• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Conference will be open from 8:30 AM to 5:00 PM, March 24th.

  • Welcome / Introductions
  • Special Welcome from SAIC Hudson and ASAIC Krout- US Secret Service 9:05 am

    Speakers:

    Todd Hudson
    Todd Hudson

    Todd Hudson

    Special Agent in Charge, US Secret Service - Nashville Field Office

    Jason Krout
    Jason Krout

    Jason Krout

    ASAIC, USSS - Nashville Field Office

    Collapse This Item

  • US Secret Service CFTF Update on Blockchain Analysis 9:15 am

    Charged with protecting the nation’s financial infrastructure, the US Secret Service is paying careful attention to cryptocurrency.  Cyber Fraud Task Forces (CFTFs), the focal point of cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. Strategically located CFTFs, like the one centered in the US Secret Service Nashville Field Office,  combat cybercrime through prevention, detection, mitigation, and investigation.

    In this session, Technical Staff Assistant Matthew Stephenson will provide a CFTF update on recent investigations in the region. He will discuss hashing technology, transactional details, open-source vs. automated tools, search parameters, Bitcoin mixers, tracing, and more.

    Click to Expand

    Panel Participants:

    Matt Stephenson
    Matt Stephenson

    Matt Stephenson

    Technical Staff Assistant - Electronic Crimes Special Agent Program United States Secret Service, Nashville Field Office

    Collapse This Item

  • The State of Secure Identity 9:40 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

    During this session, we’ll provide greater insight into which industries are: 

    – Most highly targeted by credential stuffing attacks 

    – Most highly targeted by SQL injection attacks 

    – Leading the way in MFA adoption to improve overall security posture 

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Why SOCs Fail - The Maturity Model Required for Cyber Resilience 10:05 am

    Presented by Exabeam

    Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

    Key Learnings:

    • Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
    • How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
    • Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
    Click to Expand

    Speaker:

    Scott Gillis
    Scott Gillis

    Scott Gillis

    Director at Exabeam

    Collapse This Item

  • AI/ML and Other Leading-Edge Innovations in Cybersecurity 10:30 am

    We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?

    Click to Expand

    Panel Participants:

    Tim Evans
    Tim Evans

    Tim Evans

    Cofounder and SVP, Chief of Strategy at Adlumin

    Scott Gillis
    Scott Gillis

    Scott Gillis

    Director at Exabeam

    Adam Fisher
    Adam Fisher

    Adam Fisher

    Principal Security Engineer at Salt Security

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Secure Your Last Line of Defense 11:15 am

    Presented by Arcserve

    Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

    Click to Expand

    Panel Participants:

    Stacey Budd
    Stacey Budd

    Stacey Budd

    Principal Solution Consultant at Arcserve

    Collapse This Item

  • 2022 Threat Review: Cyberprotection Starts With Understanding the Latest Attacks, Cybercrimes, and Privacy Breaches 11:40 am

    Presented by Malwarebytes

    The Malwarebytes 2022 Threat Review is an annual report highlighting internal threat research findings and trends. The report highlights top threats across operating systems, how privacy has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving readers the tools to make informed cyber protection decisions.

    Click to Expand

    Speaker:

    Jarryd Boyd
    Jarryd Boyd

    Jarryd Boyd

    Director, Solutions Engineering at Malwarebytes

    Collapse This Item

  • Special Welcome - FBI Asst Special Agent in Charge, Memphis Field Office 12:00 pm

    In this short introduction, Asst. S.A.C. McCloskey will give an interview of how the FBI works cybercrime investigations.  He will discuss some of the trends, why cybersecurity leaders presented with a situation should bring in the FBI early, and give an understanding of some of the breadth and depth of help the Bureau can provide and the global reach it offers.  

    His talk will include some of the regional trends his office has seen (the Nashville Resident Office is a part of the larger Memphis Field Office), recent cases and investigations, and things that local cyber executives should know that could help them in cyber threat situations. 

    Click to Expand

    Speaker:

    Bryan McCloskey
    Bryan McCloskey

    Bryan McCloskey

    Assistant Special Agent in Charge, FBI - Memphis Field Office

    Collapse This Item

  • Lunch Break
  • Keynote Fireside Chat: John Kindervag 12:45 pm

    After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.

    John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity. 

    In this Keynote Fireside Chat, John will talk about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape. 

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 1:35 pm

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. 

    Join Mitch Bowman, Cyber Security Director, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks. 

    This presentation will discuss: 

    -Recent ransomware threat trends, including double extortion and RDP attacks 

    -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office 

    -Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day

    Click to Expand

    Speaker:

    Mitch Bowman
    Mitch Bowman

    Mitch Bowman

    Cyber Security Director at Darktrace

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 2:15 pm

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    David Sterz
    David Sterz

    David Sterz

    Principal Consultant at Baramundi

    Collapse This Item

  • An Adversary-Focused Approach to Cybersecurity Defenses 2:40 pm

    Presented by eSentire

    Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.

    Click to Expand

    Speaker:

    Alex Boccio
    Alex Boccio

    Alex Boccio

    Alex Boccio at eSentire

    Collapse This Item

  • Recover from Ransomware: Coming Back After an Attack 3:05 pm

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Panel Participants:

    Brian Freedman
    Brian Freedman

    Brian Freedman

    Director, Global Engineering at QOMPLX

    Julian Wayte
    Julian Wayte

    Julian Wayte

    Director, Solution Engineering at Uptycs

    Jerry Gamblin
    Jerry Gamblin

    Jerry Gamblin

    Director Of Security Research at CISCO

    Collapse This Item

  • Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 3:50 pm

    Presented by Uptycs

    The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Julian Wayte, Director of Solutions Engineering, will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments.

    Click to Expand

    Speaker:

    Julian Wayte
    Julian Wayte

    Julian Wayte

    Director, Solution Engineering at Uptycs

    Collapse This Item

  • Managing Cloud Risk Without Slowing App Delivery 4:15 pm

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. 

    Learn how the largest financial services, media, and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Suresh Vasudevan, Sysdig CEO, will share our customer’s best practices for securing containers, Kubernetes, and cloud services.

    Click to Expand

    Speaker:

    Bryan Favara
    Bryan Favara

    Bryan Favara

    Principal Solutions Architect at Sysdig

    Collapse This Item

  • US Secret Service Cyber Fraud Task Force - An Updated Overview 4:35 pm

    The United States Secret Service maintains an integrated mission of protection and financial investigations.  The integrated mission includes forensic expertise in an effort to support the investigative and protective missions, missing and exploited children investigations and other major crimes investigated by our law enforcement partners.  

    In this session, ATSAIC Fisher will go over the evolution of electronic crimes and fraud investigation over the past several years. He will discuss the present strategy, recent local enforcements in the region, and how members in the audience can get involved with the Nashville CFTF.  

    Click to Expand

    Panel Participants:

    Joshua Fisher
    Joshua Fisher

    Joshua Fisher

    Assistant to the Special Agent in Charge at US Secret Service

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 5:00 pm

    This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime.  In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region.  They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.

    This Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.

    Click to Expand

    Panel Participants:

    Kevin M. Varpness
    Kevin M. Varpness

    Kevin M. Varpness

    Supervisory Special Agent for the Cyber and Counterintelligence Squad at Infragard MO (FBI partner)

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Jason Krout
    Jason Krout

    Jason Krout

    ASAIC, USSS - Nashville Field Office

    Cesar Salazar
    Cesar Salazar

    Cesar Salazar

    Special Agent in Charge at State of Tennessee

    Collapse This Item

  • Conference Closing Session 5:30 pm
  • Networking Reception and Happy Hour 5:45 pm
Partners Register