• Featured Speakers

    Collapse This Item

Event Schedule

Times for the Tampa Cybersecurity Conference are in Eastern Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, March 2nd.

  • Welcome / Introductions
  • Best of Both Worlds: Privileged Access Management 8:30 am

    Presented by CyberFox

    As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates. 

    Click to Expand

    Speaker:

    Bill Morgan
    Bill Morgan

    Bill Morgan

    Senior Engineer at CyberFox

    Collapse This Item

  • Using the dark web to gather pre-attack intelligence 8:50 am

    Presented by SearchLight Cyber

    Defining the pre-attack stage of a cyberattack:

    • How intelligence on the pre-attack tactics of threat groups can help organisations pre-empt and prevent attacks
    • Real life examples of when threat groups’ pre-attack reconnaissance and resource development activity could be observed in the dark web
    • How dark web intelligence can be mapped to pre-attack tactics of the MITRE ATT&CK framework to practically improve defences.
    Click to Expand

    Speaker:

    Evan Blair
    Evan Blair

    Evan Blair

    General Manager at Searchlight Cyber

    Collapse This Item

  • Hybrid Cloud Cyber Resiliency from Prevention to Recovery 9:45 am

    Presented by Storeagepipe

    Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. The likelihood of ransomware attacks has transitioned from ‘if’ to ‘when,’ and many discover too late that they have gaps in their disaster recovery plans.

    Do you have the right people, tools, and testing in place to protect your most valuable asset 24/7 – your data?

    Get key insights from Storagepipe on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size.

    Click to Expand

    Speaker:

    Steven Rodin
    Steven Rodin

    Steven Rodin

    Chief Executive Officer & President at Storagepipe

    Collapse This Item

  • How AI Can Think Like an Attacker 10:15 am

    Presented by Darktrace

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    Click to Expand

    Speaker:

    Ryan Schuler
    Ryan Schuler

    Ryan Schuler

    Sr Cyber Technology Specialist at Darktrace

    Collapse This Item

  • Why Validating Your Security Posture Matters 10:45 am

    Presented by Picus Security

    Security leaders make significant investments in best-of-breed security solutions, pentesting, and ransomware assessments each year. Yet, organizations are breached daily. As Einstein said, “Insanity is doing the same thing over and over again and expecting different results.” Security leaders need a paradigm shift. Proactive security models have gone mainstream and can be easily adopted by organizations to stay ahead of their adversaries. This session will discuss lessons learned from the trenches and outline best practices to shift to a proactive security program.

     

    Click to Expand

    Speaker:

    Volkan Erturk
    Volkan Erturk

    Volkan Erturk

    Co-Founder and CTO, Picus Security

    Collapse This Item

  • Guest Keynote: Justin Crenshaw 11:25 am

    Presented by SSA Justin Crenshaw

    Speaker:

    Justin Crenshaw
    Justin Crenshaw

    Justin Crenshaw

    SSA at FBI

    Collapse This Item

  • 2023 Trends & Directions 12:00 pm

    If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023? 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion. 

    Click to Expand

    Moderator:

    Larry Whiteside Jr.
    Larry Whiteside Jr.

    Larry Whiteside Jr.

    CISO at RegScale

    Panel Participants:

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Steven Rodin
    Steven Rodin

    Steven Rodin

    Chief Executive Officer & President at Storagepipe

    Nikunj Nagalia
    Nikunj Nagalia

    Nikunj Nagalia

    Director of Professional Services at ThreatModeler

    Bill Steele
    Bill Steele

    Bill Steele

    Data Management and Security Evangelist at Cohesity

    Bryan Langley
    Bryan Langley

    Bryan Langley

    Senior Advisor at Cyber Florida

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Mathieu Gorge 1:10 pm

    Making sense of Geopoltical Risks in 2022 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes? 

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books by Keynote Speaker Mathieu Gorge 1:40 pm

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • METHODS FOR DETECTING RANSOMWARE: PROS AND CONS OF EACH 2:05 pm

    Presented by Malwarebytes

    In the fight against ransomware, much of the discussion revolves around prevention and response. Actually detecting the ransomware, however, is just as important to securing your business

    Detection sits right between both prevention and response, and it’s a critical first defense against ransomware. The truth is that ransomware will get through your systems one way or another. And when it does, it’s important to detect it right away so you can stop it from moving through your network and encrypting any valuable or sensitive files.

    But detecting ransomware can be tricky. Attackers use obfuscation and evasion techniques to avoid detection, and new ransomware variants are being produced every day. As a result, businesses should be using multiple different ransomware detection techniques, fully aware of the pros and cons of each.

    In this presentation, we’ll take a look at 5 ransomware detection techniques and their pros and cons, as well as make recommendations for what organizations should look for in an anti-ransomware EDR.

    Click to Expand

    Speaker:

    Greg Rich
    Greg Rich

    Greg Rich

    Director, North America Corporate Solutions, Malwarebytes

    Collapse This Item

  • Zero Trust, UEBA, and You: The Power of Human Insight in Cybersecurity 2:25 pm

    Presented by ManageEngine

    In this presentation, we will discuss the synergies between Zero Trust and User and Entity Behavior Analytics (UEBA) in addressing human-related security threats. Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. We will provide practical insights on how to implement Zero Trust and UEBA, including key considerations such as data privacy, compliance, and governance. Attendees will gain an understanding of how these technologies can be used to build a comprehensive and proactive approach to cybersecurity.

    Click to Expand

    Speaker:

    Ray Manash
    Ray Manash

    Ray Manash

    Manager - Customer Success at Manage Engine

    Collapse This Item

  • Guest Keynote: Jamie Grant 2:45 pm

    Creating Florida’s First Cybersecurity Program: Lessons Learned So Far

    Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets.  Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections. 

    Attend to talk about the problem, and see what US enterprises are doing to prepare themselves for these situations.

    Click to Expand

    Speaker:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Guest Keynote: Hadas Cassorla 3:35 pm

    Nobody Cares That You Can Do Your Job: And How To Fix That

    A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful.

    Click to Expand

    Speaker:

    Hadas Cassorla
    Hadas Cassorla

    Hadas Cassorla

    CISO - M1 Finance

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 4:05 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Rick Dean
    Rick Dean

    Rick Dean

    Assistant to the Special Agent in Charge at USSS

    Philip Kapusta
    Philip Kapusta

    Philip Kapusta

    Future Operations Bureau Commander at Pasco Sheriff's Office

    Kelly Shannon
    Kelly Shannon

    Kelly Shannon

    Assistant Special Agent in Charge at FBI

    Michael Pierno, MEP, USCG(ret)
    Michael Pierno, MEP, USCG(ret)

    Michael Pierno, MEP, USCG(ret)

    Maritime Transportation System Specialist - Cyber at USCG, St. Petersburg

    Kristopher D. Pagitt
    Kristopher D. Pagitt

    Kristopher D. Pagitt

    Assistant Special Agent In Charge (ASAC) at Homeland Security Investigations

    Collapse This Item

  • Cyber Executive Panel 4:50 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

     

    Click to Expand

    Moderator:

    Hadas Cassorla
    Hadas Cassorla

    Hadas Cassorla

    CISO - M1 Finance

    Panel Participants:

    Steve Hindle
    Steve Hindle

    Steve Hindle

    CISO & Acting CIO at Mad Mobile

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Martin Zinaich
    Martin Zinaich

    Martin Zinaich

    CISO at City of Tampa

    Anil Varghese
    Anil Varghese

    Anil Varghese

    Senior Operating Advisor at Francisco Partners

    Collapse This Item

  • Conference Closing Session 5:20 pm
  • Happy Hour Networking Reception 5:30 pm
Partners Register