
Conference
Tampa 2022
Cybersecurity Conference
As security experts in the local community continue to navigate the ever-changing landscape, you can ensure you’re on the leading edge by joining your peers at the Tampa Cybersecurity Conference. Sit alongside fellow IT and cyber executives as you hear from experts in both the public and private sectors, offering vital information on how to move your organization through the latest threats.
Through interactive sessions, Q&A panels and keynotes led by industry thought leaders and luminaries, the Tampa Cybersecurity Conference will allow you to gain the needed insights to prepare your team for the inevitable. Meet face-to-face with cyber solution providers to ensure your organization is protected and take advantage of several networking opportunities throughout the full-day conference.
Already registered? Find more details here!
Date
Tue. Mar 15
-
Featured Speakers
Jane Castor
Special Welcome from Jane Castor, Mayor of Tampa
Richard DeanSpecial Welcome from USSS SAC Richard Dean
Sanjay VirmaniSpecial Welcome from FBI Acting SAC Sanjay Virmani
James J.W. GrantKeynote - Creating Florida’s First Cybersecurity Program: Lessons Learned So Far
James J.W. GrantCyber Executive RoundTable
Martin ZinaichCyber Executive RoundTable
Jeremy RodgersCyber Executive RoundTable
Jason ManarCyber Executive RoundTable
Klint WalkerCyber Executive RoundTable
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:30 AM to 5 PM, March 15th.
- Welcome to the Tampa Cybersecurity Conference
- Special Welcome from Jane Castor, Mayor of Tampa 9:15 am
- Special Welcome from USSS SAC Richard Dean 9:30 am
- Special Welcome from FBI Acting SAC Sanjay Virmani 9:45 am
-
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust 10:00 am
Join ThreatLocker’s Director of Technical Engagement, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture.
Speaker:
-
Empower the Human “Cyber-Warrior”: A Public-Private Partnership 10:25 am
Despite the addition of more and more technologies (MFA, DLP, email security, etc.), and education (user awareness, phishing simulation, etc.) more than 90% of eventual monetary losses due to a data breach result from users. Whether malicious or unintentional, the oft-confused carbon-based life forms (users) are worthy of a focus from this panel of experts.
This discussion will include members of our law enforcement, federal cyber support, and other agencies alongside leaders from private industry. They will present some of the facts from their experiences, and share best practices and practical advice for the cyber leaders in the audience to finally close the gaps related to user “error.” They’ll discuss processes and ideas on how cyber leaders can be less susceptible to these gaps, and thoughtful paradigms to effectuate a shift in strategy to better cope.
Panel Participants:
-
Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 11:15 am
The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Uptycs CEO and co-founder Ganesh Pai will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments.
Speaker:
-
Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 11:40 am
The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss:
- How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment.
- Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.
Speaker:
- Lunch Break
-
Demo Session: Protecting Yourself Against Ransomware 12:10 pm
Presented by Check Point Software Technologies
We all know that email is the #1 threat facing organizations today – 91% of breaches start with email and it’s the number one vector used in ransomware attacks. With the migration to cloud email, the email security market is undergoing a massive disruption.
Join Check Point Software Technologies to see a live demo on how you can protect your enterprise against the most sophisticated attacks. After the demo, you’ll gain take-away strategies for combatting email threats and attack scenarios leading up to it.
Panel Participants:
- Demo Session: How to Gain Actionable Insight Across Your Entire Technology Portfolio 12:20 pm
-
Demo Session: SentinelOne Singularity™ Platform- Autonomous, AI-driven Prevention and XDR at Machine Speed 12:30 pm
At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity™️ XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface.
Speaker:
-
Keynote - Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 12:45 pm
Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center. Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.
Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age. Protecting citizens, assets, information and infrastructure is the building block for stable government services.
Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors. He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.
Speaker:
-
Stopping Ransomware with Autonomous Response 1:35 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Kathryn Eckhart, Cyber Security Director at Darktrace, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
- -Recent ransomware threat trends, including double extortion and RDP attacks
- -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- -Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
Speaker:
-
An Adversary-Focused Approach to Cybersecurity Defenses 2:15 pm
Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.
Speaker:
-
The Journey to Security Service Edge: The Killer Feature is Simplicity 2:40 pm
Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.
Speaker:
-
Defense in Depth: New Strategies for 2022 3:05 pm
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?
Panel Participants:
-
Reimagining Your SOC with XDR 3:50 pm
Threat actors have the advantage. With increasingly advanced tactics and the patience and perseverance of a miner digging for a diamond, attackers are exploiting vulnerabilities and infiltrating your organization’s network. Companies of all sizes struggle to eliminate risk—especially as your attack surfaces expand due to digital transformation and remote work. There’s never enough time or resources to do it all and managing multiple independent point tools only creates more overhead. Your SOC analysts are inundated with low-fidelity data and bogged down with repetitive and menial tasks dealing with false-positive alerts. Your evolving modern environment requirements may be driving momentum for Extended Detection and Response (XDR).
What is XDR and how can it improve the effectiveness of your security strategy and drive greater efficiency with SOC personnel? Join this session to learn how a consolidated security data pipeline can collect and process telemetry at scale across your hybrid estate to deliver high-fidelity alerts and the automated prevention workflows needed to quickly identify and respond to threats. See how XDR can be used to minimize alert triage, reduce investigation time, and automate response guidance—empowering your team to speed response and limit the effects of threats.
Speaker:
-
Managing Cloud Risk Without Slowing App Delivery 4:15 pm
As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.
Learn how the largest financial services, media, and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Suresh Vasudevan, Sysdig CEO, will share our customer’s best practices for securing containers, Kubernetes, and cloud services.
Speaker:
-
Keynote- Kaseya CISO Talks Cyber 4:35 pm
Jason Manar was the FBI Special Agent working on the Kaseya case in 2021. Today, he’s the CISO there, and has a lot to share about what the business has learned, and what takeaways benefit every cybersecurity leader in the audience.
Speaker:
-
Cyber Executive RoundTable 4:50 pm
Submit your bio for consideration to participate on our Tampa Cybersecurity Conference
Cyber Executive RoundTable to [email protected]
or fill out our Call for Speakers form here.
Panel Participants:
- Tampa Cybersecurity Conference Closing Session 5:35 pm
- Networking Reception and Happy Hour 5:45 pm
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners