Agenda

Date and TimeTitle
Oct 14, 2021
8:00am - 8:19am (Central)
Meet Our Exhibit Partners

Enjoy a little background on our Vendor Partners that share the Solution Showcase today. These videos give you a bit of background on each of them, so you can learn more and go check out their Virtual Exhibit Booths.

They're open NOW - and will be here until the end of the day to talk more about your business challenges, and their solutions. You can do a voice/video or text chat with them from their virtual exhibit booths. 

Oct 14, 2021
8:20am - 8:25am (Central)
Welcome, Opening Introductions

Welcome to the Texas Virtual Cybersecurity Summit!

Since we quickly adjusted to limitations of the COVID-19 pandemic, we have hosted more than 30 virtual summits. We were the first to serve the community in each locality, where we have grown to provide a online gathering for cybersecurity professionals.

There is a great deal for us all to learn and share today, so let's get started.

Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community comprises over 650,000 members and 250 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers, and government agencies such as the FBI, InfraGard, US Secret Service, and the Department of Homeland Security. Data Connectors brings live conferences to over 45 cities across North America each year, and also provides interactions with the community via virtual conferences, Web Briefings, and regular communications.

We have an action-packed agenda today, with a great line up of speakers - from subject matter experts who normally fill the halls of innovative solution providers to our CISO Panelist Execs, and of course, a keynote presentation led by our distinguished guest, James Harris, from the FBI Cyber Deivision, who will lead our Keynote today.

Each presentation will run about 20 or so minutes, and you can ask questions via the electronic Q&A feature at any time during the presentation. Aside from the presenters themselves, the virtual format allows us to have moderators from the same group looking at key questions that come in, so they can answer you in real-time.

If the presenter does not get to your question - don't worry. Each presenter and their team are given copies of the questions, along with who has asked them - so that if they don't get to you, they can respond afterward via email or over the phone.

Oct 14, 2021
8:26am - 8:41am (Central)
CISO Author Interview - Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

The Greater DFW Area is blessed with a great many learned CISOs, and we’re pleased to have George Finney, CISO from Southern Methodist University (SMU) as part of the agenda for the Dallas Cybersecurity Summit. Today, we’ll dig into his latest book, “Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future.” Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. This book examines security challenges using lessons learned from psychology, neuroscience, history, and economics. Spanning those habits – literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception – are stories that assert that cybersecurity is not a technology problem; it’s a people problem. In this “fireside chat” style Q&A, George will be interviewed by our moderator Michael. He will share some of the lessons from the book, experiences on learnings from his 20+ year CISO career and talk about his inspirations.

Oct 14, 2021
8:42am - 8:57am (Central)
Attivo Networks Disrupting Lateral Movement by Securing Active Directory

Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. 

In this session, Nick Houck will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. 

Some key highlights include: 

  • How Threat Actors use AD to accomplish their goals 
  • Why Monitoring Active Directory is not enough 
  • What simple tools you can deploy to dramatically improve your security posture by better securing AD
Oct 14, 2021
8:58am - 9:25am (Central)
Auth0 - 2021 State of Secure Identity Report

Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. 

During this session, we’ll provide greater insight into which industries are: 

  • Most highly targeted by credential stuffing attacks 
  • Most highly targeted by SQL injection attacks 
  • Leading the way in MFA adoption to improve overall security posture 

We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats.

Oct 14, 2021
9:26am - 9:44am (Central)
Morning Break

Spend some time chatting with our Vendor Partners in the Solutions Showcase.

We have several breaks throughout the day, and it's a good time to go and check out some of the innovative solution providers who have showcased their offerings today. They have taken the time to flesh out their virtual booth environments with the latest information via presentations, datasheets, summaries, and materials that will be useful to you.

Our cybersecurity community of over 650,000 members, consistently reminds us that events like this summit are a great way to stay on top of the newest technology offerings, and to make sure that they are surfacing the most effective solutions to their security challenges, from the technology and services partners that come to our conferences.

Thank you for your patience, we'll get started again soon with more educational presentations from interesting subject matter experts!

Oct 14, 2021
9:45am - 10:00am (Central)
Cybereason - Ransomware Decoded: Understanding & Preventing Modern Ransomware Attacks

Learn how to become fearless in the face of modern ransomware attacks. Next-gen ransomware has evolved to better evade standard defenses and targeted attacks stand a high chance of success against underprepared environments, making a behavior-based approach to prevention, detection, and response required for success. 

Join our session to understand how to deploy fearless ransomware protection to detect the preliminary stages of a ransomware attack, fully analyze the scope and scale of the operation, and prevent the execution of the malicious ransomware payload to mitigate future cyber risk. 

WHY SHOULD I ATTEND? 

  • Learn about the latest ransomware trends 
  • Dissect discoveries from Cybereason’s Nocturnus team 
  • Become empowered to defend against ransomware
Oct 14, 2021
10:01am - 10:16am (Central)
baramundi - Remote Work: The Wild West of Endpoint Management

The pandemic forced many of us to switch to working remotely overnight. At the time this was and continues to be an ongoing challenge for IT Departments that need to manage and maintain their remote endpoints. Now that companies are trending towards long-term remote work options, IT Infrastructure has to continue to adapt to the new and demanding ways of working from home. During this session we will cover what remote work has to do with the Wild West and what you need to be aware of to tame these challenges.

Oct 14, 2021
10:17am - 10:44am (Central)
Expert Panel Discussion - Ransomware Prevention/Preparation, or the Closest You Can Come To It (Pre-attack Practices)

Unless you’ve been under a rock, you’ve seen some big ransomware headlines. Moreover, ransomware-as-a-service changes the way many cyber leaders think about this topic, and changes some of the economics related to it. In this panel, our experts will talk about best practices, tactics and tricks for prevention and preparation. [NOTE: Post-Attack concepts will be discussed separately in a panel this afternoon] Sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

Oct 14, 2021
10:45am - 10:59am (Central)
Break

Another opportunity to learn from our Solution Providers what their offerings can do to help your business.

The prize drawing will be conducted online. For those vendor partners offering geek chic tech swag prizes, you can enter to win them by clicking the link in their virtual exhibit booth - and checking in with them to get the "prize code" you will need to enter to win.

You must be present to win

Remember to stick around to the end of our CISO Panel & Summit Closing session, where our CSO, Michael will announce some of the the prize winners. You must be present (online) to win. You can win only ONE Geek Chic prize. The solution provider who is offering that item will get in touch with you directly.

Enjoy!

Oct 14, 2021
11:00am - 11:22am (Central)
Bitglass - The Rise of Secure Access Service Edge (SASE)

Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

  • Why organizations need SASE
  • The key components of SASE offerings
  • How SASE architectures impact performance
Oct 14, 2021
11:23am - 11:41am (Central)
Kenna Security - Introduction to Risk-Based Vulnerability Management

Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities. 

But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first. 

Join Kenna Security’s CTO and Co-Founder Ed Bellis as he: 

  • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge 
  • Details the findings on how risk-based is the way to get ahead in vulnerability management 
  • Lays out several factors that drive better remediation performance 
  • Provides steps for setting up a successful risk-based vulnerability management program
Oct 14, 2021
11:42am - 12:14pm (Central)
Keynote - Insights From the FBI Internet Crime Complaint Center (IC3): 2021 Trends

Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to be a lucrative modus operandi for criminal groups and state-actors looking to launder funds and evade sanctions. Cryptocurrency intelligence products, such as CipherTrace Inspector, can remove the financial incentives from ransomware perpetrators without risking brute force attacks. In May 2021, US-based Colonial Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from DarkSide severely hindered the refinery’s operations. In March 2020, a DOJ Verified complaint illustrated how North Korea launched sophisticated attacks on cryptocurrency exchanges to finance their WMD program by laundering hundreds of millions of dollars’ worth of the stolen cryptocurrency through several banks and cryptocurrency exchanges. An uptick in Iranian and DPRK state-sponsored ransomware also led to OFAC issuing an advisory in October 2020 to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. 

Learn how investigators were able to utilize blockchain analysis tools to follow the illicit flow of funds and see exactly how bad actors moved stolen crypto to virtual asset service providers and, eventually, banks.

Oct 14, 2021
12:15pm - 12:39pm (Central)
Lunch Break

Take a few minutes to grab a bite to eat... from your own kitchen!

Ordinarily, we'd invite you to enjoy a nice meal in the Solutions Showcase. Today, since you're at home - why not grab some food and come back to your computer to peruse some of our interesting vendor partner's solutions.

Make sure to take the time to work your way through those virtual exhibits. Look for the "Prize Giveaway" in each. There is a code associated with each of the prize giveaways... all you need to do is chat with the staff at the virtual exhibit booth, and they will gladly give you the price code, so that you will be entered to win the "geek chic" tech swag stuff that they are giving away.

Thank you for taking the time to meet with the vendor partners who support our summits, in the solution showcase. Data Connectors is proud to serve the cybersecurity community in North America. Our events are made possible by the support of those vendor partners, who appreciate your taking the time to understand how their solutions might address your cybersecurity challenges.

Oct 14, 2021
12:40pm - 1:02pm (Central)
Noname Security - Securing the Modern API Ecosystem

APIs are central to digital transformation. Public cloud adoption, modern application architectures, and cloud-native designs capitalize on APIs as a foundational building block. Meanwhile, Gartner predicts that APIs will become the most frequently targeted attack vector by 2022.Attendees of this presentation will learn modern API strategies for security and risk management, including how to perform:

  • API discovery and inventory management
  • continuous vulnerability identification and testing
  • runtime prevention and detection

Importantly, we will focus on orchestration across business, technology, and security teams to empower API-centric business and technology strategies with a shared, complete picture of API risks from code to production.

Oct 14, 2021
1:03pm - 1:27pm (Central)
Ivanti - Zero Trust Security for Everywhere Workplace

As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before. 

Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

Oct 14, 2021
1:28pm - 1:55pm (Central)
Expert Panel Discussion - Empowering Users to be the Best Human Firewall in your Organization

Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity.

Our panelists today will talk more about this issue, and what you can do to make your users the best last line of defense.

Oct 14, 2021
1:56pm - 2:08pm (Central)
Afternoon Break

Another opportunity to learn from our Solution Providers what their offerings can do to help your business.

The prize drawing will be conducted online. For those vendor partners offering geek chic tech swag prizes, you can enter to win them by clicking the link in their virtual exhibit booth - and checking in with them to get the "prizecode" you will need to enter to win.

You must be present to win

Remember to stick around to the end of our CISO Panel & Summit Closing session, where our CSO, Michael will announce some of the the prize winners. You must be present (online) to win. You can win only ONE Geek Chic prize. The solution provider who is offering that item will get in touch with you directly.

Enjoy!

Oct 14, 2021
2:09pm - 2:30pm (Central)
GitGuardian - How Leaky Can It Git? How Scanning Public Git Repository Commits Uncovered 2 Million Leaked Secrets in 2020

Leaked secrets like API keys, security certificates and other credentials are a growing security risk for organizations which has led to many high profile security breaches. The biggest source of leaked credentials is without question within public git repositories. GitHub, the largest host of open-source code, had more than 60 million repositories created in a single year. Public code distribution on this scale brings with it a serious security threat, especially when you consider the many leaks that happen on personal repositories outside of organizations control. 

With such a vast amount of data stored on GitHub, it has been difficult to quantify the extent of this problem, until now. GitGuardian conducted the largest research project to date on leaked secrets in public repositories. The project scanned 2.5 million commits a day and over 1 billion commits throughout the year uncovering over 2 million leaked secrets. This presentation looks at why secrets and other sensitive information are frequently leaked through git including the type of secrets commonly leaked and where. Additionally, the presentation will look at how to prevent Secrets Sprawl from individual developers, security teams and organizations as a whole.

Oct 14, 2021
2:31pm - 2:50pm (Central)
Swimlane - The Automation Journey: Where's the Wall

Gartner says 69% of Boards of Directors accelerated their digital business initiatives following COVID-19 disruption. This has made organizations shorten the time to integrate technologies, reduce the effort it takes to update them, and reduce development costs. We will discuss the automation journey and where we are seeing where most organizations hit the 'automation' wall.

Oct 14, 2021
2:51pm - 3:18pm (Central)
Expert Panel Discussion - DevSecOps: Application Security in Hybrid, Multi-Cloud Environments

89% of CISOs say microservices API, containers, and Kubernetes have created application security blind spots. As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities. With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear. 

In this panel, our experts will discuss some of the various approaches to address these issues. The discussion will cover challenges faced by teams of all sizes, and processes, tools and methods that are in use to address.

Oct 14, 2021
3:19pm - 3:27pm (Central)
Break

Another opportunity to learn from our Solution Providers what their offerings can do to help your business.

The prize drawing will be conducted online. For those vendor partners offering geek chic tech swag prizes, you can enter to win them by clicking the link in their virtual exhibit booth - and checking in with them to get the ""prize code"" you will need to enter to win.

You must be present to win

Remember to stick around to the end of our CISO Panel & Summit Closing session, where our CSO, Michael will announce some of the the prize winners. You must be present (online) to win. You can win only ONE Geek Chic prize. The solution provider who is offering that item will get in touch with you directly.
Enjoy!

Oct 14, 2021
3:28pm - 3:50pm (Central)
Fluid Attacks - Automatic Vulnerability Discovery: False Promise for the DevSecOps world?

DevSecOps suggests that all security activities should be as automated as possible. Regarding automatic vulnerability discovery: How much can we expect? 

How many vulnerabilities are discovered automatically? How many are still undetected? (escapes or false negatives), Are automatic tools enough? In this talk, we will answer and teach you how to answer these and other related questions in a quantitative way.

Oct 14, 2021
3:51pm - 4:11pm (Central)
Lookout - The Art & Science of Cloud Security

Come learn about the beauty of the cloud while applying the right "science" to securing your multiple cloud services. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy work of art.

Oct 14, 2021
4:12pm - 4:45pm (Central)
Guest Keynote - Grounds’ Rules for Cyber Risk Quantification (CRQ): A Realist’s Guide on Why CRQ is a Prerequisite and How to Do It Right

In almost all areas of business and corporate management, we speak in terms of facts, figures and real fiscal currencies. So why do cybersecurity leaders opt for gradients (low, medium, high, critical) and colors (Green, Amber, Red… “traffic light” chart)?

This keynote will analyze the key reasons why qualitative risk methods and relative ratings are woefully inadequate and do not meet basic business needs; and delve into their weakness as it pertains to the inputs and conclusions.

Adding business context and factoring in criticality, potential revenue impact, and likelihood to occur are a start; however, vulnerabilities rated (relatively) based on their technical characteristics and overall exploitability will not build an accurate risk picture. Gavin will then expand on specific techniques on how to quickly adopt a meaningful quantitative risk management (QRM) methodology and framework that is not exclusively built around minimizing Annualized Loss Expectancy (ALE).

Specific working examples will highlight why ALE-based risk quantification is only a part of the equation. Further, the talk will expand on how using QRM can go beyond risk reduction to deliver measurable and quantifiable analysis to support business enablement and rationalize cybersecurity controls and investment levels. 

In essence, his session will help business leaders to understand how to factor cyber risk and technology services risk into business risk in a meaningful, quantifiable fashion.

Oct 14, 2021
4:46pm - 5:05pm (Central)
Special Guest Interview - John Kindervag

After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on join Palo Alto Networks as a Field CTO, and is now at ON2IT.

Still a DFW-Area local, John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.

After eight and a half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team, John went on to join Palo Alto Networks as a Field CTO, and is now at ON2IT.

 

Still a DFW-Area local, John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity. 

Today, John will be interviewed by George Finney, local CISO from SMU, and host of The Well Aware Security Podcast.  John talks about the ideation of Zero Trust, inspirations for the thinking around it and digs into some of the (many) misconceptions about it across the cybersecurity landscape.

Oct 14, 2021
5:06pm - 5:35pm (Central)
CISO RoundTable

The CISO RoundTable today is made up of some of the leading security executives in the state of Texas. The session will be moderated by Data Connectors CSO, Michael Hiskey. Each Executive will start by giving a brief introduction, and then our moderator will lead them through several discussion points, based on input from our audience, and the concepts the CISOs were most excited to talk about with the attendees today.

We'll also open up for questions - in this live session, CISOs and CIOs will share the experience, challenges, solutions, and best practices that have learned over their careers. Please take the time to submit thoughtful questions for the panel, as we will reserve time for those as well.

 
  • Chuck Springer, CISO at First American Payment System
  • Patrick Benoit, Global Head of Cyber GRC / BISO at CBRE
  • Dave Belanger, CISO at Maxor National Pharmacy Services
  • Chris Wolski, CISO at Port of Houston Authority
  • Anand Singh, Global CISO at Alkami
  • Jeff Kirby, CISO at Interstate Batteries
Oct 14, 2021
5:36pm - 5:53pm (Central)
Summit Closing Session

What a Day! Thank you!

On behalf of the Data Connectors Team, we hope that you have learned a lot during the past few hours. Believe it or not, pulling together a Virtual Summit takes more work than a physical conference, in many ways!

Our small business supports 20 families, and is headquartered in the St. Louis area. We’re pleased to support cybersecurity professionals in local communities all over North America. We hope that for the hundreds of you here today, you and your families are safe and healthy. We learn a great deal with each Summit, and plan to make these virtual events a part of our regular program, even long after we’re back to physical conferences and gatherings. Moreover, supporting local networking, expansion and interaction is a core value for our business.

You must be present to win! 

Be sure to watch the end of the CISO panel as we will live stream some of the prize winners from our leaderboard and more. Many of our exhibit partners bring cool stuff for our attendees to win. From audiophile’s dreamy wireless earbuds to good-as-cash gift cards, our community loves the chance to get some of the latest tech gear. Each prize has been graciously offered by our vendor partners, and the winners are drawn from the pool of attendees who have interacted with the team at each virtual exhibit booth.

Oct 14, 2021
5:54pm - 6:00pm (Central)
Solutions Showcase - Open Til 6pm

Enjoy a little more time with our Vendor Partners that share the Solution Showcase today. Go check out their Virtual Exhibit Booths and talk more about your business challenges, and their solutions. You can do a voice/video or text chat with them from their virtual exhibit booths.