
Conference
Nashville 2022
Cybersecurity Conference
Life here in Music City might sound sweet, but without a good cybersecurity strategy, some organizations are left singing the blues. Join the Nashville Cybersecurity Conference for the latest insights on the current threat landscape, and see how your organization can remain vigilant.
Connect with other cybersecurity leaders and executives at the Nashville Cybersecurity Conference to hear from industry luminaries on the topics you need for a complete security strategy. Engage with a variety of solutions providers, and interact with subject matter experts throughout the day, to help you stay on the leading edge.
Book your room at the Gaylord Opryland Resort here!
Date
Thu. Mar 24
Location
Gaylord Opryland Resort & Convention Center
2800 Opryland Drive
Nashville, TN 37214
(615) 889-1000
-
Featured Speakers
Todd Hudson
Special Welcome from SAIC Hudson and ASAIC Krout- US Secret Service
Jason KroutSpecial Welcome from SAIC Hudson and ASAIC Krout- US Secret Service
Matt StephensonUS Secret Service CFTF Update on Blockchain Analysis
Bryan McCloskeySpecial Welcome - FBI Asst Special Agent in Charge, Memphis Field Office
John KindervagKeynote Fireside Chat: John Kindervag
Kevin M. VarpnessCyber Inter-Agency Cooperation Panel
Klint WalkerCyber Inter-Agency Cooperation Panel
Jason KroutCyber Inter-Agency Cooperation Panel
Cesar SalazarCyber Inter-Agency Cooperation Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 8:30 AM to 5:00 PM, March 24th.
- Welcome / Introductions
- Special Welcome from SAIC Hudson and ASAIC Krout- US Secret Service 9:05 am
-
US Secret Service CFTF Update on Blockchain Analysis 9:15 am
Charged with protecting the nation’s financial infrastructure, the US Secret Service is paying careful attention to cryptocurrency. Cyber Fraud Task Forces (CFTFs), the focal point of cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. Strategically located CFTFs, like the one centered in the US Secret Service Nashville Field Office, combat cybercrime through prevention, detection, mitigation, and investigation.
In this session, Technical Staff Assistant Matthew Stephenson will provide a CFTF update on recent investigations in the region. He will discuss hashing technology, transactional details, open-source vs. automated tools, search parameters, Bitcoin mixers, tracing, and more.
Panel Participants:
-
The State of Secure Identity 9:40 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
Why SOCs Fail - The Maturity Model Required for Cyber Resilience 10:05 am
Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Key Learnings:
- Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
- How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
- Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
Speaker:
-
AI/ML and Other Leading-Edge Innovations in Cybersecurity 10:30 am
We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?
Panel Participants:
-
Secure Your Last Line of Defense 11:15 am
Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.
Panel Participants:
-
2022 Threat Review: Cyberprotection Starts With Understanding the Latest Attacks, Cybercrimes, and Privacy Breaches 11:40 am
The Malwarebytes 2022 Threat Review is an annual report highlighting internal threat research findings and trends. The report highlights top threats across operating systems, how privacy has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving readers the tools to make informed cyber protection decisions.
Speaker:
-
Special Welcome - FBI Asst Special Agent in Charge, Memphis Field Office 12:00 pm
In this short introduction, Asst. S.A.C. McCloskey will give an interview of how the FBI works cybercrime investigations. He will discuss some of the trends, why cybersecurity leaders presented with a situation should bring in the FBI early, and give an understanding of some of the breadth and depth of help the Bureau can provide and the global reach it offers.
His talk will include some of the regional trends his office has seen (the Nashville Resident Office is a part of the larger Memphis Field Office), recent cases and investigations, and things that local cyber executives should know that could help them in cyber threat situations.
Speaker:
- Lunch Break
-
Keynote Fireside Chat: John Kindervag 12:45 pm
After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.
John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.
In this Keynote Fireside Chat, John will talk about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape.
Speaker:
-
Stopping Ransomware with Autonomous Response 1:35 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Mitch Bowman, Cyber Security Director, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
-Recent ransomware threat trends, including double extortion and RDP attacks
-How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
-Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 2:15 pm
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
-
An Adversary-Focused Approach to Cybersecurity Defenses 2:40 pm
Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.
Speaker:
-
Recover from Ransomware: Coming Back After an Attack 3:05 pm
Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated. Rebuilding images, devices, re-formatting storage, and all the rest is part of this process. In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.
Panel Participants:
-
Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 3:50 pm
The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Julian Wayte, Director of Solutions Engineering, will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments.
Speaker:
-
Managing Cloud Risk Without Slowing App Delivery 4:15 pm
As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.
Learn how the largest financial services, media, and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Suresh Vasudevan, Sysdig CEO, will share our customer’s best practices for securing containers, Kubernetes, and cloud services.
Speaker:
-
US Secret Service Cyber Fraud Task Force - An Updated Overview 4:35 pm
The United States Secret Service maintains an integrated mission of protection and financial investigations. The integrated mission includes forensic expertise in an effort to support the investigative and protective missions, missing and exploited children investigations and other major crimes investigated by our law enforcement partners.
In this session, ATSAIC Fisher will go over the evolution of electronic crimes and fraud investigation over the past several years. He will discuss the present strategy, recent local enforcements in the region, and how members in the audience can get involved with the Nashville CFTF.
Panel Participants:
-
Cyber Inter-Agency Cooperation Panel 5:00 pm
This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime. In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.
This Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.
Panel Participants:
- Conference Closing Session 5:30 pm
- Networking Reception and Happy Hour 5:45 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners