Registration

Wed. Jun 01 — Thu. Jun 02

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $200.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open June 1st from 10:00 AM to 6:00 PM and June 2nd from 8:00 AM to 3:15 PM.

  • DAY ONE
  • Welcome / Introductions
  • Delivering Zero Trust at Scale (Twice): Lessons Learned 11:00 am

    Presented by Banyan Security

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 

    The audience will gain understanding in:

    • How to get started: Selling the strategy, people, process and technology
    • How to make real progress in months, not years.  Demonstrating continued business value
    • Real world examples. Highlighting improvements to user experience and security posture. 
    • Tips and tricks, lessons learned and what to avoid
    Click to Expand

    Speaker:

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Collapse This Item

  • The State of Secure Identity 11:20 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    • Most highly targeted by credential stuffing attacks 
    • Most highly targeted by SQL injection attacks 
    • Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Protecting Against Cyber Attacks 11:40 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Jon Reeve
    Jon Reeve

    Jon Reeve

    VP of Product Management at Spyderbat

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Michael James
    Michael James

    Michael James

    Director of Cyber Intelligence and Analytics at QOMPLX

    Bob Reny
    Bob Reny

    Bob Reny

    CTO and Principal Engineer at Exabeam

    Collapse This Item

  • Lunch Break
  • Human Security Engineering: Stop Relying on the Failed Human Firewall 12:45 pm

    While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.

    I refer to the comprehensive strategy as Human Security Engineering (HSE) and it involves creating a model that looks similar to the MITRE ATT&CK framework. The strategy involves identifying how a user loss is enabled, how it is initiated, and how loss is ideally mitigated before it can be realized. Applying HSE, security professionals can look at the entire sequence of a potential loss and determine what and where are the most cost effective countermeasures to implement. Applying individual tactics has proved to be ineffective in stopping the problem on a large scale. At least one company has begun to implement HSE and has drastically cut phishing losses.

    Questions & Discussion Points 

    • What about those that tout the “human firewall” 
    • Are users really our best last line of defense? 
    • What is a practical way for implementing what you have described here? 
    Click to Expand

    Speaker:

    Ira Winkler
    Ira Winkler

    Ira Winkler

    Chief Security Architect at Walmart

    Collapse This Item

  • Email Security Reinvented - Securing Cloud Email and Collaboration 1:50 pm

    Presented by Check Point Software Technologies

    Harmony Email and Collaboration’s AI continues to reinvent successful email security and remains the best in the industry. Its products cover cloud email and collaboration suites from cyber attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.

    Click to Expand

    Speaker:

    Paul Welford
    Paul Welford

    Paul Welford

    Security Engineer at Check Point Software Technologies

    Collapse This Item

  • The Growing Problem of Leaked Credentials - Facing Up to Secrets Sprawl 2:10 pm

    Presented by GitGuardian

    Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.

    Click to Expand

    Speaker:

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Collapse This Item

  • Low Hanging Fruit: Improve Ad Hygiene For the Easy Win 2:50 pm

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Seize the Breach: Why Breaches Still Occur and How to Mitigate Them 3:10 pm

    Presented by Exabeam

    Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on: 

    • Why breaches are usually occurring 
    • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage 
    • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations 

    Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.

    Click to Expand

    Speaker:

    Bob Reny
    Bob Reny

    Bob Reny

    CTO and Principal Engineer at Exabeam

    Collapse This Item

  • Disrupting the Means To Prevent the End 3:50 pm

    Presented by Red Canary

    Senior Solutions Engineer, Marcel Mograbi discusses how the threat landscape has evolved over the last year, including prevalent trends, threats, and adversary techniques.

    Click to Expand

    Speakers:

    Marcel Mograbi
    Marcel Mograbi

    Marcel Mograbi

    Senior Solutions Engineer at Red Canary

    Collapse This Item

  • Cyber Executive Panel 4:10 pm

    Submit your bio for consideration to participate on our Cyber Executive Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Jim Ambrosini
    Jim Ambrosini

    Jim Ambrosini

    CISO and Cybersecurity Consultant

    Panel Participants:

    Dimitri McKay
    Dimitri McKay

    Dimitri McKay

    Principal Security Strategist/CISO Advisor

    Ira Winkler
    Ira Winkler

    Ira Winkler

    Chief Security Architect at Walmart

    Farid Abdelkader
    Farid Abdelkader

    Farid Abdelkader

    Managing Director, Technology Audit and Risk Services at Protiviti

    Jim Ambrosini
    Jim Ambrosini

    Jim Ambrosini

    CISO and Cybersecurity Consultant

    Collapse This Item

  • Day One Closing Session 4:55 pm
  • Networking Reception and Happy Hour 5:00 pm
  • DAY TWO
  • Welcome / Introductions
  • Redefining the MSSP Relationship: Partner With A Co-Fiduciary 10:00 am

    Presented by SEI Sphere

    A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.

    Click to Expand

    Speaker:

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Collapse This Item

  • Cyberattacks and Business: Bridging the Gap Through Zero Trust 10:20 am

    Presented by ManageEngine

    As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever;swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.

    Click to Expand

    Speaker:

    Harish Sekar
    Harish Sekar

    Harish Sekar

    Senior Technical Evangelist at ManageEngine

    Collapse This Item

  • 2022 Trends & Directions 10:40 am

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    Click to Expand

    Panel Participants:

    Amit Bareket
    Amit Bareket

    Amit Bareket

    CEO & Co-Founder at Perimeter 81

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Christopher Fielder
    Christopher Fielder

    Christopher Fielder

    Field CTO at Arctic Wolf Networks

    Randy Paszek
    Randy Paszek

    Randy Paszek

    Senior Researcher at Source Defense

    Collapse This Item

  • Stopping Attacks, Not Your Business: AI & Autonomous Response 11:35 am

    Presented by Darktrace

    Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds. 

    Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously –– where humans can no longer react fast enough.

    Click to Expand

    Speaker:

    Neil Martin
    Neil Martin

    Neil Martin

    Cyber Security Executive at Darktrace

    Collapse This Item

  • Ransomware Prevention (or the Closest You Can Come to It): Pre-Attack Practices 11:55 am

    So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.

    Click to Expand

    Panel Participants:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Tim Evans
    Tim Evans

    Tim Evans

    Cofounder and SVP, Chief of Strategy at Adlumin

    Kin Wai Chau
    Kin Wai Chau

    Kin Wai Chau

    Senior Security Strategist at Mimecast

    Alex Humphrey
    Alex Humphrey

    Alex Humphrey

    Senior Security Consultant at Critical Start

    Rich Rosa
    Rich Rosa

    Rich Rosa

    Regional Director at SentinelOne

    Collapse This Item

  • Lunch Break
  • Protest-ware and The Risks to Open Source 1:00 pm

    The recent events in Ukraine drew a lot of attention to the risks of using open-source software and the beginning of a new trend called Protest ware. With over 80% of the applications of the world using open-source software, the associated risk can be benign or pose a seriously higher risk. We will discuss how hackers use SBOMs (software bill of materials) against us with the intended outcome of impacting the software supply chain.

    Click to Expand

    Speaker:

    Thomas Ryan
    Thomas Ryan

    Thomas Ryan

    Founder at Asymmetric Response

    Collapse This Item

  • Protect Your Organization’s Most Sensitive Data: Using Modern Security Practices for Databases 2:00 pm

    Presented by Cyral

    For most organizations, data repositories hold our most sensitive information. When the Internet first became accessible to businesses, security threats and our attack surface increased dramatically, but teams learned to protect sensitive business assets with network segregation, firewalls, and VPNs.

    These days companies are mostly cloud native and older companies are moving to the cloud at a rapid rate. With this shift to the cloud, traditional roles like IT are often being deprioritized in favor of DevOps and SRE teams taking on a broader scope, including traditional networking and DBA duties. Once again the threat landscape and attack surface are changing and a new approach using modern security patterns is required for databases.

    In this session we’ll address how organizations can safely democratize access to your data repositories, while implementing modern security controls such as single sign on and multifactor authentication. We’ll also discuss ensuring sufficient artifacts are being collected to help deal with, inevitable, unauthorized data access and usage issues in the future.

    Key Takeaways:
    – Strategies your teams can use to reduce risk to your organization’s most sensitive data
    – How to gain consistent security across all data repositories, including on-prem and in the cloud

    Click to Expand

    Panel Participants:

    Srinivas Vadlamani
    Srinivas Vadlamani

    Srinivas Vadlamani

    CTO and Cofounder at Cyral

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 2:20 pm

    Presented by One Identity

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Robert Kraczek
    Robert Kraczek

    Robert Kraczek

    Global Identity and Access Management Strategist at One Identity

    Collapse This Item

  • Inter-Agency Collaboration Panel 2:40 pm

    Panel Participants:

    David Schwartz
    David Schwartz

    David Schwartz

    US Postal Inspection Service

    Kevin McCleary
    Kevin McCleary

    Kevin McCleary

    Assistant Special Agent in Charge at Department of Homeland Security

    Rich Richard
    Rich Richard

    Rich Richard

    Chief of Cybersecurity at Department of Homeland Security

    Darren McCormack
    Darren McCormack

    Darren McCormack

    Assistant Special Agent in Charge, Homeland Security Investigations (HSI) at Department of Homeland Security

    Collapse This Item

  • Conference Closing Session 3:25 pm
Partners Register