
Conference
Chicago 2022
Cybersecurity Conference
Join your fellow cybersecurity professionals at the Chicago Cybersecurity Conference to gain insights to help you better navigate whatever cyber threats that 2022 may bring! You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
The Chicago Cybersecurity Conference will allow you to connect with your peers and industry experts for live, in-person sessions. Engaging topics will range from the future of ransomware to protecting your organization from advanced threat actors.
Take a look at all Data Connectors has to offer here!
Date
Thu. Jul 14
Location
2121 South Prairie Avenue
Chicago, IL 60616
(312) 824-0500
-
Featured Speakers
Mark Sangster
Protecting Against Cyber Attacks
Dmitriy SandlerProtecting Against Cyber Attacks
Jonathon MayorProtecting Against Cyber Attacks
Ryan HellwigProtecting Against Cyber Attacks
John FelkerCybersecurity Leadership Lessons, from Hawaii to Afghanistan
Jaya Prakash Narayan Polumuru2022 Trends & Directions
Matt McGuirk2022 Trends & Directions
Gatewood Green2022 Trends & Directions
Brandon Reid2022 Trends & Directions
Lisa PlaggemierGuest Keynote Presentation
John FelkerCyber Inter-Agency Collaboration Panel
Antonio EnriquezCyber Inter-Agency Collaboration Panel
Cody MajerusCyber Inter-Agency Collaboration Panel
Derek MayerCyber Inter-Agency Collaboration Panel
Craig MoringielloCyber Inter-Agency Collaboration Panel
Carrie CrotCyber Inter-Agency Collaboration Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6 PM Thursday, July 14th.
- Welcome / Introductions
-
The State of Secure Identity 8:30 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll als0 shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
[email protected] D0n+ W07k! 8:50 am
Through the years, we have evolved our authentication methods to try to stay ahead of hackers which have devised new ways of defeating passwords. Just when the security community discovers new authentication technology, it is quickly breached. The result is that we must remember layers upon layers of passwords and other forms of shared secrets, and the only change in the system is the addition of friction to the user experience without any lasting increase in security.
In this session we will examine the most common forms of authentication technology, its Achilles heel in the security model, and best practice guidance that can provide lasting and frictionless security that provides coverage at the desktop, downstream applications and resources, all while improving user satisfaction.
Speaker:
-
Challenges Facing Modern CISOs 9:30 am
The role of the Chief Information Security Officer (CISO) is evolving as a result of the rapidly changing security threat landscape and fast-paced technological advancement. As a result, CISOs must be well-versed in security tools, processes, and strategies while also being able to enable business stakeholders, stay on top of new technologies, and effectively communicate with employees at all levels of their organization. That seems daunting enough, but the problem is exacerbated in the context of SMB due to constraints on budget and bandwidth dedicated to security-related tasks. In most cases, the CTO and/or Head of Engineering of an SMB organization have to play the role of CISO as a reactionary measure; on top of that, they lack proper training in the security domain as well. Instead of dis-regarding this fact, we should empower CTOs to be effective CISOs using tools and automation. As consumers of these applications, we should urge companies of all sizes to adopt a proactive approach to “Data & Infrastructure Security” and acknowledge the challenges they face so we can work together to find solutions.
Speaker:
-
The Reason Why Ransomware is Really HEATing Up 9:50 am
When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.
During this insightful session, Menlo Security’s Security Strategist, Ryan Hellwig, discusses why HEAT attacks are the next-class of browser-based attacks taking advantage of today’s remote and hybrid workforce.
Speaker:
-
Protecting Against Cyber Attacks 10:10 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Fast and Furious Attacks: Using AI to Surgically-Respond 10:55 am
Fast-moving cyber attacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.
Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 11:15 am
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
baramundi will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
- Lunch Break
-
Demo - Practical Email & Phishing Protection 12:00 pm
Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are most definitely on the rise and the two biggest problems facing email security teams in 2022. Criminals are using tactics that are designed to slip through legacy gateway protection. Vincent Hardick, Solution Engineer at INKY Technology will take you through a demo of INKY’s technology, highlighting how its world class platform helps stop phishing attacks internally and externally.
Speaker:
-
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:10 pm
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
Leading Across the Aisle: Achieving DevSecOps Through and Across Teams 1:10 pm
As technology advances to achieve new levels of efficiency, Security and Engineering leaders alike are taking a fresh look at the processes they have in place. “Shifting security left” means making fixes earlier in application development where less time is required from developers and software becomes more secure before it even goes out the door. But for decades, AppSec has evolved around slow and siloed tools. As automation takes over and AppSec becomes an integrated part of DevOps, a new culture of collaboration and enablement between Security and Engineering is necessary for success.
Speaker:
-
Ransomware - The New Cold War 1:30 pm
Ransomware is often examined technically from a tools and tactics perspective, in this presentation we examine the ransomware industry as a business. In the presentation we will walk through how to build a ransomware campaign top to bottom (with no technical knowledge or ability), examine the monetary feasibility then explore why this dark market is thriving and some methods to thwart ransomware attempts on your organization.
Speaker:
-
2022 Trends & Directions 1:50 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Managing Cloud Risk Without Slowing App Delivery 2:35 pm
As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.
Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Alexander Lawrence, Sysdig Solutions Director, will share our customers’ best practices for securing containers, Kubernetes and cloud services.
Speaker:
-
No Time To Waste - A Modern Approach to Security Awareness Training 2:55 pm
Your employees are committed to keeping your customer data secure —but they may not be prepared to face the evolving cyber threats they are exposed to every day. Your employee training program should mimic the hackers: It should target employees repeatedly during their working routine, creating many short opportunities for engagement and success. Most importantly, it should do it without adding any burden to your security team.
Join Bonnie Hampton, CybeReady’s VP North America, to learn about a next-gen approach to automatic security awareness training and achieving compliance with ease.
Speaker:
-
Guest Keynote Presentation 3:15 pm
People often don’t do things they know they should, even when they can benefit. What’s the reason behind this? New research from the National Cybersecurity Alliance reveals the public’s attitudes and beliefs about security, and potential drivers and barriers towards the adoption of secure data security habits. We will share the highlights of this revealing research, and how we can apply such behavioral science insights to develop more effective awareness and behavior change initiatives. In this session, National Cybersecurity Alliance Executive Director Lisa Plaggemier will explore the findings from the organization’s annual survey and outline what can be learned when creating awareness programs.
Speaker:
-
How To Combine IGA, AM, PAM, Identity Protection and Deliver a Complex Identity Solution in a Phased Approach 4:05 pm
“Identity is the new parameter” in the Zero-Trust Security Framework. This Presentation discusses practical approaches to design and deliver identity and access centric solutions in the agile framework. It discusses on-prem, hybrid and cloud native.
Speaker:
-
Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 4:25 pm
Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 4:45 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
Panel Participants:
- Conference Closing Session 5:20 pm
- Networking Reception and Happy Hour 5:30 pm