Agenda

Date and TimeTitle
Sep 8, 2022
8:00am - 8:07am (Central)
Opening Introductions
Sep 8, 2022
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
9:00am - 9:30am (Central)
Pentera | Is Your Defensive Stack Ready For A Targeted Attack? | Shaun Parmassar Solutions Engineer
Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.
 
Sep 8, 2022
9:30am - 10:00am (Central)
Darktrace | Stopping Attacks, Not Your Business: AI & Autonomous Response | Zachary Hedayat Account Executive
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Austin in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
 
Sep 8, 2022
10:00am - 10:30am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
10:30am - 11:00am (Central)
Cloudflare | Zero Trust email security | Carlos Munoz Territory Manager
Sep 8, 2022
11:00am - 11:25am (Central)
Reciprocity | It Takes More than Automated Compliance to Get Ahead of Threats | Meghan Maneval Director of GRC Exports

In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up.

Automation is a strong first step in reducing manual work and freeing up your team’s workload.  However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions.

The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work.

Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day.

Attend this webinar and learn how to:

  • Focus your planning efforts around your organization’s strategic business priorities
  • Be more proactive by automating evidence collection, risk scoring and monitoring
  • Gain actionable insights to help you clearly communicate with key stakeholders
Sep 8, 2022
11:25am - 12:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
12:00pm - 1:00pm (Central)
Keynote | Cybersecurity in the natural gas industry | Jim Linn Chief Information Officer American Gas Association
Sep 8, 2022
1:00pm - 1:30pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
1:30pm - 2:00pm (Central)
IP Pathways | Everything You Should Know About API Security | Chad Bailey Engineer

This learning session is designed to help organizations understand the security problems within APIs. With APIs being the connective tissue of digital transformation, many incorrectly assume that traditional security products are enough. The reality is that most organizations have an API blind spot and have no visibility into how many they use. Ultimately, you cannot protect what you cannot see.

 
Sep 8, 2022
2:00pm - 2:30pm (Central)
Sonatype | Open Source Developers Are Security’s New Front Line | Neel Thakkar Solutions Engineer

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well.  In this session, Sonatype will explain how both security and developers must work together to stop this trend. Or, risk losing the entire open source ecosystem.

  • Analyze, and detail, the events leading to today’s “all-out” attack on the OSS industry
  • Define what the future of open source looks like in today’s new normal
  • Outline how developers can step into the role of security, to protect themselves, and the millions of people depending on them
Sep 8, 2022
2:30pm - 2:40pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
2:40pm - 3:08pm (Central)
Cybereason | Defend Forward: A Proactive Model for Cyber Deterrence | Nate Johnson Director, Solutions Engineering

As the lines between nation-state sponsored and financially motivated cybercrime attacks continue to blur, and as government officials around the world warn businesses to prepare for cyberattacks stemming from geopolitical conflicts, Defend Forward seeks to empower organizations with the proactive strategies and bias for action they need to confront motivated adversaries.  This session will arm organizations with the concepts key to not only defending themselves from cyberattacks, but essential in deterring them as much as possible.

 
Sep 8, 2022
3:08pm - 3:43pm (Central)
Cavelo | The First Step to Security Maturity: Owning Your Data | Phil Guerin Solutions Architect

Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.

This session will review:

  • Identifying a Critical Path through security frameworks like the NIST Cybersecurity Maturity Model
  • Understanding the evolution of Data Complexity
  • Leveraging core security initiatives to achieve greater security maturity, whether you’re getting started establishing your baseline or scaling your strategy
Sep 8, 2022
3:40pm - 4:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 8, 2022
4:00pm - 5:00pm (Central)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Sep 8, 2022
5:00pm - 5:15pm (Central)
Closing Remarks