Agenda

Date and TimeTitle
Feb 23, 2023
8:00am - 8:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
8:00am - 8:05am (Eastern)
Opening Introductions
Feb 23, 2023
9:00am - 9:30am (Eastern)
IGEL | Securing the User Edge

In today’s world of hybrid work, multicloud environments, and BYOD, employees are connecting to new and multiple types of endpoints. Meanwhile, the sophistication of cyber-attacks continues to rise, making it more difficult to ensure the security of all endpoints across your organization.

In this presentation, learn how to create a strategy to bridge the gap between end-users and their workspaces, apps, and data, while providing a secure endpoint and seamless user experience

Feb 23, 2023
9:30am - 10:00am (Eastern)
LiveAction | Stories from the Front Lines: SOC Edition

There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include:

·        The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat

·        From the UK to Aliens to Pink Floyd: The British Hacker Story

·        The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach

Feb 23, 2023
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
10:30am - 11:00am (Eastern)
Flare | Dissecting the Dark Web Supply Chain

For as little as $10, unsophisticated threat actors can steal information that allows them to impersonate a victim’s browser fingerprint, gain access to hundreds of unique logins stored in the browser, and potentially bypass corporate 2FA Controls. Seems like a steal?

With that level of access and quality data, the Infected Device Markets continue to grow on the dark web, clear web, and illicit Telegram channels. On February 14th at 11 am EST, join Flare Director of Marketing, Eric Clay, and Threat Intelligence Researcher, Guillaume Joly as they dissect the dark web supply chain. You should expect:

– A detailed walkthrough of a complex and interconnected dark web supply chain ranging from MaaS vendors selling malware variants to Initial Access Brokers selling access to compromised environments
– A deep dive into the specialized markets that sell infostealer malware including Russian Market, Genesis Market, as well as specific Telegram channels
– Insights into how Stealer Malware is distributed, collected, and data is exfiltrated
– Best practices to mitigate the risk of stealer malware to your organization & improve detection capabilities for listings that may contain logins unique to you

Feb 23, 2023
11:00am - 11:25am (Eastern)
Banyan Security | Zero Trust: Modern Security’s Remedy to Today’s Cybersecurity Challenges

Good security requires a defense-in-depth strategy. Ensuring user trust, password managers, MFA, EDR and SSO tools all work together in concert. But, human error is often the weakest link in the security chain, you must ensure that other layers are in place to close this final link in the chain and mitigate against all modern attacks. 

This talk will share a practitioner’s hard won insight from real-world implementations at two Fortune 500 enterprises and the journey those companies are on. We will share the vision that led these organizations down the path of a defense-in-depth strategy that included Zero Trust and Security Services Edge (SSE).

Feb 23, 2023
11:25am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
12:00pm - 1:00pm (Eastern)
Keynote | 1000 Unicorns | Dr. Christopher Carter Chief Information Officer WSSC Water
Feb 23, 2023
1:00pm - 1:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
1:30pm - 2:00pm (Eastern)
Atlantic Data Security | Should your organization be trusted?

Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.

Feb 23, 2023
1:58pm - 2:30pm (Eastern)
Exabeam | How to Build an Insider Threat Program


Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

    The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
    Four attributes of a successful insider threat program
    How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
    An automated investigation experience that replaces manual routines and effectively guides new insider threat teams

Feb 23, 2023
2:20pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
2:40pm - 3:15pm (Eastern)
CyberFox | Best of Both Worlds: Privileged Access Management

As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates.

CyberFOX Vice President, Jason Samples, provides a solution called “The Best of Both Worlds”, which aims to increase security while reducing end-user frustration. Learn more about this solution and how it can help you protect your organization from cyber threats.

Feb 23, 2023
3:00pm - 3:35pm (Eastern)
Next DLP | Modern Data Protection

Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program.

Feb 23, 2023
3:30pm - 4:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 23, 2023
3:55pm - 5:00pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Feb 23, 2023
5:00pm - 5:20pm (Eastern)
Closing Remarks