
Conference
Boston 2022
Cybersecurity Conference
Join your fellow cybersecurity professionals at the Boston Cybersecurity Conference for live, in-person sessions. You’ll hear discussions on topics ranging from cloud security to the future of ransomware. Attendees gain an extensive education on vital security topics to learn the skills needed to stay ahead of today’s cyber threats.
The Boston Cybersecurity Conference will feature industry experts and luminaries, and representatives from some of the world’s top cybersecurity solutions providers. Join us to help ensure you, and your company, are prepared for potential cyber threats in today’s tech heavy world!
Take a look at all Data Connectors has to offer here!
Date
Thu. Jun 23
-
Featured Speakers
Gavin Grounds
Protecting Against Cyber Attacks
Sam CrowtherProtecting Against Cyber Attacks
Seth GoldhammerProtecting Against Cyber Attacks
Ty MurphyProtecting Against Cyber Attacks
Tom BrownProtecting Against Cyber Attacks
Ryan HellwigProtecting Against Cyber Attacks
Jim Rhode2022 Trends & Directions
Kevin O’Connor2022 Trends & Directions
Neil Clauson2022 Trends & Directions
Nick Rago2022 Trends & Directions
Rachel Ratchford2022 Trends & Directions
John KindervagWin The Cyberwar With Zero Trust
Stefani JonesCyber Inter-Agency Collaboration Panel
Jeff MorrissetteCyber Inter-Agency Collaboration Panel
Darren McCormackCyber Inter-Agency Collaboration Panel
William McDermottCyber Inter-Agency Collaboration Panel
Grace BeasonHow to Build and Scale a Business Relevant Risk and Compliance Capability
Greg ShieldsWill the Real Zero Trust Please Stand Up?
Matt McGuirkWill the Real Zero Trust Please Stand Up?
John KindervagWill the Real Zero Trust Please Stand Up?
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, June 23rd.
- Welcome / Introductions
-
Rethink your Third-Party Risk Strategy in an Uncertain World 8:30 am
As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever before. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.
How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, managing the risk associated with your partners is increasingly challenging.
Join Reciprocity experts as we share and discuss with you:
- Market Dynamics driving the risk vs. opportunity balance
- 5 key considerations to better identify, manage and mitigate third party risk
- Real world examples of improving TPRM visibility and efficiency
Speaker:
-
Making Music from the Cloud Security Noise 8:50 am
The volume and types of security noise being generated across a cloud ecosystem can be deafening, bordering on unmanageable. In this session, we will discuss how context-aware security intelligence can enable practitioners to make music from the noise by prioritizing the top attack paths that matter most.
Speaker:
-
Why SOCs Fail - The Maturity Model Required for Cyber Resilience 9:30 am
Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Key Learnings:
- Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
- How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
- Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
Speaker:
-
Automated Cyber Attacks: What’s Really Behind The Next Big Threat 9:50 am
Threat actors continuously adapt, innovate, and build robust tools to evade enterprise defenses, as they collaborate in a thriving underground bot economy made up of bot builders, sellers, and buyers.
These financially motivated bad actors capitalize on opportunities to make the most money in the simplest way possible, unfortunately creating a heavy burden for both organizations and their consumers that can’t go unaddressed.
Join this session hosted by Sam Crowther, Threat Intel Expert & Founder of Kasada to learn about:
– New research revealing the most prominent automated threats online businesses are up against
– Recent stories and examples of how adversaries are leveraging the intricate underground supply chain to weaponize bots, commit fraud, and launch attacks
– How easy and affordable it’s become to avoid detection with the breadth of sophisticated tools and services availableSpeaker:
-
Protecting Against Cyber Attacks 10:10 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Moderator:
Panel Participants:
-
The Reason Why Ransomware is Really HEATing Up 10:55 am
When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.
Speaker:
-
Stopping Attacks, Not Your Business: AI & Autonomous Response 11:15 am
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Jack Lebeau in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Topic for this session– Autonomous Response –
- Explore today’s threats and challenges
- How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough
Speaker:
-
2022 Trends & Directions 11:35 am
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
- Lunch Break
- Demo Session: Identity Drives User Experience and Security 12:05 pm
-
Win The Cyberwar With Zero Trust 12:15 pm
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Speaker:
-
An Adversary-Focused Approach to Cybersecurity Defenses 1:15 pm
Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 1:35 pm
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
Robert Troup from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
-
Cyber Inter-Agency Collaboration Panel 1:55 pm
Moderator:
Panel Participants:
-
Cracking the Code of DevSecOps: Intelligent Orchestration + Code Dx 2:45 pm
Here at Synopsys, we believe application security should be invisible, completely abstracted, extensible to any AST tools. We built Intelligent Orchestration, a purpose-built, intelligent, cloud enabled CI/CD pipeline, inclusive of native world-class software security scanning, which enables DevOps teams to produce highly secure software faster. Intelligent Orchestration, offers a holistic, intelligent solution that combines people, process and technology pillars of DevSecOps.
The excitement from the June 8th announcement of the Code Dx acquisition continues to grow. Code Dx is an award-winning application security risk management solution that automates and accelerates the discovery, prioritization, and remediation of software vulnerabilities.
Intelligent Orchestration provides the ability to intelligently orchestrate security tests from our own tools, third-party tools, and open source tools. Code Dx has the ability to correlate and prioritize the findings from more than 75 testing solutions and manual testing activities. Code Dx provides a consolidated view of all these activities as well as insights into organizational risk.
In this presentation, you’ll learn how Intelligent Orchestration and Code Dx solutions working hand in hand in a DevSecOps pipeline, help address the following application security testing challenges:
1. A lack of automated, integrated security tools
2. Inconsistent services approach
3. Security testing slows processes down
4. False Positives
5. Developer resistance
6. ComplianceSpeaker:
-
Disrupting the Means To Prevent the End 3:05 pm
Join Red Canary Solutions Engineer, Ramelle Sarna, as she dives into changes, and trends in the threat landscape over the last year.
Speaker:
-
How to Build and Scale a Business Relevant Risk and Compliance Capability 3:25 pm
This presentation will show business and IT leaders how to build and scale a fully integrated GRC program that drives financial value and operational efficiencies. Specifically, how to operationalize an integrated GRC program that is tied to business and operating risk and that scales to small and large enterprises through automation. Most importantly, this presentation will demonstrate how to capitalize on existing investments and capabilities to drive immediate benefits and how to scale from there.
Speaker:
-
Solving the Human Element of SaaS Data Security 4:15 pm
It is human nature to improve the way in which we all work together to achieve a common goal. Many Software as a Service (SaaS) applications (i.e. Google Drive, Slack, Box, etc.) that modern organizations are utilizing strive to achieve the same result. In order to drive business enablement, these business-critical applications are leveraged by many different identities such as employees, contractors, third-party vendors, and more. Unfortunately, it’s also human nature to make mistakes. Join this session to learn how to reduce the overall risk profile of your SaaS estate through the right people, process and technology.
Speaker:
-
Email Security Reinvented - Securing Cloud Email and Collaboration 4:35 pm
Harmony Email and Collaboration’s AI continues to reinvent successful email security, and remains the best in the industry. AI protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.
Speaker:
-
Will the Real Zero Trust Please Stand Up? 4:55 pm
Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. It is a complex concept that unifies many different facets of cybersecurity. Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures. As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats.
Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts.
Panel Participants:
- Conference Closing Session 5:25 pm
- Networking Reception and Happy Hour 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners