Agenda

Date and TimeTitle
Nov 18, 2022
8:40am - 9:10am (Eastern)
Opening Security Keynote with Darktrace: How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Nov 18, 2022
9:10am - 9:40am (Eastern)
Presenting Security Keynote with IBM Security: Exposure Management – The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management Programs

Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. This not only makes threat management more challenging, but can also dramatically increase our exposure to attack. So how can we do a better job of proactively understanding and reducing the risks and exposures associated with this disparate environment, while simultaneously significantly reducing the stress on our threat management systems and teams?

Join us to hear what we have learned from thousands of engagements in this developing field, which we are referring to as Exposure Management. This approach has the goal helping organizations reduce risk and inefficiencies and get the most out of the tools, processes and people that they have. All while enabling the business to evolve and thrive.

Nov 18, 2022
9:40am - 10:10am (Eastern)
ExtraHop Presentation: Navigating Enterprise Security in a Post-Compromise Reality
Nov 18, 2022
10:35am - 11:20am (Eastern)
Panel 1: Ransomware and Resiliency – To Trust or Not Trust?
While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.

As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.

This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.

Nov 18, 2022
11:20am - 11:45am (Eastern)
Tenable Presentation: Master the 3 Levels of Risk Decision-Making Impacting your Security Team
Your security team manages risks that affect business units and functions across your entire organization. Security is threaded through every aspect of your business, and your decisions have never mattered more. On a regular basis, you make decisions that affect day-to-day operations, data and system security, executive-level strategy and quite possibly, the future success of your organization. Security leaders straddle the lines of executive, strategic, and tactical decision making, and must be experts at navigating all three. We’re wearing many hats, often switching between them from meeting to meeting, and it’s imperative that we can effectively communicate and drive decisions that improve and mature our security efforts to mitigate risk across the board.

This session will explore ways to enhance engagement with technical teams, business units and executives alike, while still maturing your security program to be more efficient and effective at managing and mitigating risk. Concepts and topics covered will include:
  • The 3 levels of decision making you must navigate on a daily basis and how they impact communication with the rest of the organization
  • Identifying metrics that demonstrate value to executives and mature program operations for optimal effectiveness
  • The importance of aligning reporting so all levels of the org are speaking the same risk language
  • An example use case from Tenable in how these aligned metrics can demonstrate tangible business value at all levels of the organization
Nov 18, 2022
11:45am - 12:10pm (Eastern)
Reciprocity Presentation: The Right InfoSec Conversation: How to Show the Value and Motivate Investment

As an InfoSec leader, your world has dramatically changed in just the last couple of years, and the door for risk has swung wide open. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And they’re usually a few steps ahead of you. 

 

With cybersecurity top of mind for your Executives and the Board, you need to anticipate questions and be ready with answers. Unfortunately, the conversation we’ve been having around cyber security is ineffective.  The right conversation is centered on business priorities and the company’s appetite for risk so the value of investment choices is clear and informed decisions can be made. The goal is to choose the right level of spend to defensibly protect your company as it operates, grows and expands.

 

Attend this session and learn:

  • What’s driving a significant change in InfoSec priorities
  • Why “how” you protect must shift to “how well” you protect
  • How to tie InfoSec investments to business priorities
Nov 18, 2022
12:10pm - 12:35pm (Eastern)
Verizon Presentation: By The Numbers: Leveraging Verizon's Research To Enhance Your Security Program

Three recent research reports from Verizon — the 2022 Data Breach Investigations Report, the Mobile Security Index and the Payment Security Report — offer a wealth of insight into cybercrime trends. Verizon’s Mark Norberg will break down the findings from these industry-leading pieces of thought leadership and explain how to use the reports to remediate a broad range of risks.

Nov 18, 2022
1:05pm - 1:55pm (Eastern)
Panel 2: Securing the Hybrid & Remote Workforce

As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.

This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.

Nov 18, 2022
1:55pm - 2:20pm (Eastern)
Veeam Software Presentation: Secure Your Recovery at Scale and With a Reliable, Ready-to-Recover Posture in the Data Center and Cloud.
The challenges and complexity of maintaining a secure “ready-to-recover” posture grow exponentially as the volume of data, the number of locations and numbers of workloads continue to sky rocket.
Veeam a leading global vendor in data protection will discuss how to adopt principles of the Zero Trust and build a secure, reliable, predictable backup and recovery solution resilient to attack, across datacenter, cloud and SaaS workloads.
 
Learn how to improve your cyber security posture, reduce vulnerabilities, protect your data and align your recovery capabilities to better mitigate the adversary as  detailed in the MITRE ATT&CK knowledge base. Learn best practices like data immutability, granular access and recovery testing can ensure your mission-critical data and apps will always be available.
 
This session will explore recommendations and a techniques improve your data backup and recovery to mitigate cyber threats. Concepts and topics covered will include:
•             Secure all of your data, both on-prem and in the cloud
•             De-risk planned cloud application migration or repatriation
•             Protect backups against malware attack
•             Orchestrate disaster recovery with a focus on cyberattack data loss incidents
•             Restore data with confidence that you’re not putting malware back into your environment
Nov 18, 2022
2:20pm - 2:45pm (Eastern)
Dell Technologies Presentation: Building Cyber Resilience To Recover From Cyber Attacks

Data is the lifeblood of business and other organizations in this digital age. Yet that data and the applications running the business are under constant attack. Nation states create cyber weapons that lock up data centers, sophisticated criminals employ the latest capabilities to gain access and encrypt data for ransom while destroying backups, and the threat of insiders becomes more critical as the stakes grow higher.

In this session, learn the details about how sophisticated cyber attacks occur; why cyber insurance isn’t enough and paying a ransom has to be the option of last resort; and techniques and capabilities you must have to ensure your organization’s ability to recover safely and efficiently from a sophisticated cyber disaster.

Nov 18, 2022
2:45pm - 3:10pm (Eastern)
Check Point Software Technologies Presentation: Digital Transformation for Future Threat

Building a preventative cyber security program depends on an organization’s ability to learn from past cyber-attacks and innovate for the future. In this presentation, we would look back at previous security incidents, review some current trends and identity emerging preventative controls organizations should consider to stop future attacks.

Nov 18, 2022
3:25pm - 4:10pm (Eastern)
Panel 3: Securing the Cloud

Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.

This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.

Nov 18, 2022
4:10pm - 4:35pm (Eastern)
Forescout Presentation: Automating Cyber Security Across Your Digital Terrain

Digital transformation has led to explosive growth in IT, IoT, IoMT and OT/ICS assets connecting to organizational networks. Innovations such as remote access, distributed operations and mobile workforces have improved efficiency – while expanding the cyberattack surface. This is your digital reality: the sum of everything connected to your network, from campus to cloud and data center to edge.

 

Join Adam Kohler to learn:

  • How to align your digital reality with your security framework
  • The importance of discovering, assessing, and governing across all cyber assets
  • Lessons from cybersecurity research team, Vedere Labs, and the current threat landscape
Nov 18, 2022
4:35pm - 5:00pm (Eastern)
Fortinet Presentation: Getting Cybersecurity Right for the New Normal

Coming out of the pandemic, it’s clear that the volume, variety velocity, and complexity of the threats and challenges facing security teams are accelerating – with little sign of let-up. The new normal of digital acceleration, connected systems and platforms, and more distributed computing than ever before, is changing every facet of how we communicate, conduct commerce and interact. Going forward, getting cybersecurity right will require a platform-based approach that converges networking and security to enable visibility, integration, and coordination at speed and scale.

Nov 18, 2022
5:00pm - 5:25pm (Eastern)
Google Presentation: Improving Your Organization’s Security Posture with Chrome Browser

Now more than ever, security has to be top of mind for IT and security teams. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. IT teams need to make sure every piece of their tech stack helps support their security needs. And that starts with the browser, a key component of end user productivity. Hear from the Chrome team on how to improve your security posture with Chrome.