Registration

Wed. Jun 01 — Thu. Jun 02

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $125.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open June 1st from 11:00 AM to 5PM and June 2nd from 8:30 AM to 3PM.

  • DAY ONE
  • Welcome / Introductions
  • Delivering Zero Trust at Scale (Twice): Lessons Learned 11:00 am
    Add to Calendar20220601 11:00 am20220601 11:20 amAmerica/New_YorkDelivering Zero Trust at Scale (Twice): Lessons Learned

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 

    The audience will gain understanding in:

    • How to get started: Selling the strategy, people, process and technology
    • How to make real progress in months, not years.  Demonstrating continued business value
    • Real world examples. Highlighting improvements to user experience and security posture. 
    • Tips and tricks, lessons learned and what to avoid
    102 North End Avenue
    New York, New York 10282

    Presented by Banyan Security

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 

    The audience will gain understanding in:

    • How to get started: Selling the strategy, people, process and technology
    • How to make real progress in months, not years.  Demonstrating continued business value
    • Real world examples. Highlighting improvements to user experience and security posture. 
    • Tips and tricks, lessons learned and what to avoid
    Click to Expand

    Speaker:

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Collapse This Item

  • The State of Secure Identity 11:20 am
    Add to Calendar20220601 11:20 am20220601 11:40 amAmerica/New_YorkThe State of Secure Identity

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    • Most highly targeted by credential stuffing attacks 
    • Most highly targeted by SQL injection attacks 
    • Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    102 North End Avenue
    New York, New York 10282

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    • Most highly targeted by credential stuffing attacks 
    • Most highly targeted by SQL injection attacks 
    • Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Protecting Against Cyber Attacks 11:40 am
    Add to Calendar20220601 11:40 am20220601 12:10 pmAmerica/New_YorkProtecting Against Cyber Attacks

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    102 North End Avenue
    New York, New York 10282

    .

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Jon Reeve
    Jon Reeve

    Jon Reeve

    VP of Product Management at Spyderbat

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Michael James
    Michael James

    Michael James

    Director of Cyber Intelligence and Analytics at QOMPLX

    Bob Reny
    Bob Reny

    Bob Reny

    CTO and Principal Engineer at Exabeam

    Collapse This Item

  • Lunch Break
  • Human Security Engineering: Stop relying on the failed Human Firewall 12:45 pm
    Add to Calendar20220601 12:45 pm20220601 1:30 pmAmerica/New_YorkHuman Security Engineering: Stop relying on the failed Human Firewall

    While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.

    I refer to the comprehensive strategy as Human Security Engineering (HSE) and it involves creating a model that looks similar to the MITRE ATT&CK framework. The strategy involves identifying how a user loss is enabled, how it is initiated, and how loss is ideally mitigated before it can be realized. Applying HSE, security professionals can look at the entire sequence of a potential loss and determine what and where are the most cost effective countermeasures to implement. Applying individual tactics has proved to be ineffective in stopping the problem on a large scale. At least one company has begun to implement HSE and has drastically cut phishing losses.

    Questions & Discussion Points 

    • What about those that tout the “human firewall” 
    • Are users really our best last line of defense? 
    • What is a practical way for implementing what you have described here? 
    102 North End Avenue
    New York, New York 10282

    .

    While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.

    I refer to the comprehensive strategy as Human Security Engineering (HSE) and it involves creating a model that looks similar to the MITRE ATT&CK framework. The strategy involves identifying how a user loss is enabled, how it is initiated, and how loss is ideally mitigated before it can be realized. Applying HSE, security professionals can look at the entire sequence of a potential loss and determine what and where are the most cost effective countermeasures to implement. Applying individual tactics has proved to be ineffective in stopping the problem on a large scale. At least one company has begun to implement HSE and has drastically cut phishing losses.

    Questions & Discussion Points 

    • What about those that tout the “human firewall” 
    • Are users really our best last line of defense? 
    • What is a practical way for implementing what you have described here? 
    Click to Expand

    Speaker:

    Ira Winkler
    Ira Winkler

    Ira Winkler

    Chief Security Architect at Walmart

    Collapse This Item

  • Managing the Insider Threat 1:50 pm
    Add to Calendar20220601 1:50 pm20220601 2:10 pmAmerica/New_YorkManaging the Insider Threat

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    102 North End Avenue
    New York, New York 10282

    .

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Collapse This Item

  • The Growing Problem of Leaked Credentials - Facing Up to Secrets Sprawl 2:10 pm
    Add to Calendar20220601 2:10 pm20220601 2:30 pmAmerica/New_YorkThe Growing Problem of Leaked Credentials - Facing Up to Secrets Sprawl

    Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.

    102 North End Avenue
    New York, New York 10282

    Presented by GitGuardian

    Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.

    Click to Expand

    Speaker:

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Collapse This Item

  • Low Hanging Fruit: Improve Ad Hygiene For the Easy Win 2:50 pm
    Add to Calendar20220601 2:50 pm20220601 3:10 pmAmerica/New_YorkLow Hanging Fruit: Improve Ad Hygiene For the Easy Win

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    102 North End Avenue
    New York, New York 10282

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Seize the Breach: Why Breaches Still Occur and How to Mitigate Them 3:10 pm
    Add to Calendar20220601 3:10 pm20220601 3:30 pmAmerica/New_YorkSeize the Breach: Why Breaches Still Occur and How to Mitigate Them

    Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on: 

    • Why breaches are usually occurring 
    • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage 
    • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations 

    Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.

    102 North End Avenue
    New York, New York 10282

    Presented by Exabeam

    Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020;that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on: 

    • Why breaches are usually occurring 
    • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage 
    • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations 

    Attendees will learn how machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.

    Click to Expand

    Speaker:

    Bob Reny
    Bob Reny

    Bob Reny

    CTO and Principal Engineer at Exabeam

    Collapse This Item

  • Disrupting the Means To Prevent the End
    Add to Calendar20220601 20220601 12:20 amAmerica/New_YorkDisrupting the Means To Prevent the End

    Senior Solutions Engineer, Marcel Mograbi discusses how the threat landscape has evolved over the last year, including prevalent trends, threats, and adversary techniques.

    102 North End Avenue
    New York, New York 10282

    Presented by Red Canary

    Senior Solutions Engineer, Marcel Mograbi discusses how the threat landscape has evolved over the last year, including prevalent trends, threats, and adversary techniques.

    Click to Expand

    Speakers:

    Marcel Mograbi
    Marcel Mograbi

    Marcel Mograbi

    Senior Solutions Engineer at Red Canary

    Collapse This Item

  • Cyber Executive Panel 4:10 pm
    Add to Calendar20220602 4:10 pm20220602 4:55 pmAmerica/New_YorkCyber Executive Panel

    Submit your bio for consideration to participate on our Cyber Executive Panel

    to [email protected] or fill out our Call for Speakers form here.

    102 North End Avenue
    New York, New York 10282

    .

    Submit your bio for consideration to participate on our Cyber Executive Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jim Ambrosini
    Jim Ambrosini

    Jim Ambrosini

    CISO and Cybersecurity Consultant

    Dimitri McKay
    Dimitri McKay

    Dimitri McKay

    Principal Security Strategist/CISO Advisor

    Collapse This Item

  • Day One Closing Session 4:55 pm
    Add to Calendar20220602 4:55 pm20220602 5:00 pmAmerica/New_YorkDay One Closing Session102 North End Avenue
    New York, New York 10282

    .

    Collapse This Item

  • Networking Reception and Happy Hour 5:00 pm
    Add to Calendar20220602 5:00 pm20220602 6:00 pmAmerica/New_YorkNetworking Reception and Happy Hour 102 North End Avenue
    New York, New York 10282

    .

    Collapse This Item

  • DAY TWO
  • Welcome / Introductions
  • Don’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era 9:00 am
    Add to Calendar20220602 9:00 am20220602 9:20 amAmerica/New_YorkDon’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era

    It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.

    102 North End Avenue
    New York, New York 10282

    Presented by Axis Security

    It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.

    Click to Expand

    Collapse This Item

  • Redefining the MSSP Relationship: Partner With A Co-Fiduciary 9:20 am
    Add to Calendar20220602 9:20 am20220602 9:40 amAmerica/New_YorkRedefining the MSSP Relationship: Partner With A Co-Fiduciary

    A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.

    102 North End Avenue
    New York, New York 10282

    Presented by SEI Sphere

    A Managed Security Service Provider (MSSP) has increasingly become the foundation of an organization’s security program; however, the traditional relationship may be based on simple alerts and reporting as opposed to providing security outcomes. While the concept of a fiduciary is understood in the finance industry, it has yet to gain traction in third-party relationships in the information security space. When organizations partner with an MSSP as a co-fiduciary, as opposed to ”yet-another-outsourced-service,” they can be empowered to strategically drive positive security outcomes. This session will revisit the traditional MSSP relationship, discuss various considerations, and provide thought-provoking questions to evaluate if your security program is built on a solid foundation.

    Click to Expand

    Speaker:

    Mike Lefebvre
    Mike Lefebvre

    Mike Lefebvre

    Cybersecurity Director at SEI Sphere

    Collapse This Item

  • 2022 Trends & Directions 9:40 am
    Add to Calendar20220602 9:40 am20220602 10:10 amAmerica/New_York2022 Trends & Directions

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    102 North End Avenue
    New York, New York 10282

    .

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    Click to Expand

    Panel Participants:

    Amit Bareket
    Amit Bareket

    Amit Bareket

    CEO & Co-Founder at Perimeter 81

    Matt McGuirk
    Matt McGuirk

    Matt McGuirk

    Solution Architect, Office of the CTO at Source Defense

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Collapse This Item

  • Cyberattacks and Business: Bridging the Gap Through Zero Trust 10:35 am
    Add to Calendar20220602 10:35 am20220602 10:55 amAmerica/New_YorkCyberattacks and Business: Bridging the Gap Through Zero Trust

    As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever;swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.

    102 North End Avenue
    New York, New York 10282

    Presented by ManageEngine

    As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever;swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.

    Click to Expand

    Speaker:

    Harish Sekar
    Harish Sekar

    Harish Sekar

    Senior Technical Evangelist at ManageEngine

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 10:55 am
    Add to Calendar20220602 10:55 am20220602 11:15 amAmerica/New_YorkStopping Ransomware with Autonomous Response

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. 

    Join SME, Darktrace’s TITLE, as he/she/they unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks. 

    This presentation will discuss: 

    • Recent ransomware threat trends, including double extortion and RDP attacks 
    • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office 
    • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
    102 North End Avenue
    New York, New York 10282

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. 

    Join SME, Darktrace’s TITLE, as he/she/they unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks. 

    This presentation will discuss: 

    • Recent ransomware threat trends, including double extortion and RDP attacks 
    • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office 
    • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
    Click to Expand

    Collapse This Item

  • Ransomware Prevention (or the Closest You Can Come to It): Pre-Attack Practices 11:15 am
    Add to Calendar20220602 11:15 am20220602 11:45 amAmerica/New_YorkRansomware Prevention (or the Closest You Can Come to It): Pre-Attack Practices

    So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.

    102 North End Avenue
    New York, New York 10282

    .

    So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.

    Click to Expand

    Panel Participants:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Tim Evans
    Tim Evans

    Tim Evans

    Cofounder and SVP, Chief of Strategy at Adlumin

    Russ Harnish
    Russ Harnish

    Russ Harnish

    Senior Security Consultant at Critical Start

    Kin Wai Chau
    Kin Wai Chau

    Kin Wai Chau

    Senior Security Strategist at Mimecast

    Collapse This Item

  • Lunch Break
  • Guest Keynote Presentation 12:20 pm
    Add to Calendar20220602 12:20 pm20220602 1:05 pmAmerica/New_YorkGuest Keynote Presentation102 North End Avenue
    New York, New York 10282

    .

    Collapse This Item

  • The Cybersecurity Skills Shortage 1:20 pm
    Add to Calendar20220602 1:20 pm20220602 1:40 pmAmerica/New_YorkThe Cybersecurity Skills Shortage

    There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity. 

    This session will explore the issues around cybersecurity jobs.  Breaking into the field, the relative need for certifications, formal education, on-the-job training and more.  The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.

    102 North End Avenue
    New York, New York 10282

    .

    There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity. 

    This session will explore the issues around cybersecurity jobs.  Breaking into the field, the relative need for certifications, formal education, on-the-job training and more.  The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.

    Click to Expand

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 1:40 pm
    Add to Calendar20220602 1:40 pm20220602 2:00 pmAmerica/New_YorkLeveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    102 North End Avenue
    New York, New York 10282

    .

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Robert Kraczek
    Robert Kraczek

    Robert Kraczek

    Global Identity and Access Management Strategist at One Identity

    Collapse This Item

  • Inter-Agency Collaboration Panel 2:20 pm
    Add to Calendar20220602 2:20 pm20220602 3:05 pmAmerica/New_York Inter-Agency Collaboration Panel102 North End Avenue
    New York, New York 10282

    .

    Panel Participants:

    Darren McCormack
    Darren McCormack

    Darren McCormack

    Assistant Special Agent in Charge, Homeland Security Investigations (HSI) at Department of Homeland Security

    David Schwartz
    David Schwartz

    David Schwartz

    US Postal Inspection Service

    Kevin McCleary
    Kevin McCleary

    Kevin McCleary

    Assistant Special Agent in Charge at Department of Homeland Security

    Collapse This Item

  • Conference Closing Session 3:05 pm
    Add to Calendar20220602 3:05 pm20220602 3:15 pmAmerica/New_YorkConference Closing Session102 North End Avenue
    New York, New York 10282

    .

    Collapse This Item

Partners Register