Agenda

Date and TimeTitle
Mar 16, 2022
8:00am - 9:00am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
8:00am - 8:08am (Pacific)
Opening Introductions
Mar 16, 2022
9:00am - 9:30am (Pacific)
Beyond Identity | Passwordless identities for workforces, customers, and developers | Patrick McBride CMO

In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal.  But not all MFA is created equal.  Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong Zero Trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access.

 
Mar 16, 2022
9:30am - 10:00am (Pacific)
Cisco Secure | Zero Trust: Where Do You Think You’re Going? | Helen Patton Advisory CISO
Nothing in security ever stays still, and Zero Trust is no different.  While many organizations have begun their journey to zero trust, the elements and opportunities are changing.  In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.
 
Mar 16, 2022
10:00am - 10:15am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
10:15am - 11:20am (Pacific)
Keynote | "Cybersecurity Incident Management workshop" | Klint Walker Cyber Security Advisor U.S. Department of Homeland Security
Mar 16, 2022
11:15am - 11:25am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
11:25am - 11:46am (Pacific)
Netenrich | Developing your 2022 Security Plan: Align Ops to Risk with Cyber Situational Awareness | Christopher Morales CISO and Head of Security Strategy
Digital transformation is exposing you to adversaries and threats. Things like explosive cloud growth, technology and mobility volumes, and pervasive digital transformation are all part of a hostile environment. Hear from Netenrich CISO, Chris Morales, as he goes through 6 steps in how you can make sure your organization is protected and your assets stay secure with Cyber Situational Awareness.
 
Mar 16, 2022
11:45am - 12:00pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
12:00pm - 1:05pm (Pacific)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | Christophe Foulon | Karen Rouleau | Derek Morris | Avishai Avivi
Mar 16, 2022
1:00pm - 1:15pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
1:15pm - 1:45pm (Pacific)
KnowBe4 | Hacking the Organization: Ways Cybercriminals Use to Take Total Control of Your Network | Roger Grimes Data-Driven Defense Evangelist
Mar 16, 2022
1:45pm - 2:10pm (Pacific)
Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Christer Swartz Principal Technical Marketing Engineer

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Mar 16, 2022
2:10pm - 2:25pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
2:25pm - 2:55pm (Pacific)
Reciprocity | Compliance as a Catalyst for Reducing Risk | Rob Ellis Senior Vice President of Strategy

Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk?  Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.

  • Challenges in Compliance and Risk Programs
  • Five Best Practices in starting a Risk Program
  • Compliance Considerations that will Improve Your Risk Posture
Mar 16, 2022
2:55pm - 3:16pm (Pacific)
Rangeforce | Building and Maintaining an Effective Cyber Range | Ben Langrill Director of Solutions Engineering
Cyber ranges are invaluable tools for training security operations teams and establishing cyber resilience. In this session, learn about the key components of an effective cyber range, common challenges in building a range, and how to optimize functionality, maintenance, and attack scenarios that keep a cyber range efficient and relevant.
 
Mar 16, 2022
3:15pm - 3:30pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
3:30pm - 4:00pm (Pacific)
SafeBreach | 5 Recommendations for Building a Scalable Red Team | Yotam Ben Ezra VP of Product
Mar 16, 2022
4:00pm - 4:05pm (Pacific)
Sponsor Prize Drawing

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 16, 2022
4:05pm - 4:30pm (Pacific)
Rapid7 | The Boulevard of Broken Buckets | Tod Beardsley Director of Research, Bob Rudis Chief Data Scientist
Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
 
Mar 16, 2022
4:30pm - 5:01pm (Pacific)
HID Global | PKI-as-a-Service: Improve Security While Reducing Cost | Mrugesh Chandarana Director, Product Management

In this presentation, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance. Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.

In this webinar, you will:

  • Learn how PKIaaS can increase security while reducing complexity and costs
  • Get a roadmap for automating a certificate-based security strategy
  • Gain access to a checklist for choosing the best PKIaaS provider for your business
Mar 16, 2022
5:00pm - 5:10pm (Pacific)
Closing Remarks | Prize Winners Announced