
Conference
New York City
Cybersecurity Conference
Connect with your peers and industry experts at the NYC Cybersecurity Conference for live, in-person sessions on topics ranging from cloud security, to protecting your organization from advanced threat actors. These engaging sessions will help you better navigate each new cyber threat that emerges.
At the NYC Cybersecurity Conference, you’ll hear insightful keynotes on vital security topics to help learn the skills needed to stay ahead of cyber threats, while having the opportunity to network with fellow cybersecurity professionals.
Book your room at the Conrad NY Downtown here!
Date
Wed. Jun 01 — Thu. Jun 02
Location
102 North End Avenue
New York, New York 10282
212-945-0100
Registration
Wed. Jun 01 — Thu. Jun 02
Registration for qualified senior cybersecurity professionals. Subject to approval.
-
Featured Speakers
Ira Winkler
Human Security Engineering: Stop relying on the failed Human Firewall
Jim AmbrosiniCyber Executive Panel
Dimitri McKayCyber Executive Panel
Darren McCormackInter-Agency Collaboration Panel
David SchwartzInter-Agency Collaboration Panel
Kevin McClearyInter-Agency Collaboration Panel
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open June 1st from 11:00 AM to 5PM and June 2nd from 8:30 AM to 3PM.
- DAY ONE
- Welcome / Introductions
-
Delivering Zero Trust at Scale (Twice): Lessons Learned 11:00 am
Add to Calendar20220601 11:00 am20220601 11:20 amAmerica/New_YorkDelivering Zero Trust at Scale (Twice): Lessons Learned
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
The audience will gain understanding in:
- How to get started: Selling the strategy, people, process and technology
- How to make real progress in months, not years. Demonstrating continued business value
- Real world examples. Highlighting improvements to user experience and security posture.
- Tips and tricks, lessons learned and what to avoid
New York, New York 10282As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
The audience will gain understanding in:
- How to get started: Selling the strategy, people, process and technology
- How to make real progress in months, not years. Demonstrating continued business value
- Real world examples. Highlighting improvements to user experience and security posture.
- Tips and tricks, lessons learned and what to avoid
Speaker:
-
The State of Secure Identity 11:20 am
Add to Calendar20220601 11:20 am20220601 11:40 amAmerica/New_YorkThe State of Secure Identity
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
- Most highly targeted by credential stuffing attacks
- Most highly targeted by SQL injection attacks
- Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
102 North End Avenue
New York, New York 10282Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
- Most highly targeted by credential stuffing attacks
- Most highly targeted by SQL injection attacks
- Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
Protecting Against Cyber Attacks 11:40 am
Add to Calendar20220601 11:40 am20220601 12:10 pmAmerica/New_YorkProtecting Against Cyber Attacks
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
102 North End Avenue
New York, New York 10282.
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
- Lunch Break
-
Human Security Engineering: Stop relying on the failed Human Firewall 12:45 pm
Add to Calendar20220601 12:45 pm20220601 1:30 pmAmerica/New_YorkHuman Security Engineering: Stop relying on the failed Human Firewall
While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.
I refer to the comprehensive strategy as Human Security Engineering (HSE) and it involves creating a model that looks similar to the MITRE ATT&CK framework. The strategy involves identifying how a user loss is enabled, how it is initiated, and how loss is ideally mitigated before it can be realized. Applying HSE, security professionals can look at the entire sequence of a potential loss and determine what and where are the most cost effective countermeasures to implement. Applying individual tactics has proved to be ineffective in stopping the problem on a large scale. At least one company has begun to implement HSE and has drastically cut phishing losses.
Questions & Discussion Points
- What about those that tout the “human firewall”
- Are users really our best last line of defense?
- What is a practical way for implementing what you have described here?
New York, New York 10282.
While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.
I refer to the comprehensive strategy as Human Security Engineering (HSE) and it involves creating a model that looks similar to the MITRE ATT&CK framework. The strategy involves identifying how a user loss is enabled, how it is initiated, and how loss is ideally mitigated before it can be realized. Applying HSE, security professionals can look at the entire sequence of a potential loss and determine what and where are the most cost effective countermeasures to implement. Applying individual tactics has proved to be ineffective in stopping the problem on a large scale. At least one company has begun to implement HSE and has drastically cut phishing losses.
Questions & Discussion Points
- What about those that tout the “human firewall”
- Are users really our best last line of defense?
- What is a practical way for implementing what you have described here?
Speaker:
-
Managing the Insider Threat 1:50 pm
Add to Calendar20220601 1:50 pm20220601 2:10 pmAmerica/New_YorkManaging the Insider Threat
An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers. Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.
There are key players in positions to either effectively support or undermine the insider threats. Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.
102 North End Avenue
New York, New York 10282.
An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers. Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.
There are key players in positions to either effectively support or undermine the insider threats. Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.
-
The Growing Problem of Leaked Credentials - Facing Up to Secrets Sprawl 2:10 pm
Add to Calendar20220601 2:10 pm20220601 2:30 pmAmerica/New_YorkThe Growing Problem of Leaked Credentials - Facing Up to Secrets Sprawl
Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.
102 North End Avenue
New York, New York 10282Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.
Speaker:
-
Low Hanging Fruit: Improve Ad Hygiene For the Easy Win 2:50 pm
Add to Calendar20220601 2:50 pm20220601 3:10 pmAmerica/New_YorkLow Hanging Fruit: Improve Ad Hygiene For the Easy Win
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
102 North End Avenue
New York, New York 10282We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Speaker:
-
Seize the Breach: Why Breaches Still Occur and How to Mitigate Them 3:10 pm
Add to Calendar20220601 3:10 pm20220601 3:30 pmAmerica/New_YorkSeize the Breach: Why Breaches Still Occur and How to Mitigate Them
Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:
- Why breaches are usually occurring
- How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
- A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
102 North End Avenue
New York, New York 10282Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:
- Why breaches are usually occurring
- How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
- A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
Speaker:
-
Disrupting the Means To Prevent the End
Add to Calendar20220601 20220601 12:20 amAmerica/New_YorkDisrupting the Means To Prevent the End
Senior Solutions Engineer, Marcel Mograbi discusses how the threat landscape has evolved over the last year, including prevalent trends, threats, and adversary techniques.
102 North End Avenue
New York, New York 10282Senior Solutions Engineer, Marcel Mograbi discusses how the threat landscape has evolved over the last year, including prevalent trends, threats, and adversary techniques.
Speakers:
-
Cyber Executive Panel 4:10 pm
Add to Calendar20220602 4:10 pm20220602 4:55 pmAmerica/New_YorkCyber Executive Panel
Submit your bio for consideration to participate on our Cyber Executive Panel
to [email protected] or fill out our Call for Speakers form here.
102 North End Avenue
New York, New York 10282.
Submit your bio for consideration to participate on our Cyber Executive Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Day One Closing Session 4:55 pm
Add to Calendar20220602 4:55 pm20220602 5:00 pmAmerica/New_YorkDay One Closing Session102 North End Avenue
New York, New York 10282.
-
Networking Reception and Happy Hour 5:00 pm
Add to Calendar20220602 5:00 pm20220602 6:00 pmAmerica/New_YorkNetworking Reception and Happy Hour 102 North End Avenue
New York, New York 10282.
- DAY TWO
- Welcome / Introductions
-
Don’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era 9:00 am
Add to Calendar20220602 9:00 am20220602 9:20 amAmerica/New_YorkDon’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era
It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.
102 North End Avenue
New York, New York 10282It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.
-
Redefining the MSSP Relationship: Partner With A Co-Fiduciary 9:20 am
Add to Calendar20220602 9:20 am20220602 9:40 amAmerica/New_YorkRedefining the MSSP Relationship: Partner With A Co-Fiduciary
A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.
102 North End Avenue
New York, New York 10282A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.
Speaker:
-
2022 Trends & Directions 9:40 am
Add to Calendar20220602 9:40 am20220602 10:10 amAmerica/New_York2022 Trends & Directions
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
102 North End Avenue
New York, New York 10282.
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Cyberattacks and Business: Bridging the Gap Through Zero Trust 10:35 am
Add to Calendar20220602 10:35 am20220602 10:55 amAmerica/New_YorkCyberattacks and Business: Bridging the Gap Through Zero Trust
As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever;swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.
102 North End Avenue
New York, New York 10282As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever;swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.
Speaker:
-
Stopping Ransomware with Autonomous Response 10:55 am
Add to Calendar20220602 10:55 am20220602 11:15 amAmerica/New_YorkStopping Ransomware with Autonomous Response
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join SME, Darktrace’s TITLE, as he/she/they unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
New York, New York 10282New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join SME, Darktrace’s TITLE, as he/she/they unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
-
Ransomware Prevention (or the Closest You Can Come to It): Pre-Attack Practices 11:15 am
Add to Calendar20220602 11:15 am20220602 11:45 amAmerica/New_YorkRansomware Prevention (or the Closest You Can Come to It): Pre-Attack Practices
So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.
102 North End Avenue
New York, New York 10282.
So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.
Panel Participants:
- Lunch Break
-
Guest Keynote Presentation 12:20 pm
Add to Calendar20220602 12:20 pm20220602 1:05 pmAmerica/New_YorkGuest Keynote Presentation102 North End Avenue
New York, New York 10282.
-
The Cybersecurity Skills Shortage 1:20 pm
Add to Calendar20220602 1:20 pm20220602 1:40 pmAmerica/New_YorkThe Cybersecurity Skills Shortage
There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.
This session will explore the issues around cybersecurity jobs. Breaking into the field, the relative need for certifications, formal education, on-the-job training and more. The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.
102 North End Avenue
New York, New York 10282.
There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.
This session will explore the issues around cybersecurity jobs. Breaking into the field, the relative need for certifications, formal education, on-the-job training and more. The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.
-
Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 1:40 pm
Add to Calendar20220602 1:40 pm20220602 2:00 pmAmerica/New_YorkLeveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework
Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.
102 North End Avenue
New York, New York 10282.
Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.
Speaker:
-
Inter-Agency Collaboration Panel 2:20 pm
Add to Calendar20220602 2:20 pm20220602 3:05 pmAmerica/New_York Inter-Agency Collaboration Panel102 North End Avenue
New York, New York 10282.
Panel Participants:
-
Conference Closing Session 3:05 pm
Add to Calendar20220602 3:05 pm20220602 3:15 pmAmerica/New_YorkConference Closing Session102 North End Avenue
New York, New York 10282.
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners