Registration

Thu. May 05

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: FREE

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Summit will be open from 8:30 AM to 5 PM.

  • Welcome to the Gulf States Virtual Cybersecurity Summit
  • FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money) 9:15 am

    Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime.  In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.

     

    Click to Expand

    Speaker:

    Donna Gregory
    Donna Gregory

    Donna Gregory

    Unit Chief at FBI Cyber Division, IC3

    Collapse This Item

  • The State of Secure Identity 9:50 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.

    During this session, we’ll provide greater insight into which industries are:

    – Most highly targeted by credential stuffing attacks

    – Most highly targeted by SQL injection attacks

    – Leading the way in MFA adoption to improve overall security posture

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • A Realistic View of the State of Secrets Sprawl in Corporate Codebases 10:10 am

    Presented by GitGuardian

    Secrets like API keys are sprawling through the internet at an alarming rate. A research project released in March uncovered 6 million leaked secrets publicly. This presentation reviews that research and uses recent breaches to show how adversaries discover and exploit secrets to breach organizations.

    Click to Expand

    Speaker:

    Daniel Walsh
    Daniel Walsh

    Daniel Walsh

    Head of Code Security Advisory at GitGuardian

    Collapse This Item

  • 2022 Trends & Directions 10:40 am

    What will define cybersecurity in 2022? What carries over from 2021?

    Risk comes from all angles in 2021 users, vendors, partners, and systems. In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with a particular focus on the threat landscape seen across the continent.

    Obviously, COVID and the associated rush to work-from-home played a big part in 2020 and 2021. Beyond that, what are the key cybersecurity trends we need to watch out for in 2022?

    Click to Expand

    Panel Participants:

    Nathan Caldwell
    Nathan Caldwell

    Nathan Caldwell

    Managed Security Awareness Evangelist at Artic Wolf Networks

    Brian Smith
    Brian Smith

    Brian Smith

    CTO, Co-founder at Spyderbat

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • CIS Controls in the Real World 11:10 am

    Presented by Sentinel IPS

    As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game… and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.

    Click to Expand

    Speaker:

    Ted Gruenloh
    Ted Gruenloh

    Ted Gruenloh

    CEO at Sentinel IPS

    Collapse This Item

  • Low Hanging Fruit – Improving AD Security for the Easy Win 11:30 am

    Presented by Attivo Networks

    Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.

    Click to Expand

    Speaker:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Lunch Break
  • Win the Cyberwar With Zero Trust 12:25 pm

    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.

    Click to Expand

    Speaker:

    John Kindervag
    John Kindervag

    John Kindervag

    Senior Vice President, Cybersecurity Strategy

    Collapse This Item

  • Emergence of a New Anti-Ransomware Technology: Moving Target Defense 1:10 pm

    Presented by Morphisec

     Regardless of the growing investment in cybersecurity, damage from cyber-attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks.

     Antivirus and endpoint detection and response solutions are adequate at stopping known attacks with recognized signatures and behavioral patterns, but fail to respond to fast moving attack patterns that organizations are experiencing today. A new technology has emerged that has been proven to stop ransomware and other advanced attacks, making prevention-first security a reality: Moving Target Defense.

    Click to Expand

    Speaker:

    Michael Gorelik
    Michael Gorelik

    Michael Gorelik

    CTO at Morphisec

    Brad LaPorte
    Brad LaPorte

    Brad LaPorte

    Partner at Hightide-Advisors

    Collapse This Item

  • A New, Modern Way to Protect Data 1:30 pm

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Speaker:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 2:00 pm

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    This discussion will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • A Realistic Take on Zero Trust 2:25 pm

    Presented by Lookout

    Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.

    Click to Expand

    Collapse This Item

  • Ransomware Prevention (Or the Closest You Can Come to It): Pre-Attack Practices 2:45 pm

    So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits.  Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks. 

    Click to Expand

    Panel Participants:

    Michael Gorelik
    Michael Gorelik

    Michael Gorelik

    CTO at Morphisec

    Jay Paz
    Jay Paz

    Jay Paz

    Senior Director of Delivery at Cobalt Labs

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Mackenzie Jackson
    Mackenzie Jackson

    Mackenzie Jackson

    Developer Advocate at GitGuardian

    Collapse This Item

  • Rethink your Third-Party Risk Strategy in an Uncertain World 3:25 pm

    Presented by Reciprocity

    As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever before. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.

    How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, managing the risk associated with your partners is increasingly challenging.

    Join Reciprocity experts as we share and discuss with you: 

    • Market Dynamics driving the risk vs. opportunity balance
    • 5 key considerations to better identify, manage and mitigate third party risk
    • Real world examples of improving TPRM visibility and efficiency
    Click to Expand

    Speaker:

    Rob Ellis
    Rob Ellis

    Rob Ellis

    Chief Strategy Officer at Reciprocity

    Collapse This Item

  • The Journey Toward Zero Trust - How Companies Get Started 3:45 pm

    Presented by Banyan Security

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from the Banyan Security’s Director of Product as they share how companies can implement zero trust methodologies at scale.

    The audience will gain understanding in:
    – How to get started: Selling the strategy, people, process and technology
    – How to make real progress in months, not years. Demonstrating continued business value
    – Real world examples. Highlighting improvements to user experience and security posture.

    Click to Expand

    Speaker:

    Faraz Jamal
    Faraz Jamal

    Faraz Jamal

    Director of Product at Banyan Security

    Collapse This Item

  • Fast and Furious Attacks: Using AI to Surgically Respond 4:10 pm

    Presented by Darktrace

    Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Senior Cyber Security Executive, Blake Goins, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.

    Topic for this session– Autonomous Response
    · Explore today’s threats and challenges
    · How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough

    Questions:
    What happens if you deploy in our network and we are already infected? Would Darktrace pick that up?
    What are the actions you can take on a network with Antigena?
    How do you deploy in an o365 email environment?

    Click to Expand

    Speaker:

    Blake Goins
    Blake Goins

    Blake Goins

    Senior Cyber Security Executive at Darktrace

    Collapse This Item

  • Cyber Executive Panel 4:35 pm

    Submit your bio for consideration to participate on our Gulf States Virtual Cybersecurity Summit

    Cyber Executive Panel to [email protected]

    or fill out our Call for Speakers form here.

    Click to Expand

    Moderator :

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Panel Participants:

    Scott Smith
    Scott Smith

    Scott Smith

    CISO at City of Bryan

    John Bandy
    John Bandy

    John Bandy

    Chief Information Security Officer at Samford University

    James Morrison
    James Morrison

    James Morrison

    CISO at Ntirety

    Ashley Rose
    Ashley Rose

    Ashley Rose

    CEO and Co-founder at Living Security

    John Sapp
    John Sapp

    John Sapp

    VP, Information Security & CISO at Texas Mutual Insurance Company

    Collapse This Item

  • Summit Closing Session and Prize Drawing
Partners Register