Agenda

Date and TimeTitle
Jun 15, 2022
8:00am - 8:08am (Eastern)
Opening Introductions
Jun 15, 2022
8:00am - 8:59am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
8:59am - 9:30am (Eastern)
Checkpoint | Cyber Warriors or Cyber Geeks | Eddie Doyle Cyber Security Evangelist

Traditional lines are blurred. The President of the Ukraine makes a global appeal for any citizen with a hacker skillset to help their cyber war & within one week, 250,000 people join a Telegram account to coordinate attacks against Russia. A retiree invests in bitcoin, only to find all the money’s been stolen from their ewallet. Gas stations in Iran are hacked & the dissident group published the Supreme Leader’s personal phone number for tech support. A cybercrime syndicate provides excellent tech support, to help victims pay ransoms & issues them a receipt. Check Point finds & blocks over 7,000 brand new attacks each & every day.

With all this noise, how do you know from where the next threats will come?

In this session, Eddie Doyle will provide a summary of last year’s interesting attacks, along with predictions for 2022 & some practical advice on what you can do today!

Jun 15, 2022
9:30am - 10:05am (Eastern)
Bitdefender | XDR – not all treasures are silver and gold | Daniel Daraban Director of Product Management

You don’t drown by falling in the uncorrelated-data lake; you drown by staying there.

In this presentation, Daniel is going to take us back 10 years in order to understand different nuances and how things changed over time, leading to the challenges security teams are facing today.

Whether you travel multiple paths in search of visibility, detection and immediate response, the present continues to represent the ordeal task of navigating an ocean of data, with multiple ships drifting only on momentum. Building ships with the sole purpose to navigate blindly and alone must stop! We need collective feedback, direct interaction and most importantly to recognize when security teams are facing various struggles.

Glancing into the future, we must understand the past and acknowledge that along each navigation path exists one particular intersection where your ship is prone to veer off into sunk costs, lack of visibility and inability to respond. It is a perilous place to travel and a barren place to exist. It is the opposite of resilience. This is the waters of ‘add more data and we will figure out how to use it’.

Finding the north star is paramount.

Jun 15, 2022
10:00am - 10:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
10:15am - 11:20am (Eastern)
Keynote | "Cyber Security: The evolving landscape and what business oriented really means." | Anthony Johnson Managing Partner | Board Member | Forbes Business Council | Technology Advisor | CISO
Jun 15, 2022
11:15am - 11:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
11:30am - 12:00pm (Eastern)
IRONSCALES | The Human Factor in Email Phishing | J Stephen Kowski Senior Director of Information Security
Jun 15, 2022
12:00pm - 12:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
12:15pm - 1:20pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | Derek Morris, Helen Mohrmann, Dr. William Lidster, Rick Doten, Robert Sawyer
Jun 15, 2022
1:15pm - 1:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
1:30pm - 2:01pm (Eastern)
Ermetic | Improving Cloud Infrastructure Security with a Maturity Assessment Framework | Lior Zatlavi Senior Cloud Security Architect

With so many different variables to consider when designing and implementing a security strategy for your cloud infrastructure, you need a clear plan for setting priorities and building a course of action. Best practices and compliance standards are a good first step. But they don’t give you a tool for assessing the maturity of your current cloud security practices and a roadmap for continuous improvement.

We created a lightweight and easy to understand framework to help you assess the maturity of your current cloud security practices and build a roadmap for continuous improvement.

In this session, we will introduce the Security Maturity framework and explain how to adapt it to the needs of your organization.

Find out how to:

  • Gain a clear picture of where your organization currently stands on its path to a secure cloud environment
  • Design a cloud security strategy for your enterprise in reachable, practical and clear milestones
  • Create a common language between various stakeholders in your organization and getting them on-board
  • Leverage automated solutions to help you on the road to cloud security maturity across AWS, Azure and GCP
Jun 15, 2022
2:01pm - 2:30pm (Eastern)
KnowBe4 | We Thought It Was Bad and Then It Got Even Worse | Roger Grimes Data-Driven Defense Evangelist
Jun 15, 2022
2:30pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
2:45pm - 3:15pm (Eastern)
Reciprocity | Rethink your Third-Party Risk Strategy in an Uncertain World | Rob Ellis Chief Strategy Officer

As organizations begin to recover from the pandemic, third-party risk management (TPRM) is more important than ever before. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.

How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, managing the risk associated with your partners is increasingly challenging.

Join Reciprocity experts as we share and discuss with you:

  • Market Dynamics driving the risk vs. opportunity balance

  • 5 key considerations to better identify, manage and mitigate third party risk

  • Real world examples of improving TPRM visibility and efficiency

Jun 15, 2022
3:15pm - 3:40pm (Eastern)
Darktrace | Fast and Furious Attacks: Using AI to Surgically Respond | Justin Fier Director for Cyber Intelligence and Analysis

Fast-moving cyberattacks can strike at any time, and security teams are often unable to react quickly enough. Join to learn how Autonomous Response takes targeted action to stop in-progress attacks without disrupting your business. The discussion includes real-world threat finds.

Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.

Jun 15, 2022
3:40pm - 3:55pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 15, 2022
3:55pm - 4:25pm (Eastern)
AuditBoard | Continuous Monitoring at Scale: The Future of Security Compliance | John Volles Senior Manager, Information Security Compliance

As technology advances and cybersecurity grows in importance, compliance requirements continue to increase. The old way of asking system admins for point-in-time screenshots, multiple times a year, is inefficient and outdated. In order to evolve the security compliance profession, we need a new way of performing compliance activities through continuous automation. This session will spotlight the way forward for compliance teams in today’s ever-evolving cyber risk landscape.

Learning Objectives:

  • The importance of why we need to evolve security compliance.
  • Best practices for implementing compliance at code-level.
  • Examples of how to apply continuous monitoring in your security compliance program.
Jun 15, 2022
4:25pm - 4:55pm (Eastern)
Beyond Identity | Passwordless identities for workforces, customers, and developers | Patrick McBride CMO
In this Work from Home world, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal.  But not all MFA is created equal.  Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong Zero Trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access.
 
Jun 15, 2022
4:55pm - 5:05pm (Eastern)
Closing Remarks | Prize Drawing Winners Announced