Agenda

Date and TimeTitle
Aug 13, 2020 (Central)
8:30am - 9:00am
Exhibit Floor Open
Aug 13, 2020 (Central)
9:00am - 9:43am
[Opening Keynote] Cybersecurity as a Key Element of Enterprise Risk Management

With the increased complexity of cyber threats and lack of skilled professionals to address those threats, the risk and cost of cybercrime is increasing at a staggering rate. Since information technology systems provide the foundation for business operations, enterprise risk management (ERM) is an increasingly essential business strategy to proactively identify and address cybersecurity exposures. We will use a case study to discuss key ERM tactics to minimize the risk associated with cybersecurity incidents.

Aug 13, 2020 (Central)
9:45am - 10:00am
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
10:00am - 10:42am
Attack on Home Base: Cybercrime Tactics and Techniques

The coronavirus pandemic has left the world looking very different now than it did at the beginning of the year.

For starters, millions of workers are out of the office and working from their homes. This change in scenery, combined with safe social distancing efforts that help prevent the spread of COVID-19, has created a crisis for many, but an opportunity for some.

This special COVID-19 themed Cybercrime Tactics and Techniques report looks at the most prominently spread malware families taking advantage of this crisis, as well as other, related efforts we have observed by cybercriminals.

Key takeaways include answers to these questions:
•  What are the most popular malware being spread through COVID-19 phishing attacks?
•  What does a COVID-19 phishing attack look like?
•  How has the coronavirus shifted attackers' focus?

Aug 13, 2020 (Central)
10:00am - 10:41am
Leveraging the Three Lines of Defense to Improve Your Security Position
Depending on your role, a three lines of defense risk management model can be your best friend or worst enemy. No matter your view, the data produced through these channels can help you better understand your weaknesses, work more effectively with senior management, and respond to a variety of scenarios.
 
Presentation Level: MANAGERIAL (security and business leaders)
Aug 13, 2020 (Central)
10:00am - 10:42am
Another Brick in the Wall

Security awareness and training. The Human Element. Change Management. All of these have resulted in extraneous mandatory learning for employees, often without regard to a role- or risk-based education profile. Employees are experiencing learning fatigue at a rapid pace, without significant results on an organization’s overall risk profile. It’s time to stop educating and start engaging, for significant, measurable information security behavior change in your organization. This session will cover learning trends, opportunities for engagement, and examples you can implement immediately.

Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

Aug 13, 2020 (Central)
10:30am - 10:45am
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
10:45am - 11:22am
Automation in the New Normal: Rapid On/Offboarding of Workers Anywhere, and on Any Device

The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ways of working. In addition to extending access to resources and enhancing security from more locations and devices, IT now is challenged with rethinking already time-intensive onboarding and offboarding processes.

According to a recent survey of IT leaders, these manual efforts sap budgets and productivity, and increase your security gaps. In this presentation, we’ll talk about the benefits of automating onboarding and offboarding and how Lifecycle Management can help streamline many of the manual processes that you likely have in place today.

Learn more about the benefits of:

  1. Creating a single source of truth from multiple directories, and driving identity lifecycles from your HRIS, granting the right access automatically as they join and securely removing access in a timely manner as users leave.
  2. Centralizing and automating lifecycle management across all apps on-premises and in the cloud.
  3. Generating and exporting detailed reports on who has access to what.
Aug 13, 2020 (Central)
10:45am - 11:26am
Hey, Information Security: Be Part of the Digital Transformation or Be Left Behind!

“Digital transformation” (Dx) as a buzzword may be approaching the end of its life, but the fundamental concept—continuously improving the use of technology and data to provide value to customers—is real and critical to the survival of businesses. If information security teams don’t evolve to deliver the same Dx value and benefits to our organizations, then we risk losing our “customers” to intentional circumvention or preference for shadow IT providers. Make sure your information security team provides the core Dx attributes to your organization to cultivate value, loyalty, and trust.

Join this session to learn how you can:
•Embed security into your culture, technologies and processes
•Empower innovation and expedite time-to-market through consistent security risk governance
•Assess the impacts, goals and methods of likely cyber attacks and incidents
•Align IT and security professionals with business objectives and risk tolerance
•Prepare now for effective detection and response to reduce business impacts of incidents

Presentation Level: MANAGERIAL (security and business leaders)

Aug 13, 2020 (Central)
10:45am - 11:33am
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready?

To achieve better security across the US DIB supply chain, the DoD is developing the Cybersecurity Maturity Model Certification (CMMC). Companies will be required to acquire a CMMC Certification Level ranging from basic hygiene to “State-of-the-Art”. A required CMMC level will be contained in each contract and will be a “go/no-go decision”.

The model architects will present:
• The call to action for the development of CMMC
• A look at included sources and standards
• A detailed explanation of the maturity aspect of CMMC, both technical capability and process institutionalization
• A look at current references available to DIB contractors on CMMC

Presentation Level: MANAGERIAL (security and business leaders)

Aug 13, 2020 (Central)
10:45am - 11:35am
[Panel] Identity and Access Management: Zero Trust for the Win?

Authentication used to be a discreet decision with the purpose of securing a single access point. Today, the ability to utilize many different types of authentication—from passwordless authentication, to certificate-based authentication, to adaptive and multi-factor authentication—is the foundation of a robust access management framework. With all the terms flying around out there—MFA, 2FA, Zero Trust, IAM, etc.—it’s hard to keep track of what is supposed to be working. Our experts will help demystify the jargon, provide best practices, and steer you away from common missteps.

Aug 13, 2020 (Central)
11:15am - 11:30am
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
11:30am - 12:27pm
[Keynote Fireside Chat] Business Continuity Planning During the COVID-19 Pandemic
Milinda Rambel Stone, VP and CISO, and Susan Hanson, VP of Human Resources, of Provation Medical will share in this interview format led by SecureWorld’s Emmy Award winning journalist, Bruce Sussman.
 
Susan and Milinda are Provation COVID-19 Task Force members leading their organization through these challenging times. They will share their experience surrounding the daunting task of Business Continuity planning during the coronavirus pandemic. BC planning can be difficult enough during normal times. What are we missing now that we have a significant global scale event?
Aug 13, 2020 (Central)
12:15pm - 12:30pm
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
12:30pm - 1:25pm
Pivoting Your Information Security Program for the New World

We are living in different times that demand different ways of thinking. Many existing Information Security tools have lost some visibility and viability. How has your thinking changed about your Information Security program? Maybe more importantly, what are you thinking the future will look like and how are you posturing your next purchase, hire, or action to be prepared for the next pivot? We will talk about some questions you should be asking yourself, your team, your peers, and your executives.

Aug 13, 2020 (Central)
12:30pm - 1:26pm
[Panel] No Perimeter: Security in the Cloud

Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an all-time high. This panel will explore cloud security risks, controls, and best practices to help ensure a secure cloud computing environment. 

Aug 13, 2020 (Central)
12:30pm - 1:02pm
Changing Cyber Landscapes: The Battle of Algorithms

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about: 

    •  Paradigm shifts in the cyber landscape
    •  Advancements in offensive AI attack techniques
    •  The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
    •  Real-world examples of emerging threats that were stopped with Cyber AI

Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

Aug 13, 2020 (Central)
1:00pm - 1:15pm
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
1:15pm - 2:12pm
VIPR Report: The Verizon Incident Preparedness and Response Report – Taming the Data Breach

Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. The VIPR Report is a data and scenario-driven approach to incident preparedness and response; it’s based on three years of Verizon’s IR Plan readiness assessments, and our data breach simulation recommendations. John will present findings with the six phases of incident and in doing so, cover five data breach scenarios illustrating the need for that phase of an IR Plan and its underlying components.

Presentation Level: GENERAL (InfoSec best practices, trends, solutions, etc.)

Aug 13, 2020 (Central)
1:15pm - 2:12pm
[Panel] Threat Landscape in Flux: Emerging Threats

The attack surface is shifting, threat actors are adapting, and security teams must also pivot. This panel will take a dive into various attack vectors, security gaps, and emerging threats organizations are now facing.

Aug 13, 2020 (Central)
1:15pm - 2:05pm
New Remote Workforce: Privacy and Security Risks and Mitigations

The sudden growth in the remote workforce exposed critical cybersecurity and privacy concerns that should be considered. This presentation will provide an overview of key legal considerations with remote work when it comes to privacy and security, as well as discuss some solutions to help mitigate risk as your employees work from home.

Aug 13, 2020 (Central)
1:45pm - 2:00pm
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Aug 13, 2020 (Central)
2:00pm - 3:10pm
[Closing Keynote] People, Processes, and Tech Strategies: Recruit, Train, and Retain for Success!

While most security teams leverage these key resources to reduce risk in our programs, how you leverage these resources will ultimately determine your effectiveness and success. Come join a leading security practitioner in a collaborative discussion on tips and landmines to avoid