Agenda

Date and TimeTitle
Feb 24, 2022
8:00am - 8:07am (Pacific)
Opening Introductions
Feb 24, 2022
8:00am - 9:00am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
9:00am - 9:22am (Pacific)
Darktrace | Fast and Furious Attacks: Using AI to Surgically Respond​ | Justin Fier Director for Cyber Intelligence and Analysis

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Justin Fier, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.  

·      Topic for this session– Autonomous Response 

·      Explore today’s threats and challenges

·      How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. 

Feb 24, 2022
9:22am - 10:00am (Pacific)
Exabeam | Why Security Program’s Fail: The Maturity Model Required for Cyber Resiliency | Bob Reny CTO and Principal SE

Billions of dollars are spent annually to set up Security program’s and operation centers  across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security program’s failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Key Learnings:

  • Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
  • How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
  • Why it is critical that Security programs  become more use case-driven and full lifecycle workflow orientated
Feb 24, 2022
10:00am - 10:30am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
10:30am - 11:00am (Pacific)
deepwatch | Choose Your Own” SOAR Adventure | Alisa Moretto Director, Solutions Architecture

Have you ever felt like managing your organization’s information security program is like one of the iconic “Choose Your Own Adventure” books?  Choose one path, your ecosystem gets hit with ransomware, choose another technology becomes shelfware, choose another path and you get promoted to CISO.

Security is both hard and scary.  Practitioners and leaders across the globe lose sleep every night wondering if they have made the right choices for their security program.  Why is technology failing us?  We have become increasingly reliant on technology, and for many immature organizations, it can add complexity, rather than solve for it.

This presentation will help viewers understand the need for a “back to the basics” approach, with emphasis on how repeatable, tested, and scalable processes are needed to ensure the success of automation that can demonstrate true ROI to an organization.

Together we can choose the adventure that ensures the Confidentiality, Integrity, and Availability of our organization’s ecosystem!

In this presentation, Director, Solutions Architecture, Alisa Moretto, will provide her insights from various use cases of the following points:

  • How communication could be at the root of your failed launches
  • How evaluating risk before and after SOAR can help prevent future failures
  • How to avoid “shiny object syndrome”
  • How to demonstrate your organization’s SOAR ROI
Feb 24, 2022
10:58am - 11:28am (Pacific)
SafeBreach | Continuous Breach Attack Simulation - A Pragmatic Approach to Your Security Portfolio | Avishai Avivi CISO

This presentation examines some guiding principles that make a case for using continuous breach attack simulation as one of the best ways to test and exercise your security posture. We review the notion of abiding by the spirit of the compliance framework vs. the letter of that framework. We’ll then discuss how you can get the most benefit out of your security controls through simulating real-world scenarios without risk to your environment. We then conclude with the positive impact that performing continuous breach attack simulation can bring to your communications up to the executive and board level.

Feb 24, 2022
11:30am - 12:00pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
12:00pm - 1:05pm (Pacific)
Keynote | "Choosing Your Ground - Controlling Your Attack Surface" | Jake Margolis Chief Information Security Officer Metropolitan Water District of Southern California
Feb 24, 2022
1:00pm - 1:30pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
1:30pm - 2:00pm (Pacific)
Banyan Security | Driving Zero Trust at Two Different Companies: Lessons Learned | Den Jones CSO
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 
 
The audience will gain understanding in:
  • How to get started: Selling the strategy, people, process and technology
  • How to make real progress in months, not years.  Demonstrating continued business value
  • Real world examples. Highlighting improvements to user experience and security posture. 
  • Tips and tricks, lessons learned and what to avoid
Feb 24, 2022
2:00pm - 2:30pm (Pacific)
Zentry Security | Thank You, VPN – But Times Have Changed | Paul Andersen VP of Sales

The Journey to Zero Trust & The Top-3 Requirements Driving ZTNA Adoption

Did you know that Gartner research forecasts 60 % of enterprises will phase out most of their remote access VPNs in favor of ZTNA by 2023. Moreover, 40% of enterprises are anticipated to adopt ZTNA for other user cases by 2023. So, what’s driving the ZTNA adoption and why? We’ll discuss today’s pressing access challenges and 3 major use cases that are driving companies to implement zero trust network access, as well the business and IT requirements organizations should be aware of, when looking to adopt ZTNA.

At the end of the presentation, we’ll provide you access to a buyer’s guide checklist that you can use as a reference as you’re researching the best solution for your IT environment and requirements.

Feb 24, 2022
2:30pm - 2:45pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
2:45pm - 3:15pm (Pacific)
Illumio | ZeroTrust Microsegmentation, Easier Than You Think | Christer Swartz Principal Technical Marketing Engineer
Feb 24, 2022
3:15pm - 3:30pm (Pacific)
Twingate | 5 Considerations to Successfully Adopt Zero Trust | Anna Liu Product Manager Team Lead

Zero Trust is not a new concept, but only in recent years have organizations prioritized efforts towards adopting the architecture. And in the past two years, with teams increasingly becoming distributed or remote, there is a greater need for Zero Trust than ever before. However, current tech stacks hardly offer ideal support for BYOD, let alone mass adoption of a mobile workforce.

With Zero Trust, organizations are reducing their attack surface, developing identity-first concepts in place of device IPs, building in continuous authentication, establishing a trust model that removes inherent trust, and moving towards the principle of least privilege and passwordless systems.

Join Twingate’s Product Manager Team Lead Anna Liu for a brief presentation discussing how to successfully build a foundation towards adopting and implementing a Zero Trust strategy.

After joining this session you’ll come away with:

  • A path towards Zero Trust adoption
  • Processes needed prior to tool evaluation
  • Myths squashed and buzzwords decrypted
  • Resources for building a Zero Trust architecture
Feb 24, 2022
3:30pm - 3:40pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 24, 2022
3:40pm - 3:50pm (Pacific)
Closing Remarks | Prize Winners Announced
Feb 25, 2022
8:30am - 9:30am (Pacific)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”