Registration

Thu. Jul 14

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $125.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6 PM Thursday, July 14th.

  • Welcome / Introductions
  • The State of Secure Identity 8:30 am
    Add to Calendar20220714 8:30 am20220714 8:50 amAmerica/ChicagoThe State of Secure Identity

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll als0 shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll als0 shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • [email protected] D0n+ W07k! 8:50 am
    Add to Calendar20220714 8:50 am20220714 9:10 amAmerica/Chicago [email protected] D0n+ W07k!

    Through the years, we have evolved our authentication methods to try to stay ahead of hackers which have devised new ways of defeating passwords. Just when the security community discovers new authentication technology, it is quickly breached. The result is that we must remember layers upon layers of passwords and other forms of shared secrets, and the only change in the system is the addition of friction to the user experience without any lasting increase in security.

    In this session we will examine the most common forms of authentication technology, its Achilles heel in the security model, and best practice guidance that can provide lasting and frictionless security that provides coverage at the desktop, downstream applications and resources, all while improving user satisfaction.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by Hypr

    Through the years, we have evolved our authentication methods to try to stay ahead of hackers which have devised new ways of defeating passwords. Just when the security community discovers new authentication technology, it is quickly breached. The result is that we must remember layers upon layers of passwords and other forms of shared secrets, and the only change in the system is the addition of friction to the user experience without any lasting increase in security.

    In this session we will examine the most common forms of authentication technology, its Achilles heel in the security model, and best practice guidance that can provide lasting and frictionless security that provides coverage at the desktop, downstream applications and resources, all while improving user satisfaction.

    Click to Expand

    Speaker:

    Michael Rothschild
    Michael Rothschild

    Michael Rothschild

    VP of Product at HYPR

    Collapse This Item

  • Challenges Facing Modern CISOs 9:30 am
    Add to Calendar20220714 9:30 am20220714 9:50 amAmerica/ChicagoChallenges Facing Modern CISOs

     The role of the Chief Information Security Officer (CISO) is evolving as a result of the rapidly changing security threat landscape and fast-paced technological advancement. As a result, CISOs must be well-versed in security tools, processes, and strategies while also being able to enable business stakeholders, stay on top of new technologies, and effectively communicate with employees at all levels of their organization. That seems daunting enough, but the problem is exacerbated in the context of SMB due to constraints on budget and bandwidth dedicated to security-related tasks. In most cases, the CTO and/or Head of Engineering of an SMB organization have to play the role of CISO as a reactionary measure; on top of that, they lack proper training in the security domain as well. Instead of dis-regarding this fact, we should empower CTOs to be effective CISOs using tools and automation. As consumers of these applications, we should urge companies of all sizes to adopt a proactive approach to “Data & Infrastructure Security” and acknowledge the challenges they face so we can work together to find solutions.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by iCompaas

     The role of the Chief Information Security Officer (CISO) is evolving as a result of the rapidly changing security threat landscape and fast-paced technological advancement. As a result, CISOs must be well-versed in security tools, processes, and strategies while also being able to enable business stakeholders, stay on top of new technologies, and effectively communicate with employees at all levels of their organization. That seems daunting enough, but the problem is exacerbated in the context of SMB due to constraints on budget and bandwidth dedicated to security-related tasks. In most cases, the CTO and/or Head of Engineering of an SMB organization have to play the role of CISO as a reactionary measure; on top of that, they lack proper training in the security domain as well. Instead of dis-regarding this fact, we should empower CTOs to be effective CISOs using tools and automation. As consumers of these applications, we should urge companies of all sizes to adopt a proactive approach to “Data & Infrastructure Security” and acknowledge the challenges they face so we can work together to find solutions.

    Click to Expand

    Speaker:

    Jaya Prakash Narayan Polumuru
    Jaya Prakash Narayan Polumuru

    Jaya Prakash Narayan Polumuru

    Founder & CEO at iCompaas

    Collapse This Item

  • The Reason Why Ransomware is Really HEATing Up 9:50 am
    Add to Calendar20220714 9:50 am20220714 10:10 amAmerica/ChicagoThe Reason Why Ransomware is Really HEATing Up

    When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by Menlo Security

    When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

    Click to Expand

    Speaker:

    Mark Guntrip
    Mark Guntrip

    Mark Guntrip

    Sr. Director of Cybersecurity Strategy at Menlo Security

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am
    Add to Calendar20220714 10:10 am20220714 10:35 amAmerica/ChicagoProtecting Against Cyber Attacks

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Mark Guntrip
    Mark Guntrip

    Mark Guntrip

    Sr. Director of Cybersecurity Strategy at Menlo Security

    Mark Sangster
    Mark Sangster

    Mark Sangster

    VP, Chief of Strategy at Adlumin

    Dmitriy Sandler
    Dmitriy Sandler

    Dmitriy Sandler

    Enterprise Engineer Director at Artic Wolf Networks

    Jonathon Mayor
    Jonathon Mayor

    Jonathon Mayor

    Field Technical Director - Security Solutions Architecture

    Collapse This Item

  • Fast and Furious Attacks: Using AI to Surgically-Respond 10:55 am
    Add to Calendar20220714 10:55 am20220714 11:15 amAmerica/ChicagoFast and Furious Attacks: Using AI to Surgically-Respond

    Fast-moving cyber attacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

    Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by Darktrace

    Fast-moving cyber attacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

    Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

    Click to Expand

    Speaker:

    Jake Schieber
    Jake Schieber

    Jake Schieber

    Cybersecurity Account Director

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 11:15 am
    Add to Calendar20220714 11:15 am20220714 11:35 amAmerica/ChicagoWindows 11: Adapt Early or Follow Cautiously?

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    baramundi will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    baramundi will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • Lunch Break
  • Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:10 pm
    Add to Calendar20220714 12:10 pm20220714 12:50 pmAmerica/ChicagoCybersecurity Leadership Lessons, from Hawaii to Afghanistan

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    Formerly: Asst Director, CISA; Director, NCCIC

    Collapse This Item

  • Leading Across the Aisle: Achieving DevSecOps Through and Across Teams 1:10 pm
    Add to Calendar20220714 1:10 pm20220714 1:30 pmAmerica/ChicagoLeading Across the Aisle: Achieving DevSecOps Through and Across Teams

    As technology advances to achieve new levels of efficiency, Security and Engineering leaders alike are taking a fresh look at the processes they have in place. “Shifting security left” means making fixes earlier in application development where less time is required from developers and software becomes more secure before it even goes out the door. But for decades, AppSec has evolved around slow and siloed tools. As automation takes over and AppSec becomes an integrated part of DevOps, a new culture of collaboration and enablement between Security and Engineering is necessary for success.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by ShiftLeft

    As technology advances to achieve new levels of efficiency, Security and Engineering leaders alike are taking a fresh look at the processes they have in place. “Shifting security left” means making fixes earlier in application development where less time is required from developers and software becomes more secure before it even goes out the door. But for decades, AppSec has evolved around slow and siloed tools. As automation takes over and AppSec becomes an integrated part of DevOps, a new culture of collaboration and enablement between Security and Engineering is necessary for success.

    Click to Expand

    Speaker:

    Chuck Bienenfeld
    Chuck Bienenfeld

    Chuck Bienenfeld

    Director of Application Security at ShiftLeft

    Collapse This Item

  • Ransomware the New Cold War 1:30 pm
    Add to Calendar20220714 1:30 pm20220714 1:50 pmAmerica/ChicagoRansomware the New Cold War

    Ransomware is often examined technically from a tools and tactics perspective, in this presentation we examine the ransomware industry as a business. In the presentation we will walk through how to build a ransomware campaign top to bottom (with no technical knowledge or ability), examine the monetary feasibility then explore why this dark market is thriving and some methods to thwart ransomware attempts on your organization.

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    Ransomware is often examined technically from a tools and tactics perspective, in this presentation we examine the ransomware industry as a business. In the presentation we will walk through how to build a ransomware campaign top to bottom (with no technical knowledge or ability), examine the monetary feasibility then explore why this dark market is thriving and some methods to thwart ransomware attempts on your organization.

    Click to Expand

    Speaker:

    Jamison Utter
    Jamison Utter

    Jamison Utter

    Cyber Security Professional at Infoblox

    Collapse This Item

  • 2022 Trends & Directions 1:50 pm
    Add to Calendar20220714 1:50 pm20220714 2:15 pmAmerica/Chicago2022 Trends & Directions

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Panel Participants:

    Jaya Prakash Narayan Polumuru
    Jaya Prakash Narayan Polumuru

    Jaya Prakash Narayan Polumuru

    Founder & CEO at iCompaas

    Craig Moringiello
    Craig Moringiello

    Craig Moringiello

    Retired Assistant Special Agent in Charge at FBI

    Matt McGuirk
    Matt McGuirk

    Matt McGuirk

    Solution Architect, Office of the CTO at Source Defense

    Collapse This Item

  • Managing Cloud Risk Without Slowing App Delivery 2:35 pm
    Add to Calendar20220714 2:35 pm20220714 2:55 pmAmerica/ChicagoManaging Cloud Risk Without Slowing App Delivery

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.

    Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Alexander Lawrence, Sysdig Solutions Director, will share our customers’ best practices for securing containers, Kubernetes and cloud services. 

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.

    Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Alexander Lawrence, Sysdig Solutions Director, will share our customers’ best practices for securing containers, Kubernetes and cloud services. 

    Click to Expand

    Speaker:

    Alexander Lawrence
    Alexander Lawrence

    Alexander Lawrence

    Principal Security Architect at Sysdig

    Collapse This Item

  • No Time To Waste - A Modern Approach to Security Awareness Training 2:55 pm
    Add to Calendar20220714 2:55 pm20220714 3:15 pmAmerica/ChicagoNo Time To Waste - A Modern Approach to Security Awareness Training

    Your employees are committed to keeping your customer data secure —but they may not be prepared to face the evolving cyber threats they are exposed to every day. Your employee training program should mimic the hackers: It should target employees repeatedly during their working routine, creating many short opportunities for engagement and success. Most importantly, it should do it without adding any burden to your security team. 

    Join Bonnie Hampton, CybeReady’s VP North America, to learn about a next-gen approach to automatic security awareness training and achieving compliance with ease.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by CybeReady

    Your employees are committed to keeping your customer data secure —but they may not be prepared to face the evolving cyber threats they are exposed to every day. Your employee training program should mimic the hackers: It should target employees repeatedly during their working routine, creating many short opportunities for engagement and success. Most importantly, it should do it without adding any burden to your security team. 

    Join Bonnie Hampton, CybeReady’s VP North America, to learn about a next-gen approach to automatic security awareness training and achieving compliance with ease.

    Click to Expand

    Speaker:

    Bonnie Hampton
    Bonnie Hampton

    Bonnie Hampton

    VP North America at CybeReady

    Collapse This Item

  • Guest Keynote Presentation 3:15 pm
    Add to Calendar20220714 3:15 pm20220714 3:35 pmAmerica/ChicagoGuest Keynote Presentation

    People often don’t do things they know they should, even when they can benefit. What’s the reason behind this? New research from the National Cybersecurity Alliance reveals the public’s attitudes and beliefs about security, and potential drivers and barriers towards the adoption of secure data security habits. We will share the highlights of this revealing research, and how we can apply such behavioral science insights to develop more effective awareness and behavior change initiatives. In this session, National Cybersecurity Alliance Executive Director Lisa Plaggemier will explore the findings from the organization’s annual survey and outline what can be learned when creating awareness programs.

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    People often don’t do things they know they should, even when they can benefit. What’s the reason behind this? New research from the National Cybersecurity Alliance reveals the public’s attitudes and beliefs about security, and potential drivers and barriers towards the adoption of secure data security habits. We will share the highlights of this revealing research, and how we can apply such behavioral science insights to develop more effective awareness and behavior change initiatives. In this session, National Cybersecurity Alliance Executive Director Lisa Plaggemier will explore the findings from the organization’s annual survey and outline what can be learned when creating awareness programs.

    Click to Expand

    Speaker:

    Lisa Plaggemier
    Lisa Plaggemier

    Lisa Plaggemier

    Interim Executive Director at National Cyber Security Alliance (NCA)

    Collapse This Item

  • How To Combine IGA, AM, PAM, Identity Protection and Deliver a Complex Identity Solution in a Phased Approach 4:05 pm
    Add to Calendar20220714 4:05 pm20220714 4:25 pmAmerica/ChicagoHow To Combine IGA, AM, PAM, Identity Protection and Deliver a Complex Identity Solution in a Phased Approach

     “Identity is the new parameter” in the Zero-Trust Security Framework. This Presentation discusses practical approaches to design and deliver identity and access centric solutions in the agile framework. It discusses on-prem, hybrid and cloud native. 

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by AOH

     “Identity is the new parameter” in the Zero-Trust Security Framework. This Presentation discusses practical approaches to design and deliver identity and access centric solutions in the agile framework. It discusses on-prem, hybrid and cloud native. 

    Click to Expand

    Speaker:

    Robert Yu
    Robert Yu

    Robert Yu

    Principle Architect at AOH

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 4:25 pm
    Add to Calendar20220714 4:25 pm20220714 4:45 pmAmerica/ChicagoLeveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    2121 South Prairie Avenue
    Chicago, IL 60616

    Presented by One Identity

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Bruce Esposito
    Bruce Esposito

    Bruce Esposito

    Global IAM Strategist at One Identity

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 4:45 pm
    Add to Calendar20220714 4:45 pm20220714 5:15 pmAmerica/ChicagoCyber Inter-Agency Collaboration Panel

    Submit your bio for consideration to participate on our Cyber Executive Panel

    to [email protected] or fill out our Call for Speakers form here.

    2121 South Prairie Avenue
    Chicago, IL 60616

    .

    Submit your bio for consideration to participate on our Cyber Executive Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Antonio Enriquez
    Antonio Enriquez

    Antonio Enriquez

    Chief of Cybersecurity, Region 5 at Department of Homeland Security

    John Felker
    John Felker

    John Felker

    Formerly: Asst Director, CISA; Director, NCCIC

    Collapse This Item

  • Conference Closing Session 5:20 pm
    Add to Calendar20220714 5:20 pm20220714 5:30 pmAmerica/ChicagoConference Closing Session2121 South Prairie Avenue
    Chicago, IL 60616

    .

    Collapse This Item

  • Networking Reception and Happy Hour 5:30 pm
    Add to Calendar20220714 5:30 pm20220714 6:30 pmAmerica/ChicagoNetworking Reception and Happy Hour 2121 South Prairie Avenue
    Chicago, IL 60616

    .

    Collapse This Item

Partners Register