stuffing, account takeover, identity verification and fraud mitigation practices.

     

    Click to Expand

    Speaker:

    Jeff Dant
    Jeff Dant

    Jeff Dant

    Head of Fraud at Ally Bank

    Collapse This Item

  • Knowing What Not to Do 10:15 am

    Presented by Tego Data

    The proliferation of Zero-Day vulnerabilities has amplified the stress level for already burdened IT and Security staff. One needs to look no farther than ProxyLogon, PrintNightmare and Log4j vulnerabilities as sublime examples of disruptive vulnerabilities.

    Tasked with finding the vulnerabilities and then planning and executing mitigation strategies, many IT teams had to jump into vulnerability resolution while neglecting important, but less urgent IT initiatives. Exacerbating matters, those steps were often executed in a void of proper risk assessment and change management. The problems will only get worse in the future.

    This presentation will provide a brief case study into the aforementioned vulnerabilities and identify new techniques, technologies and best practices to evaluate how, when and even if IT should take action to mitigate.

    Click to Expand

    Speaker:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Collapse This Item

  • Empowering Users To Be the Best Human Firewall in Your Organization 10:40 am

    Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks.  Maybe with corporate devices, maybe not.  This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.  

    Our panelists at the Raleigh – RTP Cybersecurity Conference will talk more about this issue, and what you can do to make your users the best last line of defense. 

    Click to Expand

    Panel Participants:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance at Tego Data

    Scott Dickinson
    Scott Dickinson

    Scott Dickinson

    Virtual CISO - State of South Carolina

    Carlota Sage
    Carlota Sage

    Carlota Sage

    vCISO at Fractional CISO

    McClellan “Mac” Plihcik
    McClellan “Mac” Plihcik

    McClellan “Mac” Plihcik

    Senior Special Agent at US Secret Service

    Collapse This Item

  • It’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365 11:40 am

    Presented by tenfold

    In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services.

    Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.

    Click to Expand

    Speaker:

    Helmut Semmelmayer
    Helmut Semmelmayer

    Helmut Semmelmayer

    CEO at tenfold

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 12:05 pm

    Presented by Baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Panel Participants:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • Lunch Break
  • Demo - Take Control of Your Endpoints With baramundi 12:35 pm

    Presented by baramundi

    Keeping track and actively managing your endpoints can be a challenging task. Flexible work hours and locations often cause headaches when it comes to IT security and management. Using tools like the baramundi management suite can reduce the workload and increase your overall IT security significantly. In our live demo we’ll showcase some best practices in patch management, inventory and automation. 

    Click to Expand

    Speaker:

    David Sterz
    David Sterz

    David Sterz

    Principal Consultant at Baramundi

    Collapse This Item

  • Keynote - Incident Response & The Trickle Down Effect 1:00 pm

    CISOs stand prepared to guide their organizations through Cyber Intrusion and Ransomware Events and Devon Ackerman’s Incident Response teams across North America handle thousands of such events each year. They are on the front lines working in lockstep with victim organizations and their CISOs, augmenting Client IT and Incident Response teams, performing forensic analysis, working to contain and eject threat actors from networks and investigate incidents to identify risk to sensitive data.

    From that body of experience, interactions and investigative results, Mr. Ackerman will walk the Raleigh – RTP Cybersecurity Conference audience through observed patterns that Kroll has termed “The Trickle Down Effect” as it relates to Nation State Actors and their Tactics, Techniques and Procedures being observed and absorbed by Organized Crime Groups and mass produced against victim organizations, like your own. Mr. Ackerman will also walk the audience through two concepts (Castle Wall Doctrine & Kroll’s Intrusion Lifecycle) that he hopes will be helpful for CISOs as they convey concepts and analogies to members of their Boards, their Executive Teams, and employees of their organizations.

    Click to Expand

    Speaker:

    Devon Ackerman
    Devon Ackerman

    Devon Ackerman

    MD & Head of Incident Response at Kroll Cyber Risk

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 2:05 pm

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. 

    Join Mitch Bowman, Cyber Security Director, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks. 

    This presentation will discuss: 

    -Recent ransomware threat trends, including double extortion and RDP attacks 

    -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office 

    -Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day

    Click to Expand

    Speaker:

    Mitch Bowman
    Mitch Bowman

    Mitch Bowman

    Cyber Security Director at Darktrace

    Collapse This Item

  • Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 2:30 pm

    Presented by Uptycs

    The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Uptycs CEO and co-founder Ganesh Pai will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments. 

    Click to Expand

    Speaker:

    Ganesh Pai
    Ganesh Pai

    Ganesh Pai

    Founder and CEO at Uptycs

    Collapse This Item

  • Preview: State Agencies Discuss Their Respective Missions 2:55 pm

    A supply chain encompasses the entire network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.  The ultimate goal of an effective supply chain is lower costs of doing business thus resulting in higher profits and improved customer satisfaction.  The process of bringing in a third party involves identifying, assessing and controlling all the various risks that can develop over the entire lifecycle of such relationships. 

    Join this session to drive into how sophisticated attackers can live quietly inside even organizations with significant expertise and mature security processes. 

    Click to Expand

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 3:10 pm

    This week’s Raleigh – RTP Cybersecurity Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

    This Raleigh – RTP Cybersecurity Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.

    Click to Expand

    Panel Participants:

    Jessica Nye
    Jessica Nye

    Jessica Nye

    Supervisory Special Agent

    Seth Barun
    Seth Barun

    Seth Barun

    Cyber/Mission Command Branch Chief, 113th STB BN CDR

    Carly Sherrod
    Carly Sherrod

    Carly Sherrod

    Deputy State Chief Risk Officer at State of North Carolina

    Sean McCloskey
    Sean McCloskey

    Sean McCloskey

    CISA Region 4 - Chief of Cybersecurity at Department of Homeland Security

    Thomas McGrath
    Thomas McGrath

    Thomas McGrath

    Deputy Homeland Security Chief at North Carolina Emergency Management

    McClellan “Mac” Plihcik
    McClellan “Mac” Plihcik

    McClellan “Mac” Plihcik

    Senior Special Agent at US Secret Service

    Scott Clark
    Scott Clark

    Scott Clark

    Strike Team Leader

    Collapse This Item

  • Managing the Insider Threat 4:00 pm

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • The Evolution of the Threat: Hunting, Detection, & Response 4:35 pm

    Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets.  Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections. 

    Attend to talk about the problem, and see what US enterprises are doing to prepare themselves for these situations

    Click to Expand

    Collapse This Item

  • The Cybersecurity Skills Shortage 5:00 pm

    There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.

    This session will explore the issues around cybersecurity jobs. Breaking into the field, the relative need for certifications, formal education, on-the-job training and more. The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.

    Click to Expand

    Collapse This Item

  • Conference Closing Session 5:20 pm
  • Conference Closing Happy Hour 5:30 pm
Partners Register