Agenda

Date and TimeTitle
Nov 4, 2022
8:30am - 9:05am (Eastern)
Opening Security Keynote with Darktrace: How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Nov 4, 2022
9:05am - 9:30am (Eastern)
Presenting Security Keynote with IBM Security: Exposure Management – The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management Programs

Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. This not only makes threat management more challenging, but can also dramatically increase our exposure to attack. So how can we do a better job of proactively understanding and reducing the risks and exposures associated with this disparate environment, while simultaneously significantly reducing the stress on our threat management systems and teams?

Join us to hear what we have learned from thousands of engagements in this developing field, which we are referring to as Exposure Management. This approach has the goal helping organizations reduce risk and inefficiencies and get the most out of the tools, processes and people that they have. All while enabling the business to evolve and thrive.

Nov 4, 2022
9:30am - 9:55am (Eastern)
Reciprocity Presentation: The Right InfoSec Conversation: How to Show the Value and Motivate Investment

As an InfoSec leader, your world has dramatically changed in just the last couple of years, and the door for risk has swung wide open. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And they’re usually a few steps ahead of you. 

 

With cybersecurity top of mind for your Executives and the Board, you need to anticipate questions and be ready with answers. Unfortunately, the conversation we’ve been having around cyber security is ineffective.  The right conversation is centered on business priorities and the company’s appetite for risk so the value of investment choices is clear and informed decisions can be made. The goal is to choose the right level of spend to defensibly protect your company as it operates, grows and expands.

 

Attend this session and learn:

  • What’s driving a significant change in InfoSec priorities
  • Why “how” you protect must shift to “how well” you protect
  • How to tie InfoSec investments to business priorities
Nov 4, 2022
10:30am - 11:15am (Eastern)
Panel 1: Ransomware and Resiliency – To Trust or Not Trust?
While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.

As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.

This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.

Nov 4, 2022
11:15am - 11:45am (Eastern)
Deepwatch Presentation: Security Programs That Thrive In Economic Uncertainty

As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet if 2021 and the explosion of ransomware, new nation-state sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this presentation Bill Bernard will challenge security leaders to re-evaluate their programs, and provide insight into how to maximize your security team’s chances to not only survive, but thrive in this challenging situation through an honest evaluation of your program, realignment to company goals, and efficient use of your available resources.

Nov 4, 2022
11:45am - 12:15pm (Eastern)
Secureworks Presentation: Tales from the Trenches with an Incident Commander

It’s no longer a matter or if, but when, you’re going to be the victim of a ransomware attack. Are you prepared? Learn from Securework’s Tony Kirtley, Director of Incident Command, how to prepare for an attack, but more importantly what to do immediately following with tales from the trenches.

Nov 4, 2022
12:15pm - 12:35pm (Eastern)
HolistiCyber Presentation: Getting Security Teams To Think “Cloud” Why Is It Hard?

We all have been talking  about “cloud”  for a number of years. We migrated to the cloud and working in and with multi-cloud environments. However, security teams in many organizations have a hard time keeping up. Cloud environments and technologies are fundamentally different than traditional on-prem environments, with different challenges, new risks (as well as opportunities), threats and tools unique to the cloud. Trying to move security teams to consider the cloud environment NOT as an extension or as an evolution of the on-prem environment is not easy and many fail trying to adopt similar methodologies and techniques embedding security into the cloud as they did on prem. In this session we will talk about why and where it is so different, focusing on  how organizations and security teams should act differently when addressing security concerns in the cloud.

Nov 4, 2022
1:00pm - 1:50pm (Eastern)
Panel 2: Securing the Hybrid & Remote Workforce

As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.

This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.

Nov 4, 2022
1:50pm - 2:20pm (Eastern)
Cisco Secure Presentation: Chutes And Ladders: Data On How Zero Trust Is Playing Out

The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. In 2021, Cisco and Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. Within that study, we analyzed commonalities of organizations implementing and operating Zero Trust. This session will share how EIG is working in the real world, and what the best of the best programs have in common.

Nov 4, 2022
2:20pm - 2:45pm (Eastern)
Swimlane Presentation: Improving Security through Automation
Nov 4, 2022
2:45pm - 3:10pm (Eastern)
Check Point Software Technologies Presentation: 40 Years in 25 Minutes – A Journey Through Cyber

A journey through cyber – from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing  This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry.  Grant will discuss the transition from single systems to networking to the internet…and how cyber security has evolved from securing virtually nothing to virtually everything.  Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today, as well as future trends…you’ll even have a chance to win some cash.

Nov 4, 2022
3:20pm - 4:10pm (Eastern)
Panel 3: Securing the Cloud

Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.

This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.

Nov 4, 2022
4:10pm - 4:35pm (Eastern)
Banyan Security Presentation: Driving Zero Trust at Two Different Companies: Lessons Learned

As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.