• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, September 29th.

  • Welcome / Introductions
  • The Battle of the Algorithms: How AI is Beating AI at its Own Game 9:15 am

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

    Click to Expand

    Panel Participants:

    Grant LaRocca
    Grant LaRocca

    Grant LaRocca

    Cyber Technology Specialist at Darktrace

    Collapse This Item

  • 4G/5G Network Security 9:35 am

    Presented by Cradlepoint

    Protecting organizational infrastructure, networks, and hardware devices is a never ending pursuit these days.  There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers.  This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity.  Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.  

    Click to Expand

    Speaker:

    Greg Henderson
    Greg Henderson

    Greg Henderson

    Global Consulting Engineer for 5G/PCN Cradlepoint, Part of Ericsson

    Collapse This Item

  • How to Keeping Your Business Flowing: Securing Email and Collaboration Tools 10:20 am

    Presented by Check Point

    As businesses rely more on email and collaboration tools to run their operations, cyber-criminals are finding new ways to compromise remote workforces. Harmony Email and Collaboration protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.

    Click to Expand

    Speaker:

    Augusto Morales
    Augusto Morales

    Augusto Morales

    Technology Lead, Threat Solutions - Office of CTO at Check Point

    Collapse This Item

  • Protecting Against Cyber Attacks 10:40 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    TJ Adamowicz
    TJ Adamowicz

    TJ Adamowicz

    Cyber Resilience Solution Strategist

    Scott Holt
    Scott Holt

    Scott Holt

    Security Strategist at Elastic

    Frank Kyazze
    Frank Kyazze

    Frank Kyazze

    Privacy Director at Kintent

    Collapse This Item

  • Insider Risk Program: Where Do I Start? 11:35 am

    Presented by Code42

    Many of you may be reading this from home, on the road, on a plane, in the office, a coffee shop or anywhere in between. The way in which work has fundamentally changed forever. And the way businesses safeguard their information also needs to change. Savvy security leaders are looking for proactive ways to better their security posture. Enter Insider Risk Management. Join Beth Miller, Senior Risk Advisor with Code42 to learn how, and where to start with an Insider Risk Program. During the session you will learn: 

    -What is insider risk, and why is it important to understand 

    -Why this approach is critical to the way we work today 

    -The path forward: People, process and technology 

    -Tips on how to get started

    Click to Expand

    Speaker:

    Beth Miller
    Beth Miller

    Beth Miller

    Senior Insider Risk Advisor, Code42

    Collapse This Item

  • Managing Cloud Risk Without Slowing App Delivery 11:55 am

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. 

    Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Nick Fisher, VP of Product Marketing, will share our customers’ best practices for securing containers, Kubernetes and cloud services.

    Click to Expand

    Speaker:

    Nick Fisher
    Nick Fisher

    Nick Fisher

    VP of Product Management at Sysdig

    Collapse This Item

  • Lunch Break
  • Your First 100 Days as a CISO 12:50 pm

    Is there really a formal set of plans for your First 100 Days as a CISO? Yes and no. On my 3rd tour as a CISO, it’s always good to have a plan for your First 100 days– more than likely, those plans will be great references at the very least. Every organization is different, you need to understand compliance and contractual obligations, risks and threats, business complexities, assets (IT assets, data, etc), service providers, leaders and people, past incidents, and many others. On your first 100 days, understanding of the business is key and the maturity and gaps of the organization’s security program – will be crucial. There is one critical area that will take time to understand and that “thing” plays an important factor in the success of your security program.

    Click to Expand

    Speaker:

    Cecil Pineda
    Cecil Pineda

    Cecil Pineda

    Senior VP & CISO at R1 RCM, Inc.

    Collapse This Item

  • Immutable Storage: Level-Up Your Ransomware Readiness 1:50 pm

    Presented by Arcserve

     Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.

    Click to Expand

    Speaker:

    Shawn Massey
    Shawn Massey

    Shawn Massey

    VP, Principal Consulting at Arcserve

    Collapse This Item

  • Threat Hunting: How to Grow and Retain Cyber Security Ninjas 2:10 pm

    Presented by Secureworks

    In an ever-evolving threat landscape your current Prevent and Detect controls may not be enough. In this presentation Secureworks threat hunter Robert Higham will explain what exactly threat hunting is and how it can help your organization. Hear the top five lessons learned from threat hunting and a few tips on what you can do to get started and help your business beat the threat.

    Click to Expand

    Speaker:

    Robert Higham
    Robert Higham

    Robert Higham

    CTU Senior Consultant – InfoSec Research at Secureworks

    Collapse This Item

  • Reducing 3rd Party Cyber Risk with Actionable Insights 2:50 pm

    Presented by Cyber Watch Systems and CyberGRX

    On average, 200 third parties have access to an enterprise organization’s systems on a given day and that number is expected to grow by 15% in the next year. Each of those 3rd parties represent an opportunity for a bad actor and the risk of data loss for your company. Traditional 3rd party cyber risk management has not been properly prioritized or effective at preventing data breach with approximately 52% of breaches originating outside the organization.

    At the heart of an effective 3rd party risk program is data intelligence that can provide complete visibility and even predictive risk analysis at scale. We will discuss methods to increase the effectiveness of your 3rd party cyber risk program by using a holistic approach to produce actionable insights, reduce time to value, and expand the scope of coverage.

    Click to Expand

    Speaker:

    Bill Theissen
    Bill Theissen

    Bill Theissen

    Managing Partner, VP Consulting Services at Cyber Watch Systems

    Collapse This Item

  • CISA Briefing 3:10 pm

    The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its “Shields Up” warning in mid-February. Working with other agencies, important information is updated regularly at cisa.gov/shields-up.  Consolidating that information and a host of the intelligence that CISA has made available, Mr. Chad Adams, Cyber Security Advisor, Region 6, will go over the nature of the current threats posed by these and other pressing headlines.

    Click to Expand

    Speaker:

    Chad Adams
    Chad Adams

    Chad Adams

    Cyber Security Advisor, Region 6 at DHS/CISA

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:40 pm

    Moderator:

    Chad Adams
    Chad Adams

    Chad Adams

    Cyber Security Advisor, Region 6 at DHS/CISA

    Panel Participants:

    Wendy Cassidy
    Wendy Cassidy

    Wendy Cassidy

    Senior Special Agent at USSS

    David Grantham
    David Grantham

    David Grantham

    Chief of Intelligence and Technology at Tarrant County

    Jeremy Ehrhardt
    Jeremy Ehrhardt

    Jeremy Ehrhardt

    ATSAIC at USSS

    Michael Jackson
    Michael Jackson

    Michael Jackson

    CyberSecurity Advisor, Region 6 and State Coordinator OKC at CISA

    Collapse This Item

  • Cyber Executive Panel 4:30 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    Dave Belanger
    Dave Belanger

    Dave Belanger

    Chief Security Officer at Bestow Insurance

    Panel Participants:

    Raymond King
    Raymond King

    Raymond King

    Dir Information Security, Compliance, Privacy at Dallas Cowboys

    Cecil Pineda
    Cecil Pineda

    Cecil Pineda

    Senior VP & CISO at R1 RCM, Inc.

    Sailaja Kotra-Turner
    Sailaja Kotra-Turner

    Sailaja Kotra-Turner

    Global Information Security Leader, CISO - Brown-Forman

    Dewakar Garg
    Dewakar Garg

    Dewakar Garg

    CISO at Mavenir

    Collapse This Item

  • Conference Closing Session 5:15 pm
  • Happy Hour Networking Reception 5:30 pm
Partners Register