Agenda

Date and TimeTitle
Apr 20, 2022
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
8:00am - 8:07am (Central)
Opening Introductions
Apr 20, 2022
9:00am - 9:30am (Central)
deepwatch | The Workstation Battle Ground - Aligning with NIST CSF | Franklin Edwards Solutions Director
Apr 20, 2022
9:30am - 10:00am (Central)
Exabeam | Seize The Breach: Why breaches still occur and how to mitigate them | Jim Chrisos Principal Engineer

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a presentation on:

  • Why breaches are usually occurring
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
Apr 20, 2022
9:55am - 10:30am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
10:30am - 10:52am (Central)
tenfold | It´s Cloudy Up Here: Defend against the TOP 3 Identity Attack Vectors in Microsoft 365 | Patryk Stachowiak Partner Account Manager

In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services. Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.

 
Apr 20, 2022
10:50am - 11:30am (Central)
Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Derek Washburn Information Security and Advisory Professional

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Apr 20, 2022
11:30am - 11:42am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
11:42am - 12:07pm (Central)
Darktrace | Fast and Furious Attacks: Using AI to Surgically Respond​ | Justin Fier Director for Cyber Intelligence and Analysis

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join [speaker] to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.

 
Apr 20, 2022
12:05pm - 1:20pm (Central)
Keynote | Groundhogs & Rainbows | Robert LaMagna-Reiter VP, Chief Information Security Officer Hudl

There has never been a time when Information Security has shifted as fast as it has today -- cloud has changed how we mitigate risk. Information Security requires a strategic, customer-obsessed & enterprise-wide approach but, all too often, organizations are stuck in Groundhog Day. We’ll identify a few principles buried in the original Rainbow Series, how to escape Groundhog Day & evolve the foundation laid by the Rainbow Series to a modern Zero Trust strategy that creates a culture of seamless information security throughout the enterprise.

With evolving threats and businesses demanding more flexibility, agility and automation, architectures have changed how security can better enable the business. Despite the advantages of operating in a zero-trust environment, misnomers remain. By refocusing your grand strategy & pivoting to trust instead of security, it’s possible to deliver a more trusted environment that functions as a strategic, cultural enabler & supports privacy by design.

Learning objectives:

  • We solved this --- why did we ignore the Rainbow Series?
  • Understand how we became stuck in Groundhog Day
  • Over the Rainbow: What is Zero Trust & how do businesses win?
  • Bring it all together: let’s win!
Apr 20, 2022
1:10pm - 1:40pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
1:40pm - 2:10pm (Central)
Wiz | CNAPP: Finding the worst risks | Gabe Schuyler Enterprise Solutions Engineer

Are you familiar with the new category of “CNAPP? Security challenges in the Cloud are different than those that exist on-prem, but the overall processes to build and maintain a secure environment are the same. A cloud-native application protection platform is a simplified security architecture that enables enterprises to holistically benefit from the cloud-native ecosystem. It enables them to leapfrog the cost and complexity of siloed security products to a continuous security fabric without major investments in tools or developer talent. Learn first hand from the experts on the ROI/Benefits of CNAPP and real-world approaches to deploying in your existing environment.

 
Apr 20, 2022
2:05pm - 2:40pm (Central)
Pentera | Is Your Defensive Stack Ready For A Targeted Attack? | Autumn Stambaugh Solutions Engineer

Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.

 
Apr 20, 2022
2:40pm - 2:50pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
2:50pm - 3:05pm (Central)
Abnormal | Key Considerations for Choosing the Right Email Security Platform | Scott Deluke Manager, Enterprise Engineers

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.

Apr 20, 2022
3:05pm - 3:40pm (Central)
cybersixgill | A Walk Around the Underground | Brad Liggett Director of Cyber Threat Intelligence
Apr 20, 2022
3:40pm - 4:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 20, 2022
4:00pm - 5:05pm (Central)
Panel Discussion - “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices”
Apr 20, 2022
5:00pm - 5:15pm (Central)
Closing Remarks