Agenda

Date and TimeTitle
Aug 3, 2022
8:30am - 2:30pm (Eastern)
Exhibitor Hall Open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

Aug 3, 2022
9:00am - 9:48am (Eastern)
[Opening Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
Aug 3, 2022
9:45am - 10:00am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 3, 2022
10:00am - 10:40am (Eastern)
Never Trust. Always Verify

Humans are inherently both trusting and distrusting, without even knowing it! We pick up on innumerable subtle micro expressions and nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process and alert us to “things out of place” and focus our attention, silencing distractions so we can verify trust.

In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts.

Aug 3, 2022
10:00am - 10:35am (Eastern)
Effective Leadership: It's All About Communication
Aug 3, 2022
10:00am - 10:40am (Eastern)
Ransomware: #1 with a Bullet

All cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.

But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.

Aug 3, 2022
10:30am - 10:45am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 3, 2022
10:45am - 11:21am (Eastern)
PAM Back to Basics

With so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes (Gartner puts it at the top of the security list for two years running). Join Delinea’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.

Aug 3, 2022
10:45am - 11:30am (Eastern)
[PANEL] Advice from the Field: The Future of InfoSec Work

Join us for an interactive panel composed of female pioneers in the cybersecurity space where they’ll discuss the current climate and culture in cybersecurity. They will share their personal experiences being a woman in STEM, advice for charting your own career path, and the future of work for the InfoSec industry. This panel discuss will allow for open online Q&A discussion.

Aug 3, 2022
11:15am - 11:30am (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 3, 2022
11:30am - 12:05pm (Eastern)
[Lunch Keynote] Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite

To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:

  • Uncover and analyze new and evolving threats at petabyte scale.
  • Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
  • Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
  • Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
  • Hunt for new and advanced threats 90% faster than traditional SOC tools.
Aug 3, 2022
12:00pm - 12:15pm (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 3, 2022
12:15pm - 1:05pm (Eastern)
The Inadvertent Remote Insider Threat

Threat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices.

This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls.

Objectives:

  • Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity
  • How to identify system based behavioral indicators
  • Learn which existing or enhanced security layer can provide insider threat profile data
  • Learn how areas of the organization, i.e. Legal, Procurement, and HR, are key stakeholders in assisting to identify insider threat activity

Key Takeaways:

  • How to identify business processes which can contribute to remote work insider threats
  • Enhance current security program on what controls are bypassed by utilizing routine IT procedures
  • Enhance procedures required to identify insider threat exposures
  • Enhance awareness training to include additional methods of insider threat
  • Enhance existing physical and digital security layers to better identify specific insider threat activity
Aug 3, 2022
12:15pm - 1:12pm (Eastern)
[Panel] Prioritizing the Current Threatscape

Ransomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.

Aug 3, 2022
12:15pm - 1:07pm (Eastern)
Five Things to Understand About Privacy Law Right Now

This past year we have seen significant changes to privacy laws, states like California, Utah, Virginia, Colorado, and Connecticut have passed sweeping, and sometimes disparate, data privacy laws. In addition, privacy professionals are excited to see movement at the Federal level when the U.S. House of Representatives Subcommittee on Consumer Protection and Commerce passed by voice vote H.R. 8152, the American Data Privacy and Protection Act (“ADPPA”). And yet, privacy law is as misunderstood as the concept of privacy itself. Moreover, businesses face substantial challenges with legal compliance and individuals do not fully understand their rights.

This session will dispel myths and answer pressing questions about the concept of privacy itself. We will explore the changing domestic legal data privacy obligations and explain the similarities and differences businesses need to know. We will also provide a top 5 of things businesses need to understand about data privacy, what it is and how it applies to data they collect.

Aug 3, 2022
1:00pm - 1:15pm (Eastern)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 3, 2022
1:15pm - 2:00pm (Eastern)
Ukraine vs. Russia: The Cyber War