Agenda

Date and TimeTitle
Oct 5, 2022
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
8:00am - 8:07am (Eastern)
Opening Introductions
Oct 5, 2022
9:00am - 9:25am (Eastern)
Bitdefender | Top 5 Ransomware Myths: What the Evolution of Ransomware Means for Businesses | Richard De La Torre Technical Manager

2021 was “the year of ransomware”. But so were 2017, 2018, 2019, and 2020 – and so far 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware – we keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Richard De La Torre, Technical Product Marketing Manager will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
Oct 5, 2022
9:25am - 10:00am (Eastern)
Darktrace | How AI Can Think Like an Attacker | Maxwell Skalski AI Security Executive

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

 
Oct 5, 2022
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
10:30am - 11:00am (Eastern)
Perception Point | Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected? | Zack St. George Director
The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services. Email. Web-based apps. Cloud Storage. Messaging platforms. CRM. Digital Apps and Services. Organizations continue to add new cloud channels to support their business needs. But with new channels come new security blind spots that must be addressed.

In this session we’ll discuss:

  • The (yet) unsolved challenges of email security – the main channel of targeted attacks
  • Digitization and remote working have forged a new frontier, positioning the web browser at the front line of cyber attacks.
  • The rising threat of cloud collaboration and the growing risk of content-borne attacks
  • Cyber attack trends in the collaboration channel ecosystem
Oct 5, 2022
11:02am - 11:22am (Eastern)
Reciprocity | See Risk Differently! Surface Unseen Risk to Get Ahead of Threats! | Devin Harris Technical Manager
Oct 5, 2022
11:20am - 11:45am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
11:45am - 12:00pm (Eastern)
Malwarebytes | Threat Disruption: Securing 2022 from 2021 | Edward Nesmejanow Solutions Engineer
Oct 5, 2022
12:00pm - 1:05pm (Eastern)
Keynote | "Transforming Information Security" | Kathleen Moriarty Chief Technology Officer Center for Internet Security

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed require transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirements that do not scale.  Service providers have an opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns is paramount.

 
Oct 5, 2022
1:05pm - 1:35pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
1:30pm - 1:57pm (Eastern)
Pentera | Is Your Defensive Stack Ready For A Targeted Attack? | Shaun Parmassar Solutions Engineer
Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies.
 
Oct 5, 2022
1:57pm - 2:27pm (Eastern)
Vectra | How to stop Ransomware BEFORE it starts. | Kevin Kennedy VP of Product Management
Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense.  Please join me as I share how ransomware has changed, how to see it before it starts, and what I predict ransomware will exploit next.
 
Oct 5, 2022
2:27pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
2:45pm - 3:15pm (Eastern)
Phosphorus | Printers, Phones, and Cameras: A Story of Two Million Interrogated Devices | Thomas Ariano Senior Software Engineer
We have examined millions of IoT, OT and network devices in the Enterprise at Phosphorus Cybersecurity. This includes everything from desktop VoIP phones to BACnet devices such as power distribution and chillers, to cameras, thermostats, door lock controllers, fire control panels, and lots of printers. Phosphorus finds a 90% common corpus of vendors that have been deployed in the Enterprise, and almost all are uncompleted, unmanaged, and insecure. With our own data, we can positively confirm remarkable statistics of extended IoT in the enterprise; the state of xIoT security today is reminiscent of the 1990s. As we walk through a few million “Things,” we will examine key statistics, such as prevalence of CVEs, commonality of default credentials, the half-life of xIoT firmware, and what measures can be taken to stay ahead of the problem.
 
Oct 5, 2022
3:15pm - 3:50pm (Eastern)
Exabeam | Why SOCs Fail - The Maturity Model Required for Cyber Resilience | Scott Gillis Regional Director Enterprise

Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.

Key Learnings:

Why an outcome-based approach is the only way to offer effective coverage and protection for your organization

How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale

Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated

Oct 5, 2022
3:45pm - 4:10pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Oct 5, 2022
4:10pm - 5:10pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Oct 5, 2022
5:10pm - 5:25pm (Eastern)
Closing Remarks