• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, June 23rd.

  • Welcome / Introductions
  • Rethink your Third-Party Risk Strategy in an Uncertain World 8:30 am

    Presented by Reciprocity

    As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever before. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.

    How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, managing the risk associated with your partners is increasingly challenging.

    Join Reciprocity experts as we share and discuss with you: 

    • Market Dynamics driving the risk vs. opportunity balance
    • 5 key considerations to better identify, manage and mitigate third party risk
    • Real world examples of improving TPRM visibility and efficiency
    Click to Expand

    Speaker:

    Rob Ellis
    Rob Ellis

    Rob Ellis

    Chief Strategy Officer at Reciprocity

    Collapse This Item

  • Making Music from the Cloud Security Noise 8:50 am

    Presented by Orca Security

    The volume and types of security noise being generated across a cloud ecosystem can be deafening, bordering on unmanageable. In this session, we will discuss how context-aware security intelligence can enable practitioners to make music from the noise by prioritizing the top attack paths that matter most.

    Click to Expand

    Speaker:

    Ty Murphy
    Ty Murphy

    Ty Murphy

    Cloud Security Solution Architect at Orca Security

    Collapse This Item

  • Why SOCs Fail - The Maturity Model Required for Cyber Resilience 9:30 am

    Presented by Exabeam

    Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient. 

    Key Learnings: 

    • Why an outcome-based approach is the only way to offer effective coverage and protection for your organization 
    • How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale 
    • Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
    Click to Expand

    Speaker:

    Scott Gillis
    Scott Gillis

    Scott Gillis

    Director at Exabeam

    Collapse This Item

  • Automated Cyber Attacks: What’s Really Behind The Next Big Threat 9:50 am

    Presented by Kasada

    Threat actors continuously adapt, innovate, and build robust tools to evade enterprise defenses, as they collaborate in a thriving underground bot economy made up of bot builders, sellers, and buyers.

    These financially motivated bad actors capitalize on opportunities to make the most money in the simplest way possible, unfortunately creating a heavy burden for both organizations and their consumers that can’t go unaddressed.

    Join this session hosted by Sam Crowther, Threat Intel Expert & Founder of Kasada to learn about:

    – New research revealing the most prominent automated threats online businesses are up against
    – Recent stories and examples of how adversaries are leveraging the intricate underground supply chain to weaponize bots, commit fraud, and launch attacks
    – How easy and affordable it’s become to avoid detection with the breadth of sophisticated tools and services available

    Click to Expand

    Speaker:

    Sam Crowther
    Sam Crowther

    Sam Crowther

    Threat Intel Expert & Founder at Kasada

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Moderator:

    Gavin Grounds
    Gavin Grounds

    Gavin Grounds

    Exec. Director Cyber Security Strategy and Information Risk Management at Verizon

    Panel Participants:

    Sam Crowther
    Sam Crowther

    Sam Crowther

    Threat Intel Expert & Founder at Kasada

    Seth Goldhammer
    Seth Goldhammer

    Seth Goldhammer

    Cybersecurity Executive at Spyderbat

    Ty Murphy
    Ty Murphy

    Ty Murphy

    Cloud Security Solution Architect at Orca Security

    Tom Brown
    Tom Brown

    Tom Brown

    Senior Systems Engineer at Zimperium

    Ryan Hellwig
    Ryan Hellwig

    Ryan Hellwig

    Security Strategist at Menlo Security

    Collapse This Item

  • The Reason Why Ransomware is Really HEATing Up 10:55 am

    Presented by Menlo Security

    When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

    Click to Expand

    Speaker:

    Ryan Hellwig
    Ryan Hellwig

    Ryan Hellwig

    Security Strategist at Menlo Security

    Collapse This Item

  • Stopping Attacks, Not Your Business: AI & Autonomous Response 11:15 am

    Presented by Darktrace

    With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Jack Lebeau in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.   

    Topic for this session– Autonomous Response – 

    • Explore today’s threats and challenges 
    • How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough
    Click to Expand

    Speaker:

    Jack LeBeau
    Jack LeBeau

    Jack LeBeau

    Cybersecurity Executive at Darktrace

    Collapse This Item

  • 2022 Trends & Directions 11:35 am

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    Click to Expand

    Panel Participants:

    Jim Rhode
    Jim Rhode

    Jim Rhode

    VP, Security Engineering at Critical Start

    Kevin O’Connor
    Kevin O’Connor

    Kevin O’Connor

    Director of Threat Research at Adlumin

    Neil Clauson
    Neil Clauson

    Neil Clauson

    Director, Regional CISO at Mimecast

    Nick Rago
    Nick Rago

    Nick Rago

    Principal Security Engineer at Salt Security

    Rachel Ratchford
    Rachel Ratchford

    Rachel Ratchford

    Strategic Security Manager

    Collapse This Item

  • Lunch Break
  • Demo Session: Identity Drives User Experience and Security 12:05 pm

    Presented by ForgeRock

    Presenter:

    Keith Daly
    Keith Daly

    Keith Daly

    Senior Principal Sales Engineer

    Collapse This Item

  • Win The Cyberwar With Zero Trust 12:15 pm

    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • An Adversary-Focused Approach to Cybersecurity Defenses 1:15 pm

    Presented by eSentire

    Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.

    Click to Expand

    Speaker:

    Alex Boccio
    Alex Boccio

    Alex Boccio

    Alex Boccio at eSentire

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 1:35 pm

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    Robert Troup from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Robert Troup
    Robert Troup

    Robert Troup

    VP of East Coast Operations at baramundi

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 1:55 pm

    Moderator:

    Stefani Jones
    Stefani Jones

    Stefani Jones

    Associate at Good Harbor

    Panel Participants:

    Jeff Morrissette
    Jeff Morrissette

    Jeff Morrissette

    Technical Staff Assistant/Special Agent at USSS

    Darren McCormack
    Darren McCormack

    Darren McCormack

    Deputy Special Agent in Charge, Homeland Security Investigations (HSI) at Department of Homeland Security

    William McDermott
    William McDermott

    William McDermott

    Special Agent at FBI, Boston Field Office

    Collapse This Item

  • Cracking the Code of DevSecOps: Intelligent Orchestration + Code Dx 2:45 pm

    Presented by Synopsys

    Here at Synopsys, we believe application security should be invisible, completely abstracted, extensible to any AST tools. We built Intelligent Orchestration, a purpose-built, intelligent, cloud enabled CI/CD pipeline, inclusive of native world-class software security scanning, which enables DevOps teams to produce highly secure software faster. Intelligent Orchestration, offers a holistic, intelligent solution that combines people, process and technology pillars of DevSecOps.

    The excitement from the June 8th announcement of the Code Dx acquisition continues to grow. Code Dx is an award-winning application security risk management solution that automates and accelerates the discovery, prioritization, and remediation of software vulnerabilities.

    Intelligent Orchestration provides the ability to intelligently orchestrate security tests from our own tools, third-party tools, and open source tools. Code Dx has the ability to correlate and prioritize the findings from more than 75 testing solutions and manual testing activities. Code Dx provides a consolidated view of all these activities as well as insights into organizational risk.

    In this presentation, you’ll learn how Intelligent Orchestration and Code Dx solutions working hand in hand in a DevSecOps pipeline, help address the following application security testing challenges:
    1. A lack of automated, integrated security tools
    2. Inconsistent services approach
    3. Security testing slows processes down
    4. False Positives
    5. Developer resistance
    6. Compliance

    Click to Expand

    Speaker:

    Neil Pathare
    Neil Pathare

    Neil Pathare

    Security Evangelist at Synopsys

    Collapse This Item

  • Disrupting the Means To Prevent the End 3:05 pm

    Presented by Red Canary

    Join Red Canary Solutions Engineer, Ramelle Sarna, as she dives into changes, and trends in the threat landscape over the last year.

    Click to Expand

    Speaker:

    Ramelle Sarna
    Ramelle Sarna

    Ramelle Sarna

    Principal Solutions Engineer at Red Canary

    Collapse This Item

  • How to Build and Scale a Business Relevant Risk and Compliance Capability 3:25 pm

    This presentation will show business and IT leaders how to build and scale a fully integrated GRC program that drives financial value and operational efficiencies. Specifically, how to operationalize an integrated GRC program that is tied to business and operating risk and that scales to small and large enterprises through automation. Most importantly, this presentation will demonstrate how to capitalize on existing investments and capabilities to drive immediate benefits and how to scale from there.

    Click to Expand

    Speaker:

    Grace Beason
    Grace Beason

    Grace Beason

    Director of Governance, Risk and Compliance at Guidewire

    Collapse This Item

  • Solving the Human Element of SaaS Data Security 4:15 pm

    Presented by DoControl

    It is human nature to improve the way in which we all work together to achieve a common goal. Many Software as a Service (SaaS) applications (i.e. Google Drive, Slack, Box, etc.) that modern organizations are utilizing strive to achieve the same result. In order to drive business enablement, these business-critical applications are leveraged by many different identities such as employees, contractors, third-party vendors, and more. Unfortunately, it’s also human nature to make mistakes. Join this session to learn how to reduce the overall risk profile of your SaaS estate through the right people, process and technology.

    Click to Expand

    Speaker:

    Corey O’Connor
    Corey O’Connor

    Corey O’Connor

    Director of Products at Docontrol

    Collapse This Item

  • Email Security Reinvented - Securing Cloud Email and Collaboration 4:35 pm

    Presented by Avanan

    Harmony Email and Collaboration’s AI continues to reinvent successful email security, and remains the best in the industry. AI protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.

    Click to Expand

    Speaker:

    George Panagou
    George Panagou

    George Panagou

    Solutions Engineer at Check Point Software Technologies

    Collapse This Item

  • Will the Real Zero Trust Please Stand Up? 4:55 pm

    Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today.  It is a complex concept that unifies many different facets of cybersecurity.  Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures.  As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats.

    Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts.

    Click to Expand

    Panel Participants:

    Greg Shields
    Greg Shields

    Greg Shields

    Director, Zero Trust Cloud Strategy at Appgate

    Matt McGuirk
    Matt McGuirk

    Matt McGuirk

    Solution Architect, Office of the CTO at Source Defense

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Conference Closing Session 5:25 pm
  • Networking Reception and Happy Hour 5:30 pm
Partners Register