Agenda

Date and TimeTitle
Feb 16, 2022
8:00am - 8:08am (Eastern)
Opening Introductions
Feb 16, 2022
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
9:00am - 9:20am (Eastern)
BlackBerry | Risky Business: Holiday Weekends are Hazardous for Cybersecurity | Tony Lee VP, Global Services Technical Operations
Feb 16, 2022
9:20am - 9:50am (Eastern)
Cisco Secure | Zero Trust: Where Do You Think You’re Going? | Helen Patton Advisory CISO

Nothing in security ever stays still, and Zero Trust is no different.  While many organizations have begun their journey to zero trust, the elements and opportunities are changing.  In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.

 
Feb 16, 2022
9:50am - 10:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
10:15am - 11:15am (Eastern)
Keynote | "Win The Cyberwar With Zero Trust" | John Kindervag Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow ON2IT Cybersecurity

’Zero trust’ revolutionizes network security architecture: it is data-centric and designed to stop data breaches. The ‘zero trust’ concept also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st-century networks have been adopted by government entities and large enterprises worldwide.  
In this session, John will discuss: 

• Why ‘zero trust’ concept is a critical part of your cybersecurity strategy
• How to achieve your tactical and operational goals with ‘zero trust’
• Demonstrate how ‘zero trust will not only transform your network security but function as a business enabler, by focusing on the top business objectives
Feb 16, 2022
11:15am - 11:25am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
11:25am - 11:45am (Eastern)
Zimperium | The Security Risks of Mobile Threat Ignorance | Richard Melick Director of Product Strategy, Endpoint

Whether they are corporate-owned or part of a BYOD policy, mobile devices dominate our world, integrated into the everyday life and work of the modern world.  In this session, we will cover the increased attack surface introduced by these mobile endpoints and the vectors of attack exploited by malicious parties to compromise the devices, steal critical data, and leave enterprises globally at risk. Attendees will also learn about the risks many applications introduce to their mobile employees and data.

 
Feb 16, 2022
11:45am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
12:00pm - 1:10pm (Eastern)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | Jonathan Fowler | Howard Israel | Tony Lee | Nicole Beckwith
Feb 16, 2022
1:00pm - 1:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
1:15pm - 1:45pm (Eastern)
Beyond Identity | Passwordless identities for workforces, customers, and developers | Patrick McBride CMO

In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal.  But not all MFA is created equal.  Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong Zero Trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access.

 
Feb 16, 2022
1:45pm - 2:00pm (Eastern)
Check Point | 8 Expert Cyber Security Predictions for 2022 | Grant Asplund Chief Cyber Security Evangelist

Across the past couple years, many security practitioners rethought what it meant to secure businesses. And, despite strong advances in security, the attackers continue to launch successful attacks. This presentation will review the predictions of eight cyber security experts and what CISOs can expect to see in the year ahead.

 
Feb 16, 2022
2:00pm - 2:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
2:15pm - 2:40pm (Eastern)
Netenrich | Align Ops to Risk with Cyber Situational Awareness | Christopher Morales CISO and Head of Security Strategy
Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is protected and your assets stay secure with Cyber Situational Awareness.
 
Feb 16, 2022
2:40pm - 3:11pm (Eastern)
KnowBe4 | Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network | Roger Grimes Data-Driven Defense Evangelist
Feb 16, 2022
3:10pm - 3:25pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 16, 2022
3:25pm - 3:55pm (Eastern)
Illumio | ZeroTrust Microsegmentation, Easier Than You Think | Christer Swartz Principal Technical Marketing Engineer
Feb 16, 2022
3:55pm - 4:00pm (Eastern)
Sponsor Prize Drawing
Feb 16, 2022
4:00pm - 4:30pm (Eastern)
Reciprocity | Compliance as a Catalyst for Reducing Risk | Rob Ellis Senior Vice President of Strategy

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.

  • Challenges in Compliance and Risk Programs
  • Five Best Practices in starting a Risk Program
  • Compliance Considerations that will Improve Your Risk Posture
Feb 16, 2022
4:30pm - 5:00pm (Eastern)
SafeBreach | 5 Recommendations for Building a Scalable Red Team | Yotam Ben Ezra VP of Product
Feb 16, 2022
5:00pm - 5:10pm (Eastern)
Closing Remarks | Prize Winners Announced!