Agenda

Date and TimeTitle
Feb 28, 2024
11:00am - 11:56am (Eastern)
[Fireside Chat] Debunking Myths About Cybersecurity Insurance

In an era dominated by digital advancements and technological integration, the significance of cybersecurity has become more apparent than ever. As organizations grapple with the escalating threat landscape, the role of cybersecurity insurance has emerged as a critical component in mitigating potential financial losses. However, misconceptions and myths surrounding this specialized insurance are pervasive and can hinder informed decision-making.

This session aims to debunk prevalent myths surrounding cybersecurity insurance, offering a comprehensive exploration of the nuanced landscape. We will delve into common misconceptions, such as the belief that cybersecurity insurance is a one-size-fits-all solution, the notion that it encourages lax security practices, and the myth that coverage is unnecessary for small to medium-sized enterprises.

Through insightful discussions and real-world case studies, our expert speakers will unravel the complexities of cybersecurity insurance, shedding light on policy nuances, coverage limitations, and the evolving nature of cyber threats. Attendees will gain a deeper understanding of the vital role cybersecurity insurance plays in an organization’s risk management strategy and discover practical insights for optimizing their coverage.

Join us for an engaging session that aims to empower organizations with the knowledge needed to make informed decisions regarding cybersecurity insurance, ultimately fostering a more resilient and secure digital landscape.

Feb 28, 2024
12:00pm - 12:36pm (Eastern)
Insider Threat Actors & Artificial Intelligence

Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

Objectives:

  • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
  • Learn how to identify system and user-based behavioral indicators.
  • Learn which existing or enhanced security layer can provide insider threat profile data.

Take-Aways:

  • How to identify business processes which can contribute to intentional or unintentional insider threats.
  • Enhance procedures required to identify insider threat exposures.
  • Enhance awareness training to include additional methods of insider threat.
  • Enhance existing physical and digital security layers to better identify specific insider threat activity.
Feb 28, 2024
12:00pm - 12:51pm (Eastern)
VRM Doesn't Mean 'Very Real Migraine' — Conquering Your Vendor Risk Headaches

Waiting around for questionnaire responses. Line-by-line readings of endless security documentation. Hitting Ctrl+F. Everyone’s got their TPRM pet peeve. Not only are they annoying, but they could also be getting in the way of better, safer business outcomes.

But no more. In this session, we’ll run through a checklist of challenges that used to plague risk managers, security analysts, and InfoSec leaders on the front lines of vendor risk—and why new ways of working make these irritants a thing of the past. We’ll discuss:

  • Building alignment with key stakeholders to streamline process
  • Taking advantage of opportunities to automate, so you can focus on the actual risks
  • Getting real ROI from your TPRM program
Feb 28, 2024
1:00pm - 1:41pm (Eastern)
Using Cloud Automation to Supercharge Your Security Program

As organizations move to the cloud, it is becoming more difficult to manage the breadth of security tools and controls, including on-prem, in the cloud, and SaaS solutions. In this presentation, we will provide real-world practical ideas for using (cheap) serverless automation in the cloud to manage your security program.

Feb 28, 2024
1:00pm - 1:51pm (Eastern)
[Panel] Achieving Continuous Compliance: How to Make IT Work for Your Organization
Feb 28, 2024
2:00pm - 3:01pm (Eastern)
Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know
Feb 28, 2024
2:00pm - 2:53pm (Eastern)
[Panel] Unveiling the Threat Landscape and Unmasking Digital Villains

In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

Our panel provides a comprehensive overview of the current threat landscape.

Feb 28, 2024
3:00pm - 3:39pm (Eastern)
Threat Modeling 101: Star Wars Edition

“Help me, Obi-Wan Kenobi. You’re my only hope.” Using threat models is like getting the blueprint for the Death Star. They allow you to plan for potential scenarios or ambush attacks from stormtroopers with impossibly bad aim. Understanding the possible risks ensures your entire team will make it out of the garbage compactor and back to the Millennium Falcon.

These ARE the droids you’re looking for….

Fellow Rebels will gain an understanding of how to threat model, the risks and rewards, resources, and a demonstration of how to utilize threat modeling using the Death Star as a source!

Feb 28, 2024
3:00pm - 3:40pm (Eastern)
Unveiling the Business and Financial Ramifications Through Real-World Ransomware Experiences

Embark on an exploration of the business and financial aftermath of a ransomware attack, guided by a real-world case. This session is designed to empower attendees with invaluable insights into the dynamic and evolving threat landscape, providing an understanding of both the immediate and enduring consequences of ransomware incidents. Moreover, participants will be equipped with best practices for prevention, mitigation, and recovery. Elevating the experience, the session will also encapsulate a summary of recent ransomware research, offering a strategic compass for navigating the ever-evolving ransomware threat landscape in 2024 and beyond.

Feb 28, 2024
4:00pm - 5:00pm (Eastern)
Cyber Intel Briefing: FinServ