
Virtual Summit
Gulf States
Virtual Cybersecurity Summit
The impact of the Colonial Pipeline ransomware attack in May 2021 struck panic at the pump across the South, and for many organizations, it served as a reminder that cybersecurity is often the most vital yet overlooked part of their operations — particularly in the fast-moving oil and gas industry. Ensure that your company and team are protected by staying on top of the latest threats at the Gulf States Virtual Cybersecurity Summit.
Dive into this interactive virtual venue, and you’ll hear from some of the industry’s leading experts from across the nation, with a particular focus on the Gulf States of Texas, Alabama, Louisiana, and Mississippi. Join to learn key strategies and develop a cyber plan that can hold up against future attacks with the exclusive insights from government agencies, law enforcement, and private sector security leaders.
Take a look at all Data Connectors has to offer here!
Date
Thu. May 05
-
Featured Speakers
Donna Gregory
FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money)
John KindervagWin the Cyberwar With Zero Trust
Mark SangsterCyber Executive Panel
Scott SmithCyber Executive Panel
John BandyCyber Executive Panel
James MorrisonCyber Executive Panel
Ashley RoseCyber Executive Panel
John SappCyber Executive Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Summit will be open from 8:30 AM to 5 PM.
- Welcome to the Gulf States Virtual Cybersecurity Summit
-
FBI IC3: US Cybercrime Reporting (a.k.a. Follow the Money) 9:15 am
Since 2000, the FBI’s Internet Crime Complaint Center (IC3) has received complaints crossing a wide array of cybercrime matters. Cybercrime data collection and analysis not only identifies trends, but enables efforts to control, reduce, mitigate, and prevent cybercrime. In this discussion, Donna Gregory, Unit Chief for the FBI Cyber Division, IC3 will explain more about their mission to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI, the categories of cybercrime, types of cybercrime data collected, criteria used to measure cybercrime, and how these crimes interoperate with other cybercrime activities.
Speaker:
-
The State of Secure Identity 9:50 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
A Realistic View of the State of Secrets Sprawl in Corporate Codebases 10:10 am
Secrets like API keys are sprawling through the internet at an alarming rate. A research project released in March uncovered 6 million leaked secrets publicly. This presentation reviews that research and uses recent breaches to show how adversaries discover and exploit secrets to breach organizations.
Speaker:
-
2022 Trends & Directions 10:40 am
What will define cybersecurity in 2022? What carries over from 2021?
Risk comes from all angles in 2021 users, vendors, partners, and systems. In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with a particular focus on the threat landscape seen across the continent.
Obviously, COVID and the associated rush to work-from-home played a big part in 2020 and 2021. Beyond that, what are the key cybersecurity trends we need to watch out for in 2022?
Panel Participants:
-
CIS Controls in the Real World 11:10 am
As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game… and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure.
Speaker:
-
Low Hanging Fruit – Improving AD Security for the Easy Win 11:30 am
Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.
Speaker:
- Lunch Break
-
Win the Cyberwar With Zero Trust 12:25 pm
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world’s only true cybersecurity strategy. He will show how a Zero Trust Strategy will achieve tactical and operational goals. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Speaker:
-
Emergence of a New Anti-Ransomware Technology: Moving Target Defense 1:10 pm
Regardless of the growing investment in cybersecurity, damage from cyber-attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks.
Antivirus and endpoint detection and response solutions are adequate at stopping known attacks with recognized signatures and behavioral patterns, but fail to respond to fast moving attack patterns that organizations are experiencing today. A new technology has emerged that has been proven to stop ransomware and other advanced attacks, making prevention-first security a reality: Moving Target Defense.
Speaker:
-
A New, Modern Way to Protect Data 1:30 pm
The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 2:00 pm
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
This discussion will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
-
A Realistic Take on Zero Trust 2:25 pm
Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises.
-
Ransomware Prevention (Or the Closest You Can Come to It): Pre-Attack Practices 2:45 pm
So much has been said about ransomware – advice on prevention/preparation comes from government agencies, solution providers and industry pundits. Ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
This discussion will focus on PRE-ATTACK scenarios… while everyone needs to take a “not if, but when” approach – there are tools, policies, and best practices that can be done in preparation and have led to prevention of nasty attacks.
Panel Participants:
-
Rethink your Third-Party Risk Strategy in an Uncertain World 3:25 pm
As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever before. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.
How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, managing the risk associated with your partners is increasingly challenging.
Join Reciprocity experts as we share and discuss with you:
- Market Dynamics driving the risk vs. opportunity balance
- 5 key considerations to better identify, manage and mitigate third party risk
- Real world examples of improving TPRM visibility and efficiency
Speaker:
-
The Journey Toward Zero Trust - How Companies Get Started 3:45 pm
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from the Banyan Security’s Director of Product as they share how companies can implement zero trust methodologies at scale.
The audience will gain understanding in:
– How to get started: Selling the strategy, people, process and technology
– How to make real progress in months, not years. Demonstrating continued business value
– Real world examples. Highlighting improvements to user experience and security posture.Speaker:
-
Fast and Furious Attacks: Using AI to Surgically Respond 4:10 pm
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Senior Cyber Security Executive, Blake Goins, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
Topic for this session– Autonomous Response
· Explore today’s threats and challenges
· How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enoughQuestions:
What happens if you deploy in our network and we are already infected? Would Darktrace pick that up?
What are the actions you can take on a network with Antigena?
How do you deploy in an o365 email environment?Speaker:
-
Cyber Executive Panel 4:35 pm
Submit your bio for consideration to participate on our Gulf States Virtual Cybersecurity Summit
Cyber Executive Panel to [email protected]
or fill out our Call for Speakers form here.
Moderator :
Panel Participants:
- Summit Closing Session and Prize Drawing