Agenda

Date and TimeTitle
Apr 4, 2024
8:00am - 8:09am (Eastern)
Opening Introductions
Apr 4, 2024
8:00am - 8:45am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
8:45am - 9:06am (Eastern)
Interpres | Operationalizing Cyber Threat Intelligence To Optimize Your Defenses
Apr 4, 2024
9:03am - 9:38am (Eastern)
Zyston | Cybersecurity Program Management in the Complex Environment of Cybersecurity
Apr 4, 2024
9:35am - 10:05am (Eastern)
Infoblox | Weaponizing DNS to Defend the Enterprise

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but can also an incredible opportunity to prevent and detect threats.  Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Apr 4, 2024
10:10am - 10:40am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
10:40am - 11:10am (Eastern)
Imperva | DDoS attacks are on the rise: see a live attack and mitigation demo
What does a DDoS (Distributed Denial of Service) attack really look like? What problems can it present for your organization? And why is it important to be able to immediately mitigate such attacks? Join Alex Bakshtein, a global DDoS expert, to see a DDoS attack simulation and mitigation. Alex will discuss and show:
  • The current DDoS threat landscape
  • The risks every organization faces if they are not prepared for an attack
  • A simulated live attack, it’s mitigation and post mortem
Apr 4, 2024
11:10am - 11:45am (Eastern)
Illumio | 30 Years of Arguing with Adults

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Apr 4, 2024
11:45am - 12:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
12:15pm - 1:15pm (Eastern)
Keynote | "Emotional Intelligence: Does your cybersecurity leadership have it?"
Apr 4, 2024
1:10pm - 1:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
1:45pm - 2:15pm (Eastern)
Next DLP | AI for Security

What to know when talking to vendors about their implementation of Artificial Intelligence into their products.

Apr 4, 2024
2:10pm - 2:45pm (Eastern)
Cavelo | Attack Surface Management – The Missing Middle of Cybersecurity

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.

In this presentation, we will discuss:

The role of CAASM and attack surface management (ASM) in the future of risk management technologies

Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack

Different methods of ASM and benefits of automation for continuous management

Apr 4, 2024
2:45pm - 3:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
3:00pm - 3:25pm (Eastern)
Proofpoint | Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Apr 4, 2024
3:23pm - 3:43pm (Eastern)
Cloudflare | Moving Towards a Zero Trust Mindset

Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.

Apr 4, 2024
3:40pm - 4:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 4, 2024
4:10pm - 5:10pm (Eastern)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Apr 4, 2024
5:10pm - 5:25pm (Eastern)
Closing Remarks