Date and Time | Title | |
---|---|---|
Feb 16, 2022 8:00am - 8:08am (Eastern) | Opening Introductions | |
Feb 16, 2022 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 9:00am - 9:20am (Eastern) | BlackBerry | Risky Business: Holiday Weekends are Hazardous for Cybersecurity | Tony Lee VP, Global Services Technical Operations | |
Feb 16, 2022 9:20am - 9:50am (Eastern) | Cisco Secure | Zero Trust: Where Do You Think You’re Going? | Helen Patton Advisory CISO Nothing in security ever stays still, and Zero Trust is no different. While many organizations have begun their journey to zero trust, the elements and opportunities are changing. In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future. | |
Feb 16, 2022 9:50am - 10:15am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 10:15am - 11:15am (Eastern) | Keynote | "Win The Cyberwar With Zero Trust" | John Kindervag Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow ON2IT Cybersecurity ’Zero trust’ revolutionizes network security architecture: it is data-centric and designed to stop data breaches. The ‘zero trust’ concept also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st-century networks have been adopted by government entities and large enterprises worldwide. • Why ‘zero trust’ concept is a critical part of your cybersecurity strategy
• How to achieve your tactical and operational goals with ‘zero trust’
• Demonstrate how ‘zero trust will not only transform your network security but function as a business enabler, by focusing on the top business objectives | |
Feb 16, 2022 11:15am - 11:25am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 11:25am - 11:45am (Eastern) | Zimperium | The Security Risks of Mobile Threat Ignorance | Richard Melick Director of Product Strategy, Endpoint Whether they are corporate-owned or part of a BYOD policy, mobile devices dominate our world, integrated into the everyday life and work of the modern world. In this session, we will cover the increased attack surface introduced by these mobile endpoints and the vectors of attack exploited by malicious parties to compromise the devices, steal critical data, and leave enterprises globally at risk. Attendees will also learn about the risks many applications introduce to their mobile employees and data. | |
Feb 16, 2022 11:45am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 12:00pm - 1:10pm (Eastern) | Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | Jonathan Fowler | Howard Israel | Tony Lee | Nicole Beckwith | |
Feb 16, 2022 1:00pm - 1:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 1:15pm - 1:45pm (Eastern) | Beyond Identity | Passwordless identities for workforces, customers, and developers | Patrick McBride CMO In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal. But not all MFA is created equal. Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong Zero Trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access. | |
Feb 16, 2022 1:45pm - 2:00pm (Eastern) | Check Point | 8 Expert Cyber Security Predictions for 2022 | Grant Asplund Chief Cyber Security Evangelist Across the past couple years, many security practitioners rethought what it meant to secure businesses. And, despite strong advances in security, the attackers continue to launch successful attacks. This presentation will review the predictions of eight cyber security experts and what CISOs can expect to see in the year ahead. | |
Feb 16, 2022 2:00pm - 2:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 2:15pm - 2:40pm (Eastern) | Netenrich | Align Ops to Risk with Cyber Situational Awareness | Christopher Morales CISO and Head of Security Strategy | |
Feb 16, 2022 2:40pm - 3:11pm (Eastern) | KnowBe4 | Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network | Roger Grimes Data-Driven Defense Evangelist | |
Feb 16, 2022 3:10pm - 3:25pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 16, 2022 3:25pm - 3:55pm (Eastern) | Illumio | ZeroTrust Microsegmentation, Easier Than You Think | Christer Swartz Principal Technical Marketing Engineer | |
Feb 16, 2022 3:55pm - 4:00pm (Eastern) | Sponsor Prize Drawing | |
Feb 16, 2022 4:00pm - 4:30pm (Eastern) | Reciprocity | Compliance as a Catalyst for Reducing Risk | Rob Ellis Senior Vice President of Strategy Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
| |
Feb 16, 2022 4:30pm - 5:00pm (Eastern) | SafeBreach | 5 Recommendations for Building a Scalable Red Team | Yotam Ben Ezra VP of Product | |
Feb 16, 2022 5:00pm - 5:10pm (Eastern) | Closing Remarks | Prize Winners Announced! |