• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, January 19th.

  • Welcome to the Columbus Cybersecurity Conference
  • Lessons from my Private Sector Crash Course 10:00 am

    Presented by Automox

    The presenter spent over 20 years in the military doing both IT and cybersecurity, including running private sector partnerships for US Cyber Command the last three years. He then moved to be the CISO of a fast-moving startup. Through all of those experiences, he has gained a unique perspective on what makes the private sector great… and a few things that are not so great. This talk will unpack some of the biggest concepts around the private sector IT/security space today.

    Click to Expand

    Speaker:

    Jason Kikta
    Jason Kikta

    Jason Kikta

    Chief Information Security Officer

    Collapse This Item

  • The Journey to the Security Service Edge 10:30 am

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    John Spiegel
    John Spiegel

    John Spiegel

    Field CTO at Axis Security

    Collapse This Item

  • Refuse the Ransom: Need for a Scaleable Response Strategy 11:30 am

    Presented by Cohesity

    An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers.  Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.

    There are key players in positions to either effectively support or undermine the insider threats.  Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.

    Click to Expand

    Panel Participants:

    Brian Doyle
    Brian Doyle

    Brian Doyle

    Field CTO at Cohesity

    Collapse This Item

  • Importance of Validating Your Security Posture 11:50 am

    Presented by Picus

    For years, organizations have invested millions of dollars into best-of-breed security solutions. Yet, organizations are breached daily. Modern challenges require modern solutions. Stop assuming you are secure and prove security effectiveness before attackers come after your organization.

    The audience will gain understanding in:

    • Proactive security models vs. reactive models
    • Answers to the test is NOT cheating
    • Optimizing security solutions to become ransomware resilient
    • Quantify risk in your environment with binary artifacts.
    Click to Expand

    Speaker:

    Critt Golden
    Critt Golden

    Critt Golden

    Head of Solutions Architects at Picus Security

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Steven Roesing 12:45 pm

    Third-Party Risk: Balance Risk, Resilience and Cost to Achieve the Most Effective TPRM Program

    Today Third-Party Risk Management is about the ability to balance risk, business resilience and cost.   In this session we’ll learn: 

    • Why do we evaluate Risk from Third Parties and what is Supply Chain Resilience?
    • What is the value of a good TPRM Program?
    • What are the components of an Enterprise Risk Management Program?
    • How can technology help us with TPRM?
    • What should we look for in a TPRM platform?
    Click to Expand

    Speaker:

    Steven H. Roesing
    Steven H. Roesing

    Steven H. Roesing

    President and CEO at ASMGI

    Collapse This Item

  • Protecting Against Cyber Attacks 1:40 pm

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Satya Moutairou
    Satya Moutairou

    Satya Moutairou

    Director of Compliance at Kintent

    Dave Gunther
    Dave Gunther

    Dave Gunther

    Process & Security Evangelist at CyberFox

    Brian Doyle
    Brian Doyle

    Brian Doyle

    Field CTO at Cohesity

    John Spiegel
    John Spiegel

    John Spiegel

    Field CTO at Axis Security

    Collapse This Item

  • Have Your Cake and Eat It Too 2:30 pm

    Presented by CyberFox

    IT constantly faces the uphill battle of trying to be secure, stay in compliance, and still provide a good working experience for their end users. This is further complicated with things like cyber security insurance needs, renewals, and demanding end users. CyberFOX empowers IT teams to satisfy both the security and compliance requirements and the needs of its end users. Check out how we can help solve your privileged management and password needs, two of the biggest areas of risk in today’s IT.

    Click to Expand

    Speaker:

    Mark Sokol
    Mark Sokol

    Mark Sokol

    Vice President at CyberFox

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 2:50 pm

    Submit your bio for consideration to participate on one our Cyber Executive Panels to

    [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Michael Fields
    Michael Fields

    Michael Fields

    Senior Special Agent at USSS, Columbus Resident Office

    Anthony DeCicco
    Anthony DeCicco

    Anthony DeCicco

    Special Agent at the FBI

    Collapse This Item

  • Guest Keynote Presentation – Mark Sangster 3:40 pm

    Finding Factors not Fault: Building Cyber Resilience

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of an organization’s security, or worse, bury the true causes of incidents and lead to repeated data breaches or operations disrupting cyber incidents. Join Mark Sangster, author of No Safe Harbor and Adlumin Chief of Strategy, as he explores a famous aviation accident to identify human biases, best practice root cause analysis, and explores how blaming single factor robs us of the opportunity to identify system causes and make the changes necessary to prevent repeat incidents. 

    • Explore human biases and how they skew our findings
    • Examining a full range of factors and documenting impact
    • Continuous improvement through impartial examination
    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Cyber Executive Roundtable 4:30 pm

    Submit your bio for consideration to participate on one our Cyber Executive Panels to

    [email protected] or fill out our Call for Speakers form here.

     

     

    Click to Expand

    Panel Participants:

    Brian Shea
    Brian Shea

    Brian Shea

    CIO at MedOne Healthcare Partners

    Steven H. Roesing
    Steven H. Roesing

    Steven H. Roesing

    President and CEO at ASMGI

    Jared Price
    Jared Price

    Jared Price

    CIO, American Municipal Power

    Rich Nagle
    Rich Nagle

    Rich Nagle

    AVP and CISO at The Ohio State University

    Collapse This Item

  • Conference Closing Session 5:20 pm
  • Happy Hour Networking Reception 5:30 pm
Partners Register