Agenda

Date and TimeTitle
Mar 25, 2022
8:30am - 9:15am (Eastern)
Opening Security Keynote with Darktrace: Fast and Furious Attacks: Using AI to Surgically Respond

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Director of Analysis, Brianna Leddy, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios. ​

· Topic for this session– Autonomous Response – ​
· Explore today’s threats and challenges​
· How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. ​

Mar 25, 2022
9:15am - 9:50am (Eastern)
Presenting Security Keynote with IBM Security: Zero Trust - Beyond the Buzzword

Probably one of the most used phrases in Security, it has as many definitions as there are vendors touting it. In our view, Zero Trust is about a change in the way enterprises think about their Security, and technology is often the last piece of this puzzle. It is a framework to be followed that helps prepare you for the present and future of business–not a point-in-time silver bullet but a map to effective, dynamic, continuous security. In this session, we will look beyond the Zero Trust hype to actual use cases of enterprises solving their business needs.

Mar 25, 2022
9:50am - 10:15am (Eastern)
ExtraHop Presentation: Building a Response Strategy to Advanced Threats

Let’s face it: cyberattackers have the advantage. The recent string of advanced campaigns, including those launched against SolarWinds, Colonial Pipeline, and JBL, have made this reality painfully clear for most enterprises. With threats persisting inside the network for months, security teams need a new plan. In this session, we will discuss strategies, including revising existing mental models and incident response processes, to build resilience and reclaim the advantage in the fight against advanced threats. 

Mar 25, 2022
10:35am - 11:20am (Eastern)
Panel 1: Securing the Hybrid & Remote Workforce

As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.

This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.

Mar 25, 2022
11:20am - 11:45am (Eastern)
HP Presentation: Endpoint Isolation – How Do I Love Thee? Let Me Count the Ways

While it’s clear that the endpoint is the key cybersecurity battleground, there’s plenty of debate on how best to approach the problem. Minimizing the number of endpoint agents is an obvious approach.  To that end, this talk will describe the broad list of risk management benefits of hardware-assisted isolation technology, as seen in actual deployments of the Bromium-developed hypervisor. 

Mar 25, 2022
11:45am - 12:10pm (Eastern)
Cisco Secure Presentation: Zero Trust - Where Do You Think You’re Going?

Nothing in security ever stays still, and Zero Trust is no different. While many organizations have begun their journey to zero trust, the elements and opportunities are changing. In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.

Mar 25, 2022
12:10pm - 12:35pm (Eastern)
Verizon Presentation: Security Considerations for a 5G World

5G is already transforming how businesses operate, from enabling more efficient automation to enhancing product innovation.  As business leaders and IT managers evaluate the competitive possibilities of 5G, what do security leaders need to know about this emerging technology? This talk offers some ideas on where to start understanding how security changes in a 5G world.

Mar 25, 2022
1:10pm - 1:30pm (Eastern)
Check Point Software Technologies Presentation: The IoT and OT Security Tsunami is Coming – Prepare and Protect Your Devices
69% of enterprises have more IoT devices on their networks than computers. 84% of security professionals believe IoT devices are more vulnerable than computers. Within these stats, we know the riskiest devices are ones you cannot see, such as unmanaged and IoT devices that are unable to be secured with agent-based IT and security tools. How would you prepare and protect your devices in this situation?
 
John Kwarsick, IoT Evangelist with Check Point Software Technologies, will cover the challenges that face organizations across healthcare, manufacturing, finance, and the public sector as they work to protect their networks, knowledge workers, and infrastructure from cyber-attacks on their IoT and OT assets. In this compelling presentation, he’ll also break down the solutions you will need to ensure your devices are protected.   
Mar 25, 2022
1:30pm - 2:00pm (Eastern)
Secureworks Presentation: Tales from the Trenches with an Incident Commander

It’s no longer a matter or if, but when, you’re going to be the victim of a ransomware attack. Are you prepared? Learn from Securework’s Tony Kirtley, Director of Incident Command, how to prepare for an attack, but more importantly what to do immediately following with tales from the trenches.

Mar 25, 2022
2:00pm - 2:45pm (Eastern)
Panel 2: AI & Machine Learning - What it Means for Today & the Future

Between limited cyber security talent and the sheer amount of data that cyber security teams are responsible for managing, AI & Machine Learning have become vital tools that many businesses have implemented as part of their cyber security plan. Tasks previously done manually by employees can be automated & accomplished without any time constraints, analysis of data amounting far beyond human capability can be done in a matter of seconds, and patterns that may have been missed previously or taken much longer to find can be identified quickly and accurately. This is invaluable in helping detect & respond to attacks, especially as threats continuously change and new threats regularly appear. Offering so many benefits, AI is commonly the first line of defense against cyber attacks.

With its many benefits come certain implications as Artificial Intelligence and Machine Learning continue to become more advanced. What will happen when Artificial Intelligence surpasses that of human intelligence? How are cybercriminals already adapting AL and ML to use for malicious means?

This panel of experts will discuss how AI and Machine Learning can be implemented to predict and combat cybercrime along with its increasing detriments and affects on employment, in addition to these tools advancing beyond human control.

Mar 25, 2022
2:45pm - 3:10pm (Eastern)
ThreatLocker Presentation: Demystifying Zero Trust and its Role in Cybersecurity

The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.

Mar 25, 2022
3:25pm - 3:40pm (Eastern)
Snyk Presentation: Can We Really Trust Developers to Handle Security?
Mar 25, 2022
3:40pm - 4:05pm (Eastern)
Cybereason Presentation: Why XDR? What is XDR? Do I need XDR?

What is XDR, how is it different, and can it actually stop today’s malicious operations? In this special session, Teall Rist, Cybereason Security Engineer will share insights on the latest attacks organizations face, top security operations challenges, and why XDR delivers on the most important metric: Time.

Learn how adversaries have adapted to today’s IT & security stack, as well as key integration points for threat detection and incident response. Includes a look at Cybereason XDR powered by Google Chronicle.

Mar 25, 2022
4:05pm - 4:30pm (Eastern)
SonicWall Presentation: Cloud Application Security – Protect Your Cloud Environment from the Inside Out (and back in again)

Companies, Government Agencies, Education, and other businesses all use the Cloud. But as the total increase in cybersecurity threats increase, are we utilizing the best possible tools to protect our predominately Cloud environments from intrusion? Join us as we have a discussion about the Cloud, and why Cloud Application Security is an important and often overlooked tool for keeping our data and our users safe.

Mar 25, 2022
4:50pm - 5:40pm (Eastern)
Panel 3: Ransomware and Resiliency – To Trust or Not Trust?

While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.

As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture. The other vector worth considering is the trusted application vector. If the applications on your perimeter allow attackers in via trojan or remote code execution, then you will be compromised, trust or no trust.

This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security, Zero Trust and traditional AppSec and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.

Mar 25, 2022
5:40pm - 6:00pm (Eastern)
Edgecast Presentation: How Can Businesses Protect Their Digital Presence?

Learn how leading organizations are adjusting their application security practices in response to new vulnerabilities, threats and volumetric DDoS attacks.

Mar 25, 2022
6:00pm - 6:35pm (Eastern)
Closing Security Keynote with CISA, U.S. DHS