
Virtual Summit
SouthWest
Virtual Cybersecurity Summit
The Southwest has become a hotbed for growing businesses and industries in recent years – and with great growth comes greater vulnerabilities when it comes to cybersecurity. Join your fellow senior cybersecurity experts for the SouthWest Virtual Cybersecurity Summit, and feel more prepared to better handle the growing list of threats organizations face in the current climate.
Through an immersive virtual venue, you’ll attend sessions led by industry luminaries and thought leaders, network with your peers, and gain insight on the latest technology and solutions available for your organization. During the two-day Virtual Summit, you’ll attend insightful keynotes, participate in Q&A sessions with industry experts, and hear from a panel of CISOs from across the region.
See a sneak peek of Special Agent in Charge Frank Boudreaux here!
Date
Wed. Feb 02 — Thu. Feb 03
-
Featured Speakers
Frank J. Boudreaux, Jr.
Special Welcome with SAC F. Boudreaux
Suzanne AllenKeynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes
Craig MoringielloKeynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes
E.J. HilbertExpert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!)
Michael LettmanExpert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!)
Andy StoneExpert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!)
Harry StewardExpert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!)
Ira WinklerKeynote Presentation: Human Security Engineering: Stop Relying on the Failed Human Firewall
John KindervagKeynote Fireside Chat: John Kindervag
Dennis RiceFBI Briefing: Cybersecurity Services for Building Cyber Resilience
Dr. Jonathan D. T. WardKeynote Fireside Chat: Dr. Jonathan Ward - Author, “China’s Vision of Victory”
Jeff HudesmanCyber Executive RoundTable
Morgan ReedCyber Executive RoundTable
Seema SewellCyber Executive RoundTable
Ryan MurrayCyber Executive RoundTable
Kristen SandersCyber Executive RoundTable
Michael LettmanCyber Executive RoundTable
Event Schedule
Times for this Event are in Mountain Time (MDT/MST).
The Summit will be open from 8:00 AM to 6:00 PM, both days.
- DAY ONE
- Welcome / Introductions
- Special Welcome with SAC F. Boudreaux 9:05 am
-
Demystifying Zero Trust and Its Role in Cybersecurity 9:25 am
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
Speaker:
-
CIS Controls in the Real World 9:50 am
As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.
Speaker:
-
The State of Secure Identity 10:30 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
- Most highly targeted by credential stuffing attacks
- Most highly targeted by SQL injection attacks
- Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
Expert Panel Discussion: Defense in Depth: New Strategies for 2022 10:55 am
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?
Panel Participants:
- Lunch Break
- Keynote Presentation: Micro-Cap Fraud: An Exercise in Complex Financial Crimes 12:10 pm
-
Disrupting Lateral Movement by Securing Active Directory 1:15 pm
A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.
Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.
Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.
Highlights include:
- Live detection for attacks targeting Active Directory
- Attack surface reduction at both Active Directory and the endpoint
- Continuous visibility to AD changes that introduce new exposures
- Addressing Active Directory assurance to reduce risks and pass Red team tests
Speaker:
-
Security Considerations: Before, During and After an Attack 1:35 pm
The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.
Speaker:
-
Expert Panel Discussion: What You Left Out of Your 2022 Cybersecurity Plan (& How to Fix it!) 2:00 pm
While the 2021 headlines certainly facilitated easier discussions on expanded 2022 budget for cybersecurity, the “unknown unknowns” are a part of every cybersec leaders’ life. New threats will always arise, and bad actors didn’t take a planning break during the holiday season.
In this panel discussion, our experts offer advice and opinions on how to best build out budget requests and add in padding for potential disruptions. They will also discuss how to best “translate” business requirements into meaningful budget items for finance and procurement teams, who are less “read-in” on cybersecurity in general.
Panel Participants:
-
Stopping Ransomware with Autonomous Response 2:45 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join SME, Darktrace’s TITLE, as he/she/they unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
Speaker:
-
Remote Work – The Wild West of Endpoint Management 3:05 pm
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.
Speaker:
-
Keynote Presentation: Human Security Engineering: Stop Relying on the Failed Human Firewall 3:25 pm
While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc., are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.
Speaker:
- Day One Closing Session
- DAY TWO
- Welcome / Introductions
-
Prioritizing Remediation: A Log4j Retrospective 9:35 am
In this talk, Erick will discuss the community’s reaction to the recent state of Log4j CVEs and the remediation efforts around them. In spite of the overwhelming response from security teams and the tremendous work done to remediate the vulnerability, some organizations were compromised during their response by vulnerabilities other than Log4j — including vulnerabilities that were known to be exploited in the wild ahead of the release of Log4j. We present some ways that threat intelligence, community sentiment, and other information can help us parse through fear, uncertainty, and doubt to ensure that the vulnerabilities most likely to lead to compromise are the ones we patch first.
Speaker:
-
A Realistic Take on Zero Trust 10:00 am
Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.
Speaker:
-
Expert Panel Discussion: Recover from Ransomware: Coming Back After an Attack 10:20 am
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
Understanding Your Organization's Sensitive Data - And How You Can Protect It 11:10 am
If you’re a small or midsized business, you’ve got lots of sensitive, unstructured data across multiple file shares. Growing data privacy and protection regulations mean that every employee across the business has an obligation to know what sensitive customer data the business has, so the business can better protect it.
Join cybersecurity industry veteran and Cavelo CEO James Mignacca as he covers:
· The different types of sensitive data your business uses and stores, and why that matters.
· How top threats like ransomware and phishing schemes make sensitive data vulnerable to risk and exploit.
· Top tips and best practices IT staff, clerks and frontline team members can apply to protect your customer’s sensitive data, meet compliance requirements and streamline data management.Speaker:
-
Compliance as a Catalyst for Reducing Risk 11:30 am
Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
- Challenges in Compliance and Risk Programs
- Five Best Practices in starting a Risk Program
- Compliance Considerations that will Improve Your Risk Posture
Speaker:
-
Keynote Fireside Chat: John Kindervag 11:50 am
After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.
John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.
In this Keynote Fireside Chat, John will talk about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape.
Speaker:
- Lunch Break
-
Is Your Defensive Stack Ready for a Targeted Attack? 1:15 pm
A key challenge for organizations is determining if the investment in detection and response tools are performing and meeting their objective. Security teams struggle with red team and security validation processes performed in a continuous and efficient manner. How can security teams remove assumptions and shift their organization’s security program to one centered around the attacker’s perspective predicting the attacker’s next move.
Speaker:
-
Expert Panel Discussion: Identity & Access 2022 1:35 pm
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?
Panel Participants:
-
FBI Briefing: Cybersecurity Services for Building Cyber Resilience 2:15 pm
In his remarks at the Salt Lake City Conference S.A.C. Rice expanded on the importance of public/private partnership and some statistics on the FBI services available to every organization in the region.
Speaker:
-
Keynote Fireside Chat: Dr. Jonathan Ward - Author, “China’s Vision of Victory” 2:45 pm
In this fireside chat discussion, Author, consultant and frequent television commentator for Bloomberg, MSNBC, and CNN, Dr. Ward will discuss the geopolitical intricacies related to cyberthreats coming from Communist China and Russia. Based on the ground-breaking work in his book “China’s Vision of Victory,” and his work with the US Department of Defense, other agencies and consulting for Fortune 500 organizations, Dr. Ward will take questions from the audience and discuss in more detail some of the key threats from afar.
Expect this talk to touch on state-sponsored hacking, and consider the government support for this type of “grey crime,” as well as how the rise of military and economic power in the Indo-Pacific affects the world’s new strategic balance.
Speaker:
-
Cyber Executive RoundTable 3:30 pm
Submit your bio for consideration to participate on our Cyber Executive RoundTable
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Closing Session
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners