Registration

Thu. Jun 30

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: FREE

VIP Code applied!


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Summit will be open from 8:00 AM to 6:00 PM, Thursday, June 30th.

  • Welcome / Introductions
  • Stop The [Ransomware] Spread! 9:05 am

    Presented by Check Point Software Technologies

    “Stop The [Ransomware] Spread” focuses on the rise of Ransomware and multi-vector attacks and practical steps that can be taken to prevent them. Drawing from lessons learned from previous breaches, we will look at the role Segmentation plays in preventing the spread of Ransomware across an Enterprise. Factors like an increase in critical zero-day vulnerabilities, demand for Zero-Trust Architecture, and scrutiny of Cyber Insurance Carriers are bringing the need for proper, secure segmentation back to the forefront. This session offers practical advice on how to harden east / west security and increase security posture through segmentation with deep packet inspection.

    Click to Expand

    Speaker:

    Daniel Taney
    Daniel Taney

    Daniel Taney

    Regional Architect, US East; Evangelist - Office of the CTO

    Collapse This Item

  • The State of Secure Identity 9:25 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • The Reason Why Ransomware is Really HEATing Up 9:50 am

    Presented by Menlo Security

    When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

    Click to Expand

    Speaker:

    Eric Schwake
    Eric Schwake

    Eric Schwake

    Sr. Manager of Cybersecurity Strategy at Menlo Security

    Collapse This Item

  • Protecting Against Cyber Attacks 10:10 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Jon Reeve
    Jon Reeve

    Jon Reeve

    VP of Product Management at Spyderbat

    Tony Cole
    Tony Cole

    Tony Cole

    Chief Technology Officer at Attivo Networks

    Chris Riley
    Chris Riley

    Chris Riley

    CISO - Ntirety

    Eric Schwake
    Eric Schwake

    Eric Schwake

    Sr. Manager of Cybersecurity Strategy at Menlo Security

    Collapse This Item

  • The Growing Problem of Leaked Credentials - Facing up to Secrets Sprawl 10:50 am

    Presented by GitGuardian

    Secrets like API keys, certificates and credentials are sprawling through public spaces and in internal systems at an alarming rate. These secrets are the crown jewels of organizations providing access to critical infrastructure and systems. Secrets sprawl, as it is known, provides an opportunity for adversaries to break into our organization by using these unprotected secrets. In 2021 a research project from GitGuardian uncovered 6 million leaked secrets publicly on GitHub.com only. This presentation reviews that research and uses recent high profile breaches to show how adversaries find and exploit these secrets practically as well as how we can mitigate this risk.

    Click to Expand

    Speaker:

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Collapse This Item

  • Low Hanging Fruit – Improving AD Security for the Easy Win 11:10 am

    Presented by Attivo Networks

    Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.

    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Delivering Zero Trust at Scale (Twice): Lessons Learned 11:30 am

    Presented by Banyan Security

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 

     The audience will gain understanding in:

    • How to get started: Selling the strategy, people, process and technology
    • How to make real progress in months, not years.  Demonstrating continued business value
    • Real world examples. Highlighting improvements to user experience and security posture. 
    • Tips and tricks, lessons learned and what to avoid
    Click to Expand

    Speaker:

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Collapse This Item

  • Lunch Break
  • Human Security Engineering: Stop Relying on the Failed Human Firewall 12:15 pm

    While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc, are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. What this talk proposes is a comprehensive strategy to address the insider threat, whether it results from malicious or well meaning insiders.

    Click to Expand

    Speaker:

    Ira Winkler
    Ira Winkler

    Ira Winkler

    Chief Security Architect at Walmart

    Collapse This Item

  • Cyberattacks and Business: Bridging the Gap Through Zero Trust 1:20 pm

    Presented by Manage Engine

    As dependence on digital technologies continues to surge at a rapid rate, so does cybercrime. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever; swiftly adapting new technologies, tailoring their attacks using novel methods and cooperating closely with each other. Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats. In this webinar you will learn a few tips and tricks to safeguard your environment.

    Click to Expand

    Speaker:

    Harish Sekar
    Harish Sekar

    Harish Sekar

    Senior Technical Evangelist at ManageEngine

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 1:40 pm

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.

    Robert Troup from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Robert Troup
    Robert Troup

    Robert Troup

    VP of East Coast Operations at baramundi

    Collapse This Item

  • 2022 Trends & Directions 2:00 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.

    Click to Expand

    Panel Participants:

    Dalyn Ward
    Dalyn Ward

    Dalyn Ward

    Senior Director of Product Management at Cobalt

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Ziad Ghalleb
    Ziad Ghalleb

    Ziad Ghalleb

    Head of Product Success (Manager) at GitGuardian

    Jon Woodall
    Jon Woodall

    Jon Woodall

    Systems Engineer at Mimecast

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 2:40 pm

    Presented by Axis Security

    Organizations have been growing over years and decades, which directly results in more devices and complex networks. Migrating workloads to Cloud Platforms like AWS, Azure and GCP have resulted in amazing elasticity but have further complicated networking. In this talk, Zoltan will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Panel Participants:

    John Spiegel
    John Spiegel

    John Spiegel

    Director of Strategy at Axis Security

    Collapse This Item

  • Stopping Attacks, Not Your Business: AI & Autonomous Response 3:00 pm

    Presented by Darktrace

    With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Smita Nalluri, Cyber Security Team Leader, in this session where he/she explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.

    Click to Expand

    Speaker:

    Smita Nalluri
    Smita Nalluri

    Smita Nalluri

    Cyber Security Team Leader at Darktrace

    Collapse This Item

  • A Realistic Take on Zero Trust 3:20 pm

    Presented by Lookout

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Click to Expand

    Speaker:

    Hank Schless
    Hank Schless

    Hank Schless

    Senior Manager, Security Solutions at Lookout

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 3:55 pm

    Moderator:

    Stefani Jones
    Stefani Jones

    Stefani Jones

    Associate at Good Harbor

    Panel Participants:

    Jeff Morrissette
    Jeff Morrissette

    Jeff Morrissette

    Technical Staff Assistant/Special Agent at USSS

    Darren McCormack
    Darren McCormack

    Darren McCormack

    Assistant Special Agent in Charge, Homeland Security Investigations (HSI) at Department of Homeland Security

    William McDermott
    William McDermott

    William McDermott

    Special Agent at FBI, Boston Field Office

    Collapse This Item

  • Summit Closing Session 4:25 pm
Partners Register