Agenda

Date and TimeTitle
Dec 8, 2022
8:30am - 3:00pm (Pacific)
Exhibitor Hall Open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

Dec 8, 2022
9:00am - 9:55am (Pacific)
[Opening Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
Dec 8, 2022
9:45am - 10:00am (Pacific)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Dec 8, 2022
10:00am - 10:59am (Pacific)
Addressing Modern-Day Data Breaches
Dec 8, 2022
10:00am - 11:00am (Pacific)
Uber CSO Trial & Drizzly Proposed Order
CSO Liability and What Security Professionals Need to Know to Sleep Better at Night
 

The presentation will go behind the headlines to understand the facts of recent CISO indictment and whistleblower complaints, and discuss risks associated with failure to report data incidents or adhere to security standards.  We will discuss a model for collaboration between legal and IT, the importance of defined governance structures and infosec policies, and the potential for D&O or other insurance products to protect security professionals, as needed.

Dec 8, 2022
10:45am - 11:00am (Pacific)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Dec 8, 2022
11:00am - 11:54am (Pacific)
Incredible Email Hacks You'd Never Expect and How You Can Stop Them

If you think the only way your network and devices can be compromised via email is phishing, think again!

A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms, cybercriminals have more than enough email-based tricks that mean trouble for your InfoSec team.

In this webinar Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering and phishing to trick your users into revealing sensitive data or enabling malicious code to run.

Roger will show you how hackers compromise your network. You’ll also see incredible demos including a (pre-filmed) hacking demo by Kevin Mitnick, the World’s Most Famous Hacker and KnowBe4’s Chief Hacking Officer.

Roger will teach you:

  • How remote password hash capture, silent malware launches and rogue rules work
  • Why rogue documents, establishing fake relationships and tricking you into compromising your ethics are so effective
  • The ins and outs of clickjacking
  • Actionable steps on how to defend against them all

Email is still a top attack vector cybercriminals use. Don’t leave your network vulnerable to these attacks.

Dec 8, 2022
11:00am - 11:41am (Pacific)
Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite

To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:

  • Uncover and analyze new and evolving threats at petabyte scale.
  • Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
  • Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
  • Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
  • Hunt for new and advanced threats 90% faster than traditional SOC tools.
Dec 8, 2022
11:00am - 11:45am (Pacific)
Online Consumer Privacy Is Too Complicated for Consumers
Are you using basic tools to protect yourself, your company, and your family? The consumer has no idea what personal information they are sharing or how they’re tracked online. Let’s talk about how our industry can address this challenge to protect the consumer from themselves.
 
Presentation Level: GENERAL (InfoSec best practices, trends, solutions, etc.)
Dec 8, 2022
11:45am - 12:00pm (Pacific)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Dec 8, 2022
12:00pm - 12:50pm (Pacific)
Transforming Information Security for Businesses of All Sizes

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirement that does not scale. Requirements placed on the end organization exacerbate the burden, whereas “shift left,” setting requirements on the vendor, can alleviate it. Industry has a unique opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns for security management is paramount.

Dec 8, 2022
12:00pm - 12:46pm (Pacific)
What Is the State of the Cybersecurity Job and Career Market in the U.S.?

Have security professionals been impacted by the economic change? Is remote work going to stay? What is hybrid work? Do professionals mostly want remote work or hybrid work?  Are there certain security jobs that are growing or retracting? Are we retaining talent longer or shorter than the years before? Are professionals more burnt out or less than before? Are salaries increasing or decreasing? Why is it so hard to job search? Are we less secure with everyone working remote? These questions will be answered in detail. Join Deidre Diamond, Founder and CEO of CyberSN and Founder of SecureDiversity.

Dec 8, 2022
12:45pm - 1:00pm (Pacific)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Dec 8, 2022
1:00pm - 1:44pm (Pacific)
Interview with the CISO: Cyber Insurance Strategies
Dec 8, 2022
1:00pm - 1:48pm (Pacific)
1Password Masterclass: Proven Security Tactics vs. Security Theatre

Many password myths and security policies make things less secure for everyone and harder to stay safe online. Learn how to spot and avoid security theatre.

Dec 8, 2022
1:00pm - 1:59pm (Pacific)
[Panel] Prioritizing the Current Threatscape

Ransomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.

Dec 8, 2022
1:45pm - 2:00pm (Pacific)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Dec 8, 2022
2:00pm - 2:55pm (Pacific)
[Closing Keynote] Ukraine vs. Russia: The Cyber War, 8 Month Update

For a preview of Col. Cedric’s Leighton’s presentation, read the SecureWorld News article, “World’s First Hybrid War in Ukraine Holds Important Cyber Lessons.”