Agenda

Date and TimeTitle
Jan 20, 2022
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
8:00am - 8:07am (Central)
Opening Introductions
Jan 20, 2022
9:00am - 9:30am (Central)
Check Point | 2022 Cyber Security Predictions and the Future of CSPM | Grant Asplund Chief Cyber Security Evangelist

As we enter the new year, this presentation will share several 2022 predictions from a number of Check Point cyber security experts as well as shed light on the future direction of cloud security posture.

 
Jan 20, 2022
9:30am - 10:05am (Central)
Exabeam | Why Security Programs Fail: The Maturity Model Required for Cyber Resiliency | John Nowotny Customer Success Engineer

Billions of dollars are spent annually to set up Security program’s and operation centers  across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security program’s failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Key Learnings:

  • Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
  • How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
  • Why it is critical that Security programs  become more use case-driven and full lifecycle workflow orientated
Jan 20, 2022
10:00am - 10:30am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
10:30am - 11:00am (Central)
Illumio | Crawl, Walk, Run Your Segmentation Approach | Christer Swartz Principal Technical Marketing Engineer
While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.
 
Jan 20, 2022
11:00am - 11:31am (Central)
CobaltStrike | Beyond the breach: A look at the modern security testing challenge | Joe Vest Sr. Security Consultant
Jan 20, 2022
11:30am - 11:55am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
11:55am - 1:00pm (Central)
Keynote | “Running an Effective Pen Test Program” | Allan Alford CISO & CTO TrustMAPP | Phillip Wylie Senior Cloud Penetration Tester, U.S. Bank Co Author - The Pentester Blueprint: Starting a Career as an Ethical Hacker

Live Episode of “The Cyber Ranch Podcast”

 
Jan 20, 2022
1:00pm - 1:25pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
1:25pm - 2:00pm (Central)
Menlo Security | The Next Class of Browser-Based Attacks | Mark Guntrip Sr. Director Cybersecurity Strategy

There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics on vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances at success.
Today, given that a majority of business users spend 75% of their working day in a web browser, it’s quickly become the prime target for cyber swindlers. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically generated threat toolkit built in the web where employees are productive.
During this insightful discussion, prepare to learn about the next class of browser-based attacks, but most importantly, share how organizations can protect that productivity. Key takeaways include:

  • The anatomy of recent browser-based attacks
  • Exposing why network security today is broken
  • The technology approach proven to eliminate these threats
Jan 20, 2022
2:00pm - 2:30pm (Central)
Darktrace | Stopping Ransomware with Autonomous Response | Brianna Leddy Director of Analysis

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.  

Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

This presentation will discuss: 

  • Recent ransomware threat trends, including double extortion and RDP attacks 
  • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   
  • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day 
Jan 20, 2022
2:30pm - 2:45pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
2:45pm - 3:20pm (Central)
Banyan Security | Delivering Zero Trust in the real world: A winning methodology that enabled 150,000 users to escape their legacy VPN’s | Den Jones CSO | Carlos Martinez Director of Solutions Architecture

As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.

The audience will gain understanding in:

  • How to get started: Selling the strategy, people, process and technology
  • How to make real progress in months, not years.  Demonstrating continued business value
  • Real world examples. Highlighting improvements to user experience and security posture.
  • Tips and tricks, lessons learned and what to avoid
Jan 20, 2022
3:20pm - 3:50pm (Central)
Cisco Secure | Securing Trust - How The Security Leader Enables Business Outcomes | Helen Patton Advisory CISO
What is the value of trust for a company, and what role does a security leader play to enable it? Join Advisory CISO Helen Patton in this informative session, where she will discuss the factors that make a company trustworthy, how a security team builds trust within an organization, and actionable suggestions for improving security and trust in your organization.
 
Jan 20, 2022
3:45pm - 4:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jan 20, 2022
4:00pm - 4:15pm (Central)
Closing Remarks | Prize Drawing Winners Announced
Jan 21, 2022
8:00am - 9:00am (Central)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | David Belanger CISO | Pat Benoit Global Head of Cyber Governance, Risk, and Compliance / BISO | Jessica Nemmers CSO | Jaimin Shah VP & CISO | Randy Potts CISO