
Virtual Summit
West Coast
Virtual Cybersecurity Summit
Join the West Coast Virtual Cybersecurity Summit to hear from some of the industry’s leading experts from across the country, with a particular focus on the West Coast. In this immersive, virtual environment, you will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.
The live, interactive environment of the West Coast Virtual Cybersecurity Summit will allow you to interact with representatives from some of the world’s top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.
Take a look at all Data Connectors has to offer here!
Date
Thu. May 26
-
Featured Speakers
Richard Stiennon
The Entire Cybersecurity Industry: What happened in 2021 and the First Quarter of 2022
Ken RaynerDigital Assets & Cryptocurrency Investigations
Bob KiersteadCyber Inter-Agency Cooperation Panel
Ken RaynerCyber Inter-Agency Cooperation Panel
Stephen DoughertyCyber Inter-Agency Cooperation Panel
David SonheimCyber Inter-Agency Cooperation Panel
Event Schedule
Times for this Event are in Pacific Time (PDT/PST).
The Summit will be open from 9:00 AM May 26th to 5PM.
- Welcome / Introductions
-
Compliance Can Equal Security – How To Use Compliance Frameworks To Build a Cybersecurity Program 8:35 am
A common refrain from information security professionals these days is “Compliance does NOT equal security!” Yet according to the Verizon Data Breach Investigation Report, the primary cause of data breaches is that breached organizations are not in compliance with any number of the recognized security frameworks at the time they were breached. I have come to term that the “Compliance-Security Disconnect”. To get past the disconnect, we must stop blaming the measurement system and address our compliance issues.
In this session, hear expert opinions on best practices for:
- Using a compliance framework to build a practical cybersecurity program
- Customizing the program to balance cybersecurity with risk tolerance
- Leveraging your security control infrastructure for the most significant gains with the least investment
Speaker:
-
The State of Secure Identity 9:00 am
Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.
During this session, we’ll provide greater insight into which industries are:
– Most highly targeted by credential stuffing attacks
– Most highly targeted by SQL injection attacks
– Leading the way in MFA adoption to improve overall security posture
We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.
Speaker:
-
Emergence of a New Anti-Ransomware Technology: Moving Target Defense 9:20 am
Regardless of the growing investment in cybersecurity, damage from cyber-attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks.
Antivirus and endpoint detection and response solutions are adequate at stopping known attacks with recognized signatures and behavioral patterns, but fail to respond to fast moving attack patterns that organizations are experiencing today. A new technology has emerged that has been proven to stop ransomware and other advanced attacks, making prevention-first security a reality: Moving Target Defense.
Speakers:
-
Protecting Against Cyber Attacks 9:40 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Disrupting Lateral Movement by Securing Active Directory 10:15 am
A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.
Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.
Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.
Highlights include:
· Live detection for attacks targeting Active Directory
· Attack surface reduction at both Active Directory and the endpoint
· Continuous visibility to AD changes that introduce new exposures
· Addressing Active Directory assurance to reduce risks and pass Red team tests
Speaker:
-
Embracing Top 5 CIS Security Controls to Maintain Resilience 10:35 am
The present-day workforce poses multiple challenges, from implementing hybrid work to deploying layered security. IT leaders are witnessing an exponential rise in cyber attacks among other hurdles such as enforcing Zero Trust and facing back-to-the-office struggles. In this session, we will learn the current threat landscape, prophecies for 2022 and beyond, and strategize the Top 5 CIS controls towards cyber resilience.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 11:00 am
The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demand6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
ing ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.Speaker:
-
The Entire Cybersecurity Industry: What happened in 2021 and the First Quarter of 2022 11:30 am
In this presentation jam-packed with data from Stiennon’s research into the entire IT security industry, you will see how the industry fits into sixteen categories, and where in the world all the startups come from. There are 2,615 vendors in the space and Stiennon tracks each one throughout it’s life from founding, to funding, to IPO or acquisition, and in a few very rare cases, its demise. Get the big picture from the security industry’s historian.
Speaker:
-
The Journey to Security Service Edge: The Killer Feature is Simplicity 12:20 pm
Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.
Speaker:
-
Stopping Attacks, Not Your Business: AI & Autonomous Response 12:40 pm
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Smita Nalluri, Cyber Security Team Leader, in this session where he/she explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Speaker:
-
Human-Centric Security: Protect the Person to Protect the Business 1:00 pm
Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2022, this attack vector will continue to receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.
In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.
Panel Participants:
-
2022 Trends & Directions 1:25 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
A New, Modern Way to Protect Data 2:00 pm
The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.
Panel Participants:
-
Evolving Your Organization’s Security Maturity 2:20 pm
Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.
This session will review:
• The NIST Cybersecurity Maturity Model and how it supports broader security strategy
• Sensitive data types and how they vary based on the nature of your business or the industry that you operate in
Core security initiatives to achieve greater security maturity, whether you’re establishing your baseline or scaling your strategyPanel Participants:
-
Approaching Zero Trust in Healthcare Cloud Environments 2:40 pm
Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand. Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.
Panel Participants:
- Digital Assets & Cryptocurrency Investigations 3:05 pm
- Cyber Inter-Agency Cooperation Panel 3:25 pm
-
Delivering Zero Trust at Scale (Twice): Lessons Learned 4:10 pm
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
The audience will gain understanding in:
How to get started: Selling the strategy, people, process and technology
How to make real progress in months, not years. Demonstrating continued business value
Real world examples. Highlighting improvements to user experience and security posture.
Tips and tricks, lessons learned and what to avoidSpeaker:
-
Executive Takeaways from the 2022 Threat Detection Report 4:30 pm
Red Canary’s fourth annual Threat Detection Report is the culmination of what our leading security operations team learned in the past year, as they detected and responded to more than 30,000 threats that bypassed our customers’ initial preventive controls. Join us to learn how and why we produce this annual report, see a summary of the threats and adversary tradecraft that dominated the landscape in 2021, and understand how technology and security leaders can use this report to empower their teams. Together, we can rise to meet the adversary head-on, reduce risk, and ensure continuity in the face of evolving threats.
Speaker:
-
Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 4:50 pm
Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.
Speaker:
- Summit Closing Session
-
Partners
Platinum Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners