Date and Time | Title | |
---|---|---|
Mar 4, 2022 7:50am - 8:30am (Pacific) | Opening Security Briefing with CISA, U.S. DHS | |
Mar 4, 2022 8:30am - 9:15am (Pacific) | Opening Security Keynote with Darktrace: Fast and Furious Attacks: Using AI to Surgically Respond Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Director of Analysis, Brianna Leddy, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios. | ![]() |
Mar 4, 2022 9:15am - 9:50am (Pacific) | Presenting Security Keynote with IBM Security: Zero Trust - Beyond the Buzzword Probably one of the most used phrases in Security, it has as many definitions as there are vendors touting it. In our view, Zero Trust is about a change in the way enterprises think about their Security, and technology is often the last piece of this puzzle. It is a framework to be followed that helps prepare you for the present and future of business–not a point-in-time silver bullet but a map to effective, dynamic, continuous security. In this session, we will look beyond the Zero Trust hype to actual use cases of enterprises solving their business needs. | ![]() |
Mar 4, 2022 9:50am - 10:15am (Pacific) | SonicWall Presentation: Cloud Application Security – Protect Your Cloud Environment from the Inside Out (and back in again) Companies, Government Agencies, Education, and other businesses all use the Cloud. But as the total increase in cybersecurity threats increase, are we utilizing the best possible tools to protect our predominately Cloud environments from intrusion? Join us as we have a discussion about the Cloud, and why Cloud Application Security is an important and often overlooked tool for keeping our data and our users safe. | ![]() |
Mar 4, 2022 10:30am - 11:20am (Pacific) | Panel 1: Securing the Hybrid & Remote Workforce As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure. This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training. | ![]() |
Mar 4, 2022 11:20am - 11:45am (Pacific) | HP Presentation: Endpoint Isolation – How Do I Love Thee? Let Me Count the Ways While it’s clear that the endpoint is the key cybersecurity battleground, there’s plenty of debate on how best to approach the problem. Minimizing the number of endpoint agents is an obvious approach. To that end, this talk will describe the broad list of risk management benefits of hardware-assisted isolation technology, as seen in actual deployments of the Bromium-developed hypervisor. | ![]() |
Mar 4, 2022 11:45am - 12:10pm (Pacific) | deepwatch Presentation: How to Mitigate the Cybersecurity Skills Gap Staffing your organization with an experienced security team or SOC has become an increasingly difficult task. Join this session for an insightful conversation to learn how to solve the cybersecurity skills gap including common issues to avoid, warning signs to look out for, and strategies for combating these issues. | ![]() |
Mar 4, 2022 12:10pm - 12:35pm (Pacific) | Reciprocity Presentation: Compliance as a Catalyst for Reducing Risk Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper. | ![]() |
Mar 4, 2022 1:10pm - 1:35pm (Pacific) | Deep Instinct Presentation: Speed Kills Malware: Why 20ms Makes All The Difference
We will examine the approaches to prevent and detect threats with AI, ML, and DL, and dive into how deep learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more on the chronology of an unknown attack and why 20ms is the difference between security and a breach | ![]() |
Mar 4, 2022 1:35pm - 2:00pm (Pacific) | Cisco Secure Presentation: Street Cred: Increasing Trust in Passwordless Authentication Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. What holds us back from getting rid of passwords? Trust. In this session, we will propose a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication. | ![]() |
Mar 4, 2022 2:00pm - 2:25pm (Pacific) | Critical Insight Presentation: Ransomware & Killware: What's Coming And How to Prepare 2022 is bringing new malware variants, as threat-actor capabilities evolve. Organized cyber-crime has become a $1T global business, and the lines have continued to blur as to what is a criminal and what is a terrorist attack. Increasingly, we are seeing acts of pure disruption that work much like a ransomware attack, but the intent is to “kill” the network and data. The criminals are from (presumably) nation-states but also cyber activists. Michael Hamilton, former CISO of the City of Seattle will describe this evolution, enumerate the events that have occurred, and discuss what this may mean for the future. | ![]() |
Mar 4, 2022 2:25pm - 3:10pm (Pacific) | Panel 2: Securing the Cloud Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches. This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud. | ![]() |
Mar 4, 2022 3:25pm - 3:50pm (Pacific) | Cybereason Presentation: Why XDR? What is XDR? Do I need XDR? What is XDR, how is it different, and can it actually stop today’s malicious operations? In this special session, Teall Rist, Cybereason Security Engineer will share insights on the latest attacks organizations face, top security operations challenges, and why XDR delivers on the most important metric: Time. | ![]() |
Mar 4, 2022 3:50pm - 4:15pm (Pacific) | Fortinet Presentation: The Convergence Zone - Networking and Security Today’s forecast: every application, securely available on any device, from all locations. Application intelligence, traffic manipulation, and security controls/reporting are at the core of a modern intelligent network. With the right solutions in place, the user experience can be tuned and maintained throughout the evolution to new connectivity sources and destinations. | ![]() |
Mar 4, 2022 4:15pm - 5:00pm (Pacific) | Panel 3: Ransomware and Resiliency – To Trust or Not Trust? While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture. This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow. | ![]() |
Mar 4, 2022 5:00pm - 5:45pm (Pacific) | Closing Keynote with CISA, U.S. DHS | ![]() |