Date and TimeTitle
Sep 23, 2020
8:30am - 4:00pm (Eastern)
Exhibitor Floor Open 8:30AM to 4PM

The Exhibit Hall is your go-to destination to discover new solutions and meet with your local AccessIT Group representatives! Exhibitors will be available to meet with you virtually via chat and video conference.

Vendors with booths include:

  • AccessIT Group
  • Check Point
  • F5
  • Netskope
  • Gigamon
  • Tenable
  • Forescout
  • CyberArk
Sep 23, 2020
9:00am - 9:40am (Eastern)
Keynote: Rising Together as a Nation presented by Diane Janosek, NSA

National security threats to our nation, particularly in the cyber domain, are ever increasing.  The people of the National Security Agency work tirelessly to thwart these threats to keep our nation, its people and its interests safe. In this presentation, Ms. Diane M. Janosek will discuss national security threats and, more importantly, talk about a way forward so we can continue to rise as a nation.

Diane M. Janosek is a member of the Defense Intelligence Senior Executive Service (SES) and currently serves as the National Security Agency's Commandant and Training Director for the National Cryptologic School.  In her role, she manages and oversees the delivery of unique courses for the U.S. intelligence workforce, both civilian and military, in the areas of cyber, network security, cyber resilience, and encryption, ensuring a robust federal workforce to defend critical national security networks. Janosek has published numerous articles in various cybersecurity and legal publications. She serves as an adjunct professor for the National Intelligence University's Master of Science in Strategic Intelligence in Intelligence program in Washington, DC.  She serves on the Board of Advisors of the Military Cyber Professionals Association and is a member of the White House's Federal Committee on STEM Education.

Sep 23, 2020
10:00am - 1:00pm (Eastern)
F5 Lab: WAF 111 - Protecting Yourself Against the OWASP Top 10

The OWASP Top 10 is the de facto list of the top 10 most prevalent web application attacks. A challenge for many security practitioners is taking such a list of high-level attacks and turning those into real, actionable protection for our applications. In this session we will demonstrate how we can quickly protect against the OWASP Top 10 by leveraging F5's BIG-IP Advanced WAF module.

This class covers the following topics:

  • Introduction to the OWASP Top 10.
  • Hacking the Juice Shop web application.
  • Leverage F5 WAF Tester to access vulnerabilities in the Juice Shop.
  • Rapidly create a BIG-IP Advanced WAF Policy using the Secure Guided Configuration.
  • Explore the BIG-IO OWASP compliance dashboard to measure your policies effectiveness.
  • Use the OWASP Dashboard to refine your WAF policy in order to mitigate the OWASP Top 10.
  • Re-evaluate the Juice Shop application.

Passcode: 741165

Sep 23, 2020
10:00am - 1:00pm (Eastern)
Netskope Lab: Cloud Security Workshop

Join Netskope for a complimentary three-hour, hands-on cloud security workshop to learn the principles of securely adopting cloud services within the enterprise. This session will lay out a blueprint for visibility and control into all web services leaving your network. As part of this session, attendees will participate in multiple, hands-on labs that focus on Next Generation Secure Web Gateway and Zero Trust Access that is built in the cloud, for the cloud.

Whether you are just starting or well into your enterprise's cloud journey, this workshop is for you.

During this workshop, attendees will:

  • Discuss how to leverage the cloud to transform your security program to keep pace with the speed of business
  • Learn how to protect data and guard against cloud threats and malware
  • Discuss how to modernize an aging corporate network and VPN infrastructure to safely enable direct-to-cloud access to cloud services

Passcode: 642350

Sep 23, 2020
10:00am - 3:00pm (Eastern)
Check Point Lab: R80.40 - Automation and Orchestration

Just like it is possible to create objects, work on the security policy using the SmartConsole GUI, it is now possible to do the same through web-services.

Passcode: 202020
Sep 23, 2020
10:00am - 3:00pm (Eastern)
Check Point Lab: Cloud Security Posture Management using Dome9

Cloud Security Posture Management is a comprehensive software platform for public cloud security and compliance orchestration. Using Cloud Security Posture Management, organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud.  

Passcode: 056339

Sep 23, 2020
10:00am - 11:00am (Eastern)
Women in Cybersecurity Panel: Breaking Barriers

During this panel we will discuss how women in cybersecurity are breaking down barriers to help shape the future of the cybersecurity industry 

Sep 23, 2020
11:10am - 12:00pm (Eastern)
[AccessIT] The 4 C’s of Cloud Computing

Join AccessIT Group's Director of Cloud Services as he discusses the 4 C's of Cloud Computing: Cloud, Cluster, Container, and Code and the security controls associated with each topic. Learn inside tips on how to defend against the top threats in the cloud today!

Sep 23, 2020
12:00pm - 4:00pm (Eastern)
Networking Hall Open 12PM to 4PM

Mix and mingle (virtually) with our sponsoring technology partners in their Breakout Zoom Rooms.

  • Arctic Wolf
  • BlackBerry
  • Checkmarx
  • Okta
  • Proofpoint
  • Siemplify
  • Thales
Sep 23, 2020
1:00pm - 2:00pm (Eastern)
[CyberArk] Securely Manage 3rd Party Remote Access to Critical Systems

Organizations rely more and more on 3rd party vendors to support their critical operations and systems. Most typically they will have a combination of VPNs, agents and cumbersome ad hoc processes for securely providing their remote vendors with access to critical internal systems. These options carry a set of difficulties for both users and administrators. There is now a better way to provide access. 

CyberArk® Alero™ is a new SaaS based solution that combines Zero Trust access, VPN less, Password less and ad hoc provisioning for remote vendors who need access to critical systems managed by the CyberArk Privileged Access Security Solution.

In this session we will cover:

•            How to address the primary risks that remote third-party vendors and even remote workers with privileged access pose to your organization

•            How to simplify and automate secure access for 3rd party vendors who require ad hoc privileged access to the most critical internal resources

•            How biometric authentication and just-in-time self-registration can be combined to securely provide an intuitive access to 3rd party vendor users

Sep 23, 2020
1:00pm - 2:00pm (Eastern)
CISO Panel: Security Through Business Continuity

During this panel hear from a diverse group of Chief Information Security Officers as we will discuss how security plays a role in business continuity within today's cybersecurity landscape.

Sep 23, 2020
1:10pm - 2:00pm (Eastern)
[Forescout] Measuring Risk in 2020- Which device will be YOUR weakest link?

It seemed to happen overnight. Your organization became a veritable Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally.

Here’s the thing: Every thing that touches your enterprise exposes you to potential risk. You must see it and secure it.

Sep 23, 2020
2:00pm - 3:00pm (Eastern)
[Tenable] The Perfect Storm - The Convergence of IT & OT

Over the past number of years, a confluence of trends have made the security of industrial operations take center stage in the C-Suite. The convergence of the IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few.  With the emerging trend, there are misconceptions, misinformation and confusion in the market. Join us, where we will crack the myths that have evolved in ICS security. We will provide you with a virtual “buying guide” that provides you with the latest intelligence from the front line and criteria you should not ignore when evaluating what you need to secure your OT environment from unacceptable risk.

Sep 23, 2020
2:10pm - 3:00pm (Eastern)
[AccessIT] Security Maturity & Compliance

When measuring an organization's security posture you need a strong security program to include both security and compliance. 

Come learn about how AccessIT Group’s Risk Management Practice can help organizations develop and build strong security programs with compliance in mind. 

Additionally, we’ll talk about how AccessIT Group can help get you to CMMC Lvl 4 or 5 compliance as well as upcoming changes in PCI DSS 4.0

Sep 23, 2020
2:10pm - 3:00pm (Eastern)
[Gigamon] Networking Cloud Visibility

As organizations move to the “cloud” to take advantage of economies of scale, cost savings, and reduction in complexity, the burden on security and monitoring tools is astronomical where security risks and threats are not being identified in time to stop attacks. In this session, you’ll learn how Gigamon Cloud Suite visibility nodes that are deployed in the cloud send relevant traffic to their security and monitoring tools reducing complexity across their entire IT environment.

Sep 23, 2020
4:00pm - 5:00pm (Eastern)
Blues Traveler LIVE Virtual Concert!

This concert has passed