• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Pacific Time (PDT/PST).

The Summit will be open from 9:00 AM May 26th to 5PM.

  • Welcome / Introductions
  • Compliance Can Equal Security – How To Use Compliance Frameworks To Build a Cybersecurity Program 8:35 am

    Presented by Truvantis

    A common refrain from information security professionals these days is “Compliance does NOT equal security!” Yet according to the Verizon Data Breach Investigation Report, the primary cause of data breaches is that breached organizations are not in compliance with any number of the recognized security frameworks at the time they were breached. I have come to term that the “Compliance-Security Disconnect”. To get past the disconnect, we must stop blaming the measurement system and address our compliance issues. 

    In this session, hear expert opinions on best practices for: 

    • Using a compliance framework to build a practical cybersecurity program 
    • Customizing the program to balance cybersecurity with risk tolerance 
    • Leveraging your security control infrastructure for the most significant gains with the least investment
    Click to Expand

    Speaker:

    Jeff Hall
    Jeff Hall

    Jeff Hall

    Principal Security Consultant

    Collapse This Item

  • The State of Secure Identity 9:00 am

    Presented by Auth0

    Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.

    During this session, we’ll provide greater insight into which industries are:

    – Most highly targeted by credential stuffing attacks

    – Most highly targeted by SQL injection attacks

    – Leading the way in MFA adoption to improve overall security posture

    We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

    Click to Expand

    Speaker:

    Gatewood Green
    Gatewood Green

    Gatewood Green

    Principal Security Architect at Auth0

    Collapse This Item

  • Emergence of a New Anti-Ransomware Technology: Moving Target Defense 9:20 am

    Presented by Morphisec

    Regardless of the growing investment in cybersecurity, damage from cyber-attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks.

     Antivirus and endpoint detection and response solutions are adequate at stopping known attacks with recognized signatures and behavioral patterns, but fail to respond to fast moving attack patterns that organizations are experiencing today. A new technology has emerged that has been proven to stop ransomware and other advanced attacks, making prevention-first security a reality: Moving Target Defense. 

    Click to Expand

    Speakers:

    Michael Gorelik
    Michael Gorelik

    Michael Gorelik

    CTO at Morphisec

    Brad LaPorte
    Brad LaPorte

    Brad LaPorte

    Partner at Hightide-Advisors

    Collapse This Item

  • Protecting Against Cyber Attacks 9:40 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Michael Gorelik
    Michael Gorelik

    Michael Gorelik

    CTO at Morphisec

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Chris Borales
    Chris Borales

    Chris Borales

    Senior Manager Security Solutions

    Joe Tibbetts, Sr.
    Joe Tibbetts, Sr.

    Joe Tibbetts, Sr.

    Senior Director, Tech Alliances & API at Mimecast

    Collapse This Item

  • Disrupting Lateral Movement by Securing Active Directory 10:15 am

    Presented by Attivo Networks

    A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Directory to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

    Active Directory security requires time, resources, expertise, and visibility. Typical best practices focus on limiting privileged accounts, conducting audits, and hardening systems, but these no longer suffice to address advanced attacks.

    Join this session to explore new options that automate defending AD from compromise to prevent lateral movement.

    Highlights include:

    · Live detection for attacks targeting Active Directory

    · Attack surface reduction at both Active Directory and the endpoint

    · Continuous visibility to AD changes that introduce new exposures

    · Addressing Active Directory assurance to reduce risks and pass Red team tests

    Click to Expand

    Speaker:

    Joseph Salazar
    Joseph Salazar

    Joseph Salazar

    Technical Deception Engineer, CISSP, CEH, EnCE at Attivo

    Collapse This Item

  • Embracing Top 5 CIS Security Controls to Maintain Resilience 10:35 am

    Presented by Manage Engine

    The present-day workforce poses multiple challenges, from implementing hybrid work to deploying layered security. IT leaders are witnessing an exponential rise in cyber attacks among other hurdles such as enforcing Zero Trust and facing back-to-the-office struggles. In this session, we will learn the current threat landscape, prophecies for 2022 and beyond, and strategize the Top 5 CIS controls towards cyber resilience.

    Click to Expand

    Speaker:

    James Raj Sambasivam
    James Raj Sambasivam

    James Raj Sambasivam

    Senior Technical Consultant at Manage Engine

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 11:00 am

    Presented by baramundi

    The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demand6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.

    Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
    ing ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • The Entire Cybersecurity Industry: What happened in 2021 and the First Quarter of 2022 11:30 am

    In this presentation jam-packed with data from Stiennon’s research into the entire IT security industry, you will see how the industry fits into sixteen categories, and where in the world all the startups come from. There are 2,615 vendors in the space and Stiennon tracks each one throughout it’s life from founding, to funding, to IPO or acquisition, and in a few very rare cases, its demise. Get the big picture from the security industry’s historian.

    Click to Expand

    Speaker:

    Richard Stiennon
    Richard Stiennon

    Richard Stiennon

    Chief Research Analyst, IT-Harvest

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 12:20 pm

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”.  As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce.  In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    John Spiegel
    John Spiegel

    John Spiegel

    Field CTO at Axis Security

    Collapse This Item

  • Stopping Attacks, Not Your Business: AI & Autonomous Response 12:40 pm

    Presented by Darktrace

    With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Smita Nalluri, Cyber Security Team Leader, in this session where he/she explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.

    Click to Expand

    Speaker:

    Smita Nalluri
    Smita Nalluri

    Smita Nalluri

    Cyber Security Team Leader at Darktrace

    Collapse This Item

  • Human-Centric Security: Protect the Person to Protect the Business 1:00 pm

    Presented by 1Password

    Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As we go into 2022, this attack vector will continue to  receive tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create a “perfect storm” threat for modern cyber executives.  

    In this session we will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third-party risks at a minimum.

    Click to Expand

    Panel Participants:

    Troy Kitch
    Troy Kitch

    Troy Kitch

    VP of Products at 1Password

    Collapse This Item

  • 2022 Trends & Directions 1:25 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

     

    Click to Expand

    Panel Participants:

    Troy Kitch
    Troy Kitch

    Troy Kitch

    VP of Products at 1Password

    Mark Scrano
    Mark Scrano

    Mark Scrano

    Information Security Manager at Cobalt

    Tony Cole
    Tony Cole

    Tony Cole

    Chief Technology Officer at Attivo Networks

    Jeff Hall
    Jeff Hall

    Jeff Hall

    Principal Security Consultant

    Collapse This Item

  • A New, Modern Way to Protect Data 2:00 pm

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Panel Participants:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Evolving Your Organization’s Security Maturity 2:20 pm

    Presented by Cavelo

    Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.

    This session will review:
    • The NIST Cybersecurity Maturity Model and how it supports broader security strategy
    • Sensitive data types and how they vary based on the nature of your business or the industry that you operate in
    Core security initiatives to achieve greater security maturity, whether you’re establishing your baseline or scaling your strategy

    Click to Expand

    Panel Participants:

    James Mignacca
    James Mignacca

    James Mignacca

    CEO at Cavelo

    Collapse This Item

  • Approaching Zero Trust in Healthcare Cloud Environments 2:40 pm

    Presented by Lookout

    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand. Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    Click to Expand

    Panel Participants:

    Hank Schless
    Hank Schless

    Hank Schless

    Senior Manager, Security Solutions at Lookout

    Collapse This Item

  • Digital Assets & Cryptocurrency Investigations 3:05 pm

    Speaker:

    Ken Rayner
    Ken Rayner

    Ken Rayner

    Special Agent at USSS - San Francisco Field Office

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 3:25 pm

    Panel Participants:

    Bob Kierstead
    Bob Kierstead

    Bob Kierstead

    Former SAIC at USSS, Seattle District

    Ken Rayner
    Ken Rayner

    Ken Rayner

    Special Agent at USSS - San Francisco Field Office

    Stephen Dougherty
    Stephen Dougherty

    Stephen Dougherty

    Financial Fraud Investigator, Global Investigative Operations Center

    David Sonheim
    David Sonheim

    David Sonheim

    Chief of Cybersecurity - Supervisor Region 8 at Department of Homeland Security

    Collapse This Item

  • Delivering Zero Trust at Scale (Twice): Lessons Learned 4:10 pm

    Presented by Banyan Security

    As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.

    The audience will gain understanding in:
    How to get started: Selling the strategy, people, process and technology
    How to make real progress in months, not years. Demonstrating continued business value
    Real world examples. Highlighting improvements to user experience and security posture.
    Tips and tricks, lessons learned and what to avoid

    Click to Expand

    Speaker:

    Den Jones
    Den Jones

    Den Jones

    Chief Security Officer at banyan Security

    Collapse This Item

  • Executive Takeaways from the 2022 Threat Detection Report 4:30 pm

    Presented by Red Canary

     Red Canary’s fourth annual Threat Detection Report is the culmination of what our leading security operations team learned in the past year, as they detected and responded to more than 30,000 threats that bypassed our customers’ initial preventive controls. Join us to learn how and why we produce this annual report, see a summary of the threats and adversary tradecraft that dominated the landscape in 2021, and understand how technology and security leaders can use this report to empower their teams. Together, we can rise to meet the adversary head-on, reduce risk, and ensure continuity in the face of evolving threats.

    Click to Expand

    Speaker:

    Keith McCammon
    Keith McCammon

    Keith McCammon

    Co-founder and Chief Security Officer at Red Canary

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 4:50 pm

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Larry Chinski
    Larry Chinski

    Larry Chinski

    Vice President Global IAM Strategy and Customer Advocacy at One Identity

    Collapse This Item

  • Summit Closing Session
  • Partners

    Platinum Partners

    Truvantis

    Gold Partners

    1Password
    Attivo Networks
    Auth0
    Morphisec
    Pure Storage - Alternate

    Silver Partners

    Axis
    Banyan Security
    baramundi - Alternate
    Cavelo
    Darktrace
    Lookout
    ManageEngine
    One Identity
    Reciprocity
    Red Canary

    Bronze Partners

    Automox - Alternate
    Cobalt
    Gigamon
    Mimecast

    Exhibiting Partners

    ExtraHop

    Affiliate Partners

    (ISC)<sup>2</sup> LA Chapter
    IIBA Orange County
    ISACA Orange County Chapter
    Veterans in Tech

    Collapse This Item

Partners Register