• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, March 30th.

  • Welcome / Introductions
  • How Does My Small Team Standup to a Ransomware Attack? 9:00 am

    Presented by CyGlass

    Small Team Strategies and Defense for Ransomware Attacks
    Ransomware attacks show no sign of slowing down, and a majority target small and medium size organizations. How do these organizations defend themselves with major resource constrainers, no security operations center, and maybe a working SIEM?

    This interactive presentation will look at how a ransomware attack unfolded against a small manufacturing company, the steps the company took to recover, and their final overall costs and losses. From those lessons learned, we will devise an actionable ransomware strategy, including risk reduction, early detection, technology fit, and process best practices – all in the context of what is operationally sound and affordable for a small team.

    Click to Expand

    Speaker:

    William Munroe
    William Munroe

    William Munroe

    Cybersecurity Entrepreneur, Solution Evangelist and Head of Products at CyGlass

    Collapse This Item

  • How AI Can Think Like An Attacker 9:20 am

    Presented by Darktrace

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveiled an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    Click to Expand

    Speaker:

    Ryan Soohoo
    Ryan Soohoo

    Ryan Soohoo

    Cyber Security Executive at Darktrace

    Collapse This Item

  • What Does it Mean to be Cyber Resilient? 10:15 am

    Presented by eSentire

    Reactive measures against cyberattacks are only part of having a strong security posture. To be truly cyber resilient, you need to ensure that your organization can:

    • Anticipate what threats are targeting your industry
    • Withstand cyberattacks to limit their impact\
    • Recover from cyberattacks quickly with minimal to no damage or losses
    • Adapt to the evolving threat landscape

    But how exactly can you check off all of these boxes?

    With the right tools and practices in place, you can cover all of your bases and increase your resilience against various cyber risks without straining your security team. This can look like:

    Implementing a Phishing and Security Awareness Training (PSAT) program to educate employees on the latest TTPs used by cybercriminals relevant to your industry

    Engaging a 24/7 Managed Detection and Response (MDR) for Cloud provider to enable threat detection, investigation, and proactive response across your multi-cloud environment

    Adopting a comprehensive Vulnerability Management program that enables continuous awareness of the threat landscape

    Cyber threats never rest. An effective cyber resilience strategy will help you make the most of your cybersecurity resources and IT spend without having to compromise any defense measures.

    Click to Expand

    Speaker:

    Dan Janiczek
    Dan Janiczek

    Dan Janiczek

    Senior Solutions Architect at eSentire

    Collapse This Item

  • MDR Done Right 10:35 am

    Presented by SecureWorks

    Managed Detection & Response (MDR) is an attractive time- and cost-saving solution that allows you to remediate advanced threats in your environment while unburdening your staff. But what does effective MDR really mean—and what does it take to deliver it well? 

    We’ll look at trigger points for investing in MDR and the best criteria for selecting an MDR vendor. We’ll also highlight a day in the life of a SecOps analyst and share practical advice on maximizing your MDR investment. 

    Join us to hear insights on how MDR can make an impact on your organization in helping you beat the threats.

    Click to Expand

    Speaker:

    Ross McDougall
    Ross McDougall

    Ross McDougall

    Security Engineer at Secureworks

    Collapse This Item

  • Keynote Presentation: Mathieu Gorge 10:55 am

    Making sense of Geopoltical Risks in 2023 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books by Keynote Speaker Mathieu Gorge 11:40 am

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • Lunch Break
  • Lunch Demo: Zero Trust- Does Not Have to be Hard 12:05 pm

    Presented by ColorTokens

    Learn about the who, what, and how in zero trust.

    Click to Expand

    Speaker:

    Blaine Deutsch
    Blaine Deutsch

    Blaine Deutsch

    Senior SE at ColorTokens

    Collapse This Item

  • Lunch Demo: OneForce 12:15 pm
  • 2023 Trends & Directions in Cybersecurity 12:25 pm

    If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023? 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    William Munroe
    William Munroe

    William Munroe

    Cybersecurity Entrepreneur, Solution Evangelist and Head of Products at CyGlass

    Dan Janiczek
    Dan Janiczek

    Dan Janiczek

    Senior Solutions Architect at eSentire

    Mike McCabe
    Mike McCabe

    Mike McCabe

    Regional Director at Qohash

    Collapse This Item

  • Demystifying IoT Devices on the Network 1:20 pm

    Presented by Arista

    The number of IoT devices continues to grow at an impressive rate every year, with the total number pushing nearly 15 billion. These unmanaged devices easily circumvent existing corporate policies and controls as they often lack the ability to be monitored via endpoint security solutions, asset management, etc. This lack of both visibility and ability to control makes it virtually impossible to understand what an organization’s true threat landscape is. This presentation is the culmination of several years of research into identifying, tracking, and reporting on unmanaged devices using behavioral cues fundamental to how IoT devices function.

    Click to Expand

    Speaker:

    Ighor Tavares
    Ighor Tavares

    Ighor Tavares

    Threat Research Specialist at Arista

    Collapse This Item

  • Data Security Posture Management (DSPM) - What is it? How will it benefit my organization? 1:40 pm

    Presented by Qohash

    Security and risk managers face challenges mitigating data security and privacy risk as sensitive data rapidly proliferates across on-premises and cloud environments. 

    According to Gartner, successful risk mitigation today requires leveraging DSPM technology that provides visibility into 4 key areas: where sensitive data resides, who is accessing it and how, and the pathway to quick remediation. 

    You can’t unsee a security issue once you’ve identified it;DSPM technology puts you in a position to take effective action. In this session, learn the fundamentals of DSPM, and how using it as the basis for conducting risk assessments and implementing and enforcing data governance policies can improve your organization’s security posture.

    Click to Expand

    Speaker:

    Mike McCabe
    Mike McCabe

    Mike McCabe

    Regional Director at Qohash

    Collapse This Item

  • Guest Keynote Presentation: John Felker 2:00 pm

    Cybersecurity Leadership Lessons, from Hawaii to Afghanistan

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Collapse This Item

  • The Importance of Measuring Risk 2:50 pm

    Presented by Whitehat Virtual Technologies

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment. 

    Click to Expand

    Speaker:

    Val King
    Val King

    Val King

    CEO at Whitehat Virtual Technologies

    Collapse This Item

  • S.O.S. - Saving Our Sanity: How Managed Detection and Response Rescues IT Pros 3:10 pm

    Presented by BitLyft

    This presentation will focus on how Managed Detection and Response (MDR) can help IT professionals save their sanity. IT professionals often face the challenge of managing large volumes of security data, which can be overwhelming and time-consuming. MDR is an approach that can help IT professionals to detect and respond to cyber threats in real-time, while reducing the burden of managing security operations. 

    The presentation will cover the benefits of MDR, including real-time threat detection and response, continuous monitoring, and access to cybersecurity experts. It will also explore how MDR can help IT professionals to improve their overall security posture, reduce the risk of data breaches, and enhance their organization’s compliance with industry standards. 

    The presentation will conclude with practical tips on how IT professionals can select the right MDR service provider and how to work with them to maximize the benefits of the service. Attendees will leave the presentation with a better understanding of how MDR can help them to manage their security operations more effectively, reduce their workload, and ultimately, save their sanity.

    Click to Expand

    Speaker:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:30 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Jake Street
    Jake Street

    Jake Street

    USSS - KC Field Office

    David L. Teska
    David L. Teska

    David L. Teska

    Regional Sector Outreach Coordinator at Department of Homeland Security

    Joshua Bryant
    Joshua Bryant

    Joshua Bryant

    Network Intrusion Forensic Analyst at United States Secret Service

    Collapse This Item

  • Cyber Executive Panel 4:20 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Tyrone Watson-Ferguson
    Tyrone Watson-Ferguson

    Tyrone Watson-Ferguson

    Chief Information Security Officer - Security Bank of Kansas City

    Yaron Levi
    Yaron Levi

    Yaron Levi

    Chief Information Security Officer at Dolby

    Jeff Wagner
    Jeff Wagner

    Jeff Wagner

    Founder & CEO, Executive Consultant at Aspis

    Neil Watkins
    Neil Watkins

    Neil Watkins

    Chief Information Security Officer at Therapy Brands

    Carraig Stanwyck
    Carraig Stanwyck

    Carraig Stanwyck

    VP, Global Cybersecurity and Compliance at Avnet

    Collapse This Item

  • Conference Closing Session
  • Networking Reception and Happy Hour 5:00 pm
Partners Register