Agenda

Date and TimeTitle
Jul 27, 2023
8:00am - 8:05am (Eastern)
Opening Introductions
Jul 27, 2023
8:00am - 8:45am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
8:45am - 9:15am (Eastern)
Forescout | Today’s Threat Landscape Requires a Unique Capability

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Jul 27, 2023
9:15am - 9:40am (Eastern)
Cavelo | Asset Management: A Strategic Approach to Risk Mitigation

This presentation emphasizes the essential role of asset management in comprehensive risk management. Covering breach prevention, insurance, reputational risk, and asset discovery and management, it highlights asset management as a primary strategy. Attendees will gain insights into proactive breach prevention measures, the relevance of insurance in risk scenarios, and the impact of asset management on brand reputation. By integrating asset management practices, organizations can optimize risk assessment, incident response, and resource allocation, fortifying their resilience in the face of evolving threats.

Jul 27, 2023
9:40am - 10:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
10:15am - 10:45am (Eastern)
Imperva | Anatomy of Digital Fraud

Application modernization is the result of many digital transformation projects, but that journey can create security challenges which are amplifying exposure to digital fraud. The complexity of digital services which require heterogenous systems to interoperate seamlessly through APIs are now creating blind spots for organizations.

To secure this application sprawl, industry experts and analysts now consider securing applications and API through an integrated approach as the gold standard to preemptively protect against sophisticated attacks that leverage not only known and zero-day vulnerabilities, but also abuse what can appear to be legitimate to your valuable data for fraud. Join this presentation to understand the key vulnerabilities that emerge from modernizing your digital services, and what you can do to be proactive and protect your critical data.

Jul 27, 2023
10:45am - 11:15am (Eastern)
ManageEngine | Risk to Resilience: Ensuring optimum cyberhygiene with Endpoint Security

In today‘s threat landscape, digital transformation is crucial for organizations looking to stay ahead of threat actors. To achieve this, IT and Security teams must work together to ward off cyberattacks and ensure a positive employee experience. In this session, we’ll highlight the endpoint security strategies for your IT stack against known and unknown vulnerabilities.

Jul 27, 2023
11:15am - 11:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
11:30am - 12:00pm (Eastern)
Atlantic Data Security | Should your organization be trusted?

Should other organizations (and individuals?) trust yours with their most valuable assets? Should you trust them with yours? How can you know? It’s not as challenging as you might think – join us to find out who you can trust and how to increase your own trustworthiness.

Jul 27, 2023
11:55am - 12:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
12:15pm - 1:15pm (Eastern)
Keynote | Cyber Fundamentals: A Necessity | Dave Summitt VP Cyber Security, Florida Cancer Specialists & Research Institute
Jul 27, 2023
1:15pm - 1:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
1:45pm - 2:15pm (Eastern)
Netskope | Securely Leveraging AI for Business Growth: The Role of Security Service Edge (SSE)

In today’s rapidly evolving digital landscape, businesses are increasingly relying on artificial intelligence (AI) to drive growth and innovation. However, integrating AI into existing systems while maintaining optimal security poses significant challenges. This talk will explore the concept of Security Service Edge (SSE) and its role in safely enabling the use of AI to accelerate business growth without compromising performance or security. We will discuss how SSE acts as a critical security layer at the edge of the network, providing advanced threat protection, data privacy, and secure access controls. Join us to discover practical strategies for leveraging AI while ensuring robust security measures, enabling organizations to harness the power of AI to drive business success.

Jul 27, 2023
2:12pm - 2:32pm (Eastern)
CyberFox | Best of Both Worlds: Privileged Access Management

As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates. Dave Gunther provides a solution called “The Best of Both Worlds”, which aims to increase security while reducing end-user frustration. Learn more about this solution and how it can help you protect your organization from cyber threats.

Jul 27, 2023
2:30pm - 2:51pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
2:50pm - 3:20pm (Eastern)
Next | Protecting Data in a Distributed World
Change is the only constant.

Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing proprietary communications protocols and hard-wired devices.

Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies.

Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey.

No man steps in the same river twice.

Jul 27, 2023
3:20pm - 3:50pm (Eastern)
Verteks | Moving from cybersecurity to cyber resilience to defend against surging threats

While cybersecurity protection systems are critical and necessary, recent high-profile attacks like the Barracuda email attack prove that even with great cybersecurity we are still vulnerable to exploits and attacks – often from undisclosed and undetectable ‘zero-day’ vulnerabilities.  That is why it is critical to build cyber resiliency, not just cybersecurity.

Cybersecurity encompasses conventional preventive measures such as firewalls, antivirus and intrusion detection – which remain essential to defending networks and protecting data.  Going beyond cybersecurity and moving towards cyber resilience is critical to withstanding the surging number of threats and changing attack vectors.

In this session we will discuss how you can incorporate business continuity, risk management and incident response into your strategy to move from security to resilience. You will learn the 6 steps to establish a resilience framework that ensures your ability to respond quickly and decisively to an ongoing attack in order to limit disruptions and sustain operations.

Jul 27, 2023
3:50pm - 4:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 27, 2023
4:15pm - 5:30pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Jul 27, 2023
5:25pm - 5:40pm (Eastern)
Closing Remarks