Agenda

Date and TimeTitle
Mar 30, 2022
8:00am - 8:07am (Eastern)
Opening Introductions
Mar 30, 2022
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
9:00am - 9:30am (Eastern)
Exterro | Conducting forensic investigations in a zero-trust environment. | Justin Tolman Forensic Evangelist
The Zero-Trust security approach is quickly becoming the standard for corporations and agencies. Within the United State government agencies, and those doing business with government agencies have been mandated to adopt a zero-trust level of security by 2024. This presentation will cover what Zero-Trust is, how it may impact the legitimate security work being carried out by you, and how investigations may be carried out in a Zero-Trust environment.
 
Mar 30, 2022
9:30am - 10:00am (Eastern)
Exabeam | Seize The Breach: Why breaches still occur and how to mitigate them | Tim Strack Sr. Sales Engineer

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Mar 30, 2022
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
10:30am - 10:55am (Eastern)
ThreatLocker | Zero Trust for Applications | Danny Jenkins CEO

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

Mar 30, 2022
10:55am - 11:30am (Eastern)
Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Christer Swartz Principal Technical Marketing Engineer

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

 

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Mar 30, 2022
11:30am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
12:00pm - 1:00pm (Eastern)
Keynote | "Securing APIs: Best Practices and Check Lists" | Nish Majmudar Director Of Information Security Engineering FEPOC CareFirst BlueCross BlueShield
Mar 30, 2022
1:00pm - 1:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
1:15pm - 1:35pm (Eastern)
Zentry Security | Thank You VPN – But Times Have Changed | Bryan Embrey Director, Product Marketing

Remote workforces are now the norm rather than the exception.  And access to applications must be seamless and secure for employees, contractors, and partners.  VPNs were originally designed for a small number of trusted employees to access applications in an on-premises data center.  But times have changed – workers now need access to applications in the cloud and data center from their device of choice, regardless of their location.

Join Zentry Security for an informative session about Zero Trust Network Access.  You’ll learn

  • What’s driving the adoption of ZTNA
  • The top 10 selection criteria for a ZTNA solution
  • What are some of the limitations of traditional VPNs
Mar 30, 2022
1:35pm - 2:05pm (Eastern)
Rangeforce | Optimizing the Human Element of Cybersecurity | Jeff Orloff Tech Evangelist and Vice President of Product

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks. How can organizations reduce risk by making humans the strongest link in the cyber defense line? In this session, we will be taking a deeper look at:

  • How approaches to cyber defense are changing to keep pace with the ever-evolving threats of hackers

  • What motivates cyber professionals

  • How to make humans the strongest link in the cyber defense line

Mar 30, 2022
2:05pm - 2:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
2:15pm - 2:40pm (Eastern)
Tessian | Take Control of Email Security with Human Layer Security Protection | Ashley Bull Solutions Engineer

Email is every bit as crucial an environment to protect as the network and databases because, once compromised, there can be lasting, costly, and damaging effects. Leaning on built in security controls of email platforms or legacy technology are insufficient in providing comprehensive protection against human-related threats over email. Over 75% of firms report that 20% or more of email security incidents get past their existing security controls and they spend on average 600 hours a month in investigation and remediation. However, organizations that deploy Human Layer Security technology feel more prepared to face email security threats and data loss incidents (accidental, negligent, or malicious) with their current tool setup than those who don’t, demonstrating a higher level of maturity when it comes to their readiness to prevent these damaging threats. Human Layer Security is the missing link for today’s enterprise email security stacks. Forrester recommends that organizations consider human layer security to be used.

 
Mar 30, 2022
2:42pm - 3:07pm (Eastern)
Rapid7 | The Boulevard of Broken Buckets | Tod Beardsley Director of Research | Bob Rudis Chief Data Scientist

Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.

Mar 30, 2022
3:05pm - 3:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Mar 30, 2022
3:40pm - 4:35pm (Eastern)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Mar 30, 2022
4:35pm - 4:50pm (Eastern)
Closing Remarks