Agenda

Date and TimeTitle
Dec 1, 2022
8:00am - 8:07am (Eastern)
Opening Introductions
Dec 1, 2022
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
9:00am - 9:30am (Eastern)
Igel | Business Continuity: It’s More than Just a Backup Data Center | Dan Dillman Director – Enterprise Relationships, Great Lakes
Dec 1, 2022
9:30am - 10:00am (Eastern)
Exabeam | The Future of SIEM | Ben Burkholder Senior Sales Engineer

Cybersecurity teams are struggling to keep up with a high volume of alerts with real threats buried in a sea of noise. With today’s breaches rooted in compromised credentials, it is difficult for defenders to know what is abnormal when everything appears “normal”. Without a holistic view of events across your environment with automation to speed investigations, it is difficult to identify, investigate, and respond to threats quickly, consistently and accurately. If today’s SIEMs aren’t keeping up, what does the future hold?

 Attend this talk and learn how:

  • A cloud-native SIEM lets you ingest, search and store data from anywhere — and collect more of the data you need when you need it
  • Understanding normal user and entity behavior helps you accurately detect and prioritize anomalies — including use of valid credentials — even as normal changes
  • To speed response to incidents with a fully-automated workflow – helping security teams consistently beat the adversaries.
  • A SIEM can deliver meaningful solution support for your team, making them more productive and effective.
Dec 1, 2022
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
10:30am - 11:00am (Eastern)
ThreatLocker | Zero Trust at the Endpoint: Fighting Ransomware | Chad Maskill Cyber Hero

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.

Dec 1, 2022
11:01am - 11:26am (Eastern)
Reciprocity | See Risk Differently! Surface unseen risk to get ahead of threats! | Meghan Maneval Director of Technical Product Management

Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected.  Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And they’re usually a few steps ahead of you.

How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams?  You need to see risk differently by taking a different approach!

Join this session and learn how to:

  • Gain insight into your risk posture and how risk impacts your business priorities

  • Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities

  • Use intelligence and automation to deliver quick wins while freeing  up your team’s’ time

Dec 1, 2022
11:25am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
12:00pm - 1:00pm (Eastern)
Fireside Chat | Building Teams and Thinking Differently
Dec 1, 2022
1:00pm - 1:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
1:30pm - 2:00pm (Eastern)
Phosphorus | Cameras, CACs & Clocks: xIoT Security Sucks: A story of millions of interrogated Things | Robert Esposito Director of Security Strategy

Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes.

Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer.

We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks.

These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets.

We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers.

Dec 1, 2022
2:00pm - 2:30pm (Eastern)
Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Christer Swartz Principal Technical Engineer

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Dec 1, 2022
2:30pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
2:45pm - 3:15pm (Eastern)
Darktrace | How AI Can Think Like an Attacker | John Allen VP Cyber Risk & Compliance
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
 
Dec 1, 2022
3:15pm - 3:45pm (Eastern)
Red Canary | Threat Detection & Response Beyond Your Endpoints | Laura Hamel Principal of Managed Detection and Response

Combatting ransomware attacks requires effective endpoint threat detection & response (EDR). But EDR alone is not enough: teams need to defend their networks, identities, cloud infrastructures, and more—often without the necessary internal expertise to handle an incident appropriately.

That’s where Managed Detection & Response (MDR) providers can help. Join us for our upcoming webinar to learn how MDR extends your coverage beyond the endpoint, detects threats that bypass security products, and saves time and money by offloading labor-intensive tasks.

What you’ll learn

  • How MDR extends EDR coverage
  • The operational benefits of MDR
  • How Red Canary MDR helps you detect more threats, faster
Dec 1, 2022
3:45pm - 4:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 1, 2022
4:00pm - 5:08pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Dec 1, 2022
5:08pm - 5:23pm (Eastern)
Closing Remarks