Agenda

Date and TimeTitle
Mar 30, 2022
8:30am - 9:30am (Eastern)
Exhibitor Hall Open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

 
 
Mar 30, 2022
9:00am - 9:50am (Eastern)
[Opening Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
Mar 30, 2022
9:45am - 10:00am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 30, 2022
10:00am - 10:45am (Eastern)
How Can We Be More Secure in a World of Distractions?

We are living in a world of distractions—smartphones, alerting devices at home, metaverse—and we have a job to secure ourselves, our loved ones, and we get paid for doing it at work. How is this supposed to happen when families and staff are texting, exchanging information until they sleep? Control everything or do nothing? What is the appropriate balance? How do I keep sane? Come to this presentation on lessons of leadership and operating in a more secure way within this world of distractions.

Mar 30, 2022
10:00am - 10:36am (Eastern)
Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework

Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

Mar 30, 2022
10:30am - 10:45am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 30, 2022
10:45am - 11:37am (Eastern)
Shifting Sands: Exploring the Dynamic Domestic Privacy Legal Landscape

Unlike Europe that has an overarching data privacy law (the General Data Protection Regulation) the US federal government has been seemingly mired in a sectoral approach to data privacy, i.e., HIPAA, GLBA, COPPA, and so forth. As a result, we have seen a patchwork-like approach to data privacy legal requirements. States like California, Virginia, and Colorado have already moved to the forefront and passed data privacy laws, and states like Utah, New York, Pennsylvania, and New Jersey, along with several others, are attempting to pass their own version of data privacy laws with Utah widely expected to sign into law the Consumer Privacy Act sometime this month. This creates a substantial challenge for any business trying to create a comprehensive privacy and security program that complies with the various, and at times conflicting, legal requirements.

This Session will explore the changing domestic legal data privacy obligations for businesses and compare those laws so attendees will get an overview of the consequential differences. We will also provide a roadmap on how organizations can “meet the moment” as data privacy moves into the forefront of corporate concern and potential liability.

Mar 30, 2022
10:45am - 11:25am (Eastern)
Top 10 Challenges Preventing Security Analysts from Doing Their Best Work

Security teams are being prevented from doing their best work. While understaffing and low budgets have always been challenges for any type of team, security teams are uniquely affected by repetitive, manual tasks, which in turn keep them from working on higher-impact projects that contribute to their organization’s overall security posture. It’s no surprise to learn that 71% of analysts are experiencing some level of burnout and 64% say they’re likely to switch jobs in the next year. Our research goes further to breakdown causes of burnout and how to alleviate it to improve employee retention. This presentation will share the data from an in-depth survey of the day-to-day struggles of security analysts, as well as greater context on groups surveyed and the methodology used.

We’ll cover the top five tasks consuming the most time, the top three tasks analytics enjoy the least, manual work and automation, and actionable takeaways for security teams. Our goal with this presentation is to help security leaders recognize what they can do to streamline their processes, decrease burnout, increase retention, and create better overall work environments for their analysts.

Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

Mar 30, 2022
10:45am - 11:35am (Eastern)
Ripples Across the Risk Surface: New Waves in 2022

Join the head of strategy from RiskRecon for a presentation based on exclusive research with Cyentia on multi-party breaches and the effect it can have on your firm and its supply chain, including:

  • how multi-party incidents have hurt organizations financially since 2008
  • the differences in impact between multi-party and single-party security incidents
  • the number of days for a typical ripple event to reach 75% of its downstream victims
Mar 30, 2022
11:15am - 11:30am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 30, 2022
11:30am - 12:24pm (Eastern)
[Lunch Keynote] Secure Your Network by Thinking Like an Attacker

Attackers don’t think in lists and spreadsheets. Attackers function by looking at paths, AKA attack paths. “How can I get to where I am going from where I am?” Let 17X Microsoft MVP Derek Melber describe how attackers compromise, enumerate, move laterally, and elevate privileges with such ease. Then, he will flip the script and discuss how you can secure your network by looking at attack paths and blast radiuses. By the end of this session you will see how you can beat the attackers at their own game.

Mar 30, 2022
12:00pm - 12:15pm (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 30, 2022
12:15pm - 1:01pm (Eastern)
Diversity Is the Result of Inclusive Cultures

This talk centers on a 9-piece framework to help you create inclusive cultures that will result in diverse workplaces, called the Standards of Inclusive Behavior. We will explore how each of the nine standards for interactions impacts our professional environments and how to use this framework to create equality and diversity of thought. When we establish a baseline of standards for human interactions that are framed through the window of cybersecurity, our teams and organizations can excel because expectations are clear and fair.

Our security, privacy, economic well-being, and mental health depend on the ability to engage others positively and this is a skill that employers rarely teach.

Mar 30, 2022
12:15pm - 1:12pm (Eastern)
[Panel] Prioritizing the Current Threatscape

Ransomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.

Mar 30, 2022
1:00pm - 1:15pm (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 30, 2022
1:15pm - 1:51pm (Eastern)
[Closing Keynote] Detection and Response with Google Chronicle, and Preview of Threat Perception

Learn how Google Chronicle enables customers to accelerate their threat detection, investigation and response program, and drive towards achieving critical security outcomes.

Dive into how our customers are using Threat Perception, our latest capability, to enhance their security posture and act on prioritization of alerts with risk scoring.