
Virtual Summit
NorthEast
Virtual Cybersecurity Summit
Join the NorthEast Virtual Cybersecurity Summit to hear from some of the industry’s leading experts from across the country, with a particular focus on the Northeastern region. In this immersive, virtual environment, you will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.
The live, interactive environment of the NothEast Virtual Cybersecurity Summit will allow you to interact with representatives from some of the world’s top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.
Take a look at all Data Connectors has to offer here!
Date
Thu. Jun 30
-
Featured Speakers
Jon Reeve
Protecting Against Cyber Attacks
Tony ColeProtecting Against Cyber Attacks
Chris RileyProtecting Against Cyber Attacks
Eric SchwakeProtecting Against Cyber Attacks
Ira WinklerHuman Security Engineering: Stop Relying on the Failed Human Firewall
Stefani JonesCyber Inter-Agency Cooperation Panel
Jeff MorrissetteCyber Inter-Agency Cooperation Panel
Darren McCormackCyber Inter-Agency Cooperation Panel
William McDermottCyber Inter-Agency Cooperation Panel
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Summit will be open from 8:00 AM to 6:00 PM, Thursday, June 30th.
- Welcome / Introductions
-
Stop The [Ransomware] Spread! 9:05 am
Presented by Check Point Software Technologies
“Stop The [Ransomware] Spread” focuses on the rise of Ransomware and multi-vector attacks and practical steps that can be taken to prevent them. Drawing from lessons learned from previous breaches, we will look at the role Segmentation plays in preventing the spread of Ransomware across an Enterprise. Factors like an increase in critical zero-day vulnerabilities, demand for Zero-Trust Architecture, and scrutiny of Cyber Insurance Carriers are bringing the need for proper, secure segmentation back to the forefront. This session offers practical advice on how to harden east / west security and increase security posture through segmentation with deep packet inspection.
Speaker:
-
The State of Secure Identity 9:25 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
The Reason Why Ransomware is Really HEATing Up 9:50 am
When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.
Speaker:
-
Protecting Against Cyber Attacks 10:10 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
The Growing Problem of Leaked Credentials - Facing up to Secrets Sprawl 10:50 am
Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.
Speaker:
-
Low Hanging Fruit – Improving AD Security for the Easy Win 11:10 am
Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.
Speaker:
-
Delivering Zero Trust at Scale (Twice): Lessons Learned 11:30 am
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
The audience will gain understanding in:
- How to get started: Selling the strategy, people, process and technology
- How to make real progress in months, not years. Demonstrating continued business value
- Real world examples. Highlighting improvements to user experience and security posture.
- Tips and tricks, lessons learned and what to avoid
Speaker:
- Lunch Break
-
Human Security Engineering: Stop Relying on the Failed Human Firewall 12:15 pm
While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.
Speaker:
-
Cyberattacks and Business: Bridging the Gap Through Zero Trust 1:20 pm
As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever; swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 1:40 pm
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
Robert Troup from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
-
2022 Trends & Directions 2:00 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
The Journey to Security Service Edge: The Killer Feature is Simplicity 2:40 pm
Organizations have been growing over years and decades, which directly results in more devices and complex networks. Migrating workloads to Cloud Platforms like AWS, Azure and GCP have resulted in amazing elasticity but have further complicated networking. In this talk, Zoltan will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.
Panel Participants:
-
Stopping Attacks, Not Your Business: AI & Autonomous Response 3:00 pm
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Smita Nalluri, Cyber Security Team Leader, in this session where he/she explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Speaker:
-
A Realistic Take on Zero Trust 3:20 pm
Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.
Speaker:
-
Cyber Inter-Agency Cooperation Panel 3:55 pm
Moderator:
Panel Participants:
- Summit Closing Session 4:25 pm