Agenda

Date and TimeTitle
Dec 8, 2022
8:35am - 9:10am (Central)
Opening Security Keynote with Darktrace: How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Dec 8, 2022
9:10am - 9:40am (Central)
Presenting Security Keynote with Google: Improving Your Organization’s Security Posture with Chrome Browser

Now more than ever, security has to be top of mind for IT and security teams. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. IT teams need to make sure every piece of their tech stack helps support their security needs. And that starts with the browser, a key component of end user productivity. Hear from the Chrome team on how to improve your security posture with Chrome. 

Dec 8, 2022
9:40am - 10:05am (Central)
Tenable Presentation: The Silent Scream of Every Network: The Horror that is Active Directory Security

Lying deep in every network is Active Directory. The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. It rarely is given the attention that it needs to withstand the onslaught from attackers, both inside and outside. Everyone knows it needs attention, but one wrong setting could cause it to stop, causing total disruption of the network. M&A can cause significant security holes if not analyzed thoroughly. In the session, Craig will show you how to secure AD, making it capable of withstanding the constant attacks.

Dec 8, 2022
10:35am - 11:20am (Central)
Panel 1: Ransomware and Resiliency – To Trust or Not Trust?

While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.

As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.

This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.

Dec 8, 2022
11:20am - 11:45am (Central)
Exabeam Presentation: Seize the Breach: Why Breaches Still Occur and How to Mitigate Them

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion on:

  • Why SOC and security teams are way too limited by legacy SIEM
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
  • A simple maturity model based on outcomes and use cases that can vastly improved Security Operation
Dec 8, 2022
11:45am - 12:10pm (Central)
HolistiCyber Presentation: Getting Security Teams To Think “Cloud” Why Is It Hard?

We all have been talking  about “cloud”  for a number of years. We migrated to the cloud and working in and with multi-cloud environments. However, security teams in many organizations have a hard time keeping up. Cloud environments and technologies are fundamentally different than traditional on-prem environments, with different challenges, new risks (as well as opportunities), threats and tools unique to the cloud. Trying to move security teams to consider the cloud environment NOT as an extension or as an evolution of the on-prem environment is not easy and many fail trying to adopt similar methodologies and techniques embedding security into the cloud as they did on prem. In this session we will talk about why and where it is so different, focusing on  how organizations and security teams should act differently when addressing security concerns in the cloud.

Dec 8, 2022
12:10pm - 12:35pm (Central)
Cisco Secure Presentation: Zero Trust & The Flaming Sword of Justice

Security breaches become headlines, and breach headlines that were rare just five years ago seem to occupy today’s daily news cycle. At the same time, the outdated image of an information security practitioner running through the office, brandishing their flaming sword of justice and screaming, “thou shall not pass!” is now from a bygone era. In fact, many of today’s data breaches are made possible by missteps and misconfigurations, and compounding this are security issues introduced to website authentication mechanisms that enforce bad end user behavior. As a result, security debt has become a significant problem for most organizations, and attackers will exploit it to their advantage.

Dec 8, 2022
1:10pm - 1:55pm (Central)
Panel 2: Securing the Hybrid & Remote Workforce

As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.

This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.

Dec 8, 2022
1:55pm - 2:20pm (Central)
Swimlane Presentation: Improving Security through Automation
Dec 8, 2022
2:20pm - 2:45pm (Central)
Commvault Presentation: Ransomware Protection - A Layered Approach to Securing Your Data

Multi-generational data sprawl leads to data fragmentation, an increased surface for cyberattacks, complicates automation and process efficiency efforts, and increases the potential risk of a successful ransomware attack.  When ransomware strikes, simplicity and scalability are critical to minimizing disruption and resuming business operations quickly. Learn how to reduce the attack surface across workloads, architect for faster cyber recovery and leverage best practices with key integrations with security ecosystem technology stack to protect, detect, and recover from ransomware threats through multi-layered security and Zero Trust Principles for on-premises, SaaS applications, cloud, and hybrid infrastructures with a unified experience. 

Dec 8, 2022
2:45pm - 3:10pm (Central)
Banyan Security Presentation: Driving Zero Trust at Two Different Companies: Lessons Learned

As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale. 

Dec 8, 2022
3:25pm - 4:10pm (Central)
Panel 3: Securing the Cloud

Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.

This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.

Dec 8, 2022
4:10pm - 4:35pm (Central)
Oomnitza Presentation: Continuous Audit Readiness - Why, What to Consider and How to Automate Processes