Agenda

Date and TimeTitle
Oct 22, 2020
8:30am - 9:00am (Central)
Exhibit Floor Open
Oct 22, 2020
9:00am - 9:59am (Central)
[Opening Keynote] Panel: Different Perspectives on Cybersecurity in Oil and Gas
Oct 22, 2020
9:45am - 10:00am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
10:00am - 10:50am (Central)
Taming the Third-Party Risk Beast

These days, with the number of vendors and other third parties putting their tentacles into your systems and networks, you can feel like you are fighting a multi-headed hydra in trying to limit third-party risk in your IT systems. In this talk, we will discuss the nature of this beast and how to tame it using best practices, technical controls, and good review processes. We will walk through a well-designed vendor management program, including inventorying, risk assessing, on-boarding and off-boarding processes, and audit procedures that will help you tame every hairy, scary vendor on your network so that their weakest links are not yours.

Oct 22, 2020
10:00am - 10:45am (Central)
Hey, Information Security: Be Part of the Digital Transformation or Be Left Behind!

"Digital transformation" (Dx) as a buzzword may be approaching the end of its life, but the fundamental concept—continuously improving the use of technology and data to provide value to customers—is real and critical to the survival of businesses. If information security teams don't evolve to deliver the same Dx value and benefits to our organizations, then we risk losing our "customers" to intentional circumvention or preference for shadow IT providers. Make sure your information security team provides the core Dx attributes to your organization to cultivate value, loyalty, and trust.

Join this session to learn how you can:

  • Embed security into your culture, technologies and processes
  • Empower innovation and expedite time-to-market through consistent security risk governance
  • Assess the impacts, goals and methods of likely cyber attacks and incidents
  • Align IT and security professionals with business objectives and risk tolerance
  • Prepare now for effective detection and response to reduce business impacts of incidents

Presentation Level: MANAGERIAL (security and business leaders)

Oct 22, 2020
10:00am - 10:45am (Central)
A 'ToR' of the Three Ds: Dark Web, Deep Web, Dark Net

This is a first-hand account into the WILD of the internet. We always hear about the “Dark Web” and how various services advertise the use of such a resource, but what does that mean? Better yet, what does it look like? This presentation will demonstrate where “various” types of activity—i.e., personal identifiable information, transaction information, and other related content—reside.

Oct 22, 2020
10:30am - 10:45am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
10:45am - 11:27am (Central)
Who Accessed Your Data in the Cloud? Your Bosses and Auditors Want to Know

Your business is moving data to the cloud without all the security controls mandated for on-prem. After all, the promised economics and business agility are far too attractive for business leaders to ignore. But attackers are after data, auditors demand evidence, and Security is still responsible for protecting data. You need to catch up with that data before attackers and auditors find it, and you need to catch up right now.

Join Imperva to learn how to reconcile Security’s need for visibility with the business’s need for speed and agility—in minutes.

This session will include:

  • Learn the fast path to getting control of your data already in the cloud
  • What capabilities you will have to bring to make cloud DBaaS secure and audit-ready
  • How cloud-native data security can be frictionless to the business’s need for speed
Oct 22, 2020
10:45am - 11:25am (Central)
The Hero's Journey: How to Tell the Story of Your Risk-Driven Program

The Hero’s Journey is the familiar story we all love to hear about the unlikely hero who answers the call to adventure, is victorious in pursuit of a goal, and returns transformed.  This session will take you on a thrilling adventure: your very own hero’s journey to championing your risk-driven program with useful metrics. It doesn’t matter if you’re the grand poobah who sets strategy, the herder of cats who defines tactics, or the technical guru actually fulfilling operations, we are all the heroes of our own stories.  Let useful metrics be your narrator.

Oct 22, 2020
10:45am - 11:35am (Central)
Inside the Mind of a Threat Actor: Beyond Pentesting

Red team is a commonly misunderstood offensive security discipline. Red team has been used as a general term for all areas of offensive security, just as blue team for defensive security. True red teaming goes beyond pentesting and into more adversarial emulation. While there are overlapping skills, there are differences that will be discussed as Phillip shares his experience of going from a pentester to a red teamer. In this talk, you will learn about the different areas that make up red team operations, common tools, and the path to becoming a red teamer.

Attendees will learn the following:

  • What is offensive security
  • Domains of offensive security from pentesting to red teaming
  • Differences between pentesting and red team
  • How the threat actor mindset is important for exposing possible breaches
  • Learning resources and how to become a red teamer
Oct 22, 2020
11:15am - 11:30am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
11:30am - 12:25pm (Central)
Pivoting Your Information Security Program to the New Normal

We are living in different times that demand different ways of thinking. Many existing Information Security tools have lost some visibility and viability. How has your thinking changed about your Information Security program? Maybe more importantly, what are you thinking the future will look like and how are you posturing your next purchase, hire, or action to be prepared for the next pivot? We will talk about some questions you should be asking yourself, your team, your peers, and your executives.

Oct 22, 2020
11:30am - 12:26pm (Central)
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready?

Supply chain risks are at the top of everyone’s mind today, and the US Department of Defense (DoD) is no different. That is why the DoD created its Cybersecurity Maturity Model Certification (CMMC). CMMC is a five level, third-party validated maturity certification. CMMC includes both technical and process/procedural requirements. Organizations in the Defense Supply Chain will be required to obtain CMMC certification before contract award. Requests for Proposals (RFPs) containing CMMC requirements are expected in October 2020. This session provides an overview of CMMC and the corresponding industry-led ecosystem that is being created, spearheaded by the CMMC Accreditation Body (CMMC-AB).
Presentation Level: MANAGERIAL (security and business leaders)

Oct 22, 2020
11:30am - 12:12pm (Central)
The New NIST Phish Scale: Revealing Why End-Users Click

Developed based on over four years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty—key to understanding variability in phishing click rates. This talk will cover why end-users click, why it’s important to understand phishing detection difficulty, and how to use the NIST Phish Scale. Understanding what emails your end-users are susceptible to will help you better defend against phishing attacks in the wild.

Oct 22, 2020
12:15pm - 12:30pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
12:30pm - 1:15pm (Central)
[Panel] Threat Landscape in Flux: Emerging Threats

The attack surface is shifting, threat actors are adapting, and security teams must also pivot. This panel will take a dive into various attack vectors, security gaps, and emerging threats organizations are now facing.

Oct 22, 2020
12:30pm - 1:17pm (Central)
Approaches to Justifying Cybersecurity Projects and Spend

Feel like you’re not getting enough funding for your security projects or program? Learn to stack the deck in your favor by following four basic rules. Lots of examples will be presented!

 
Oct 22, 2020
12:30pm - 1:25pm (Central)
Blue-Teaming and Incident Response for the "Win"

Does your company use Windows or is most of the environment Windows? Come to this session to specifically learn the ins and outs of what are the most critical things needed in order to establish a respectable blueteam program at your organization. Do you know what Windows security event log 4688 mean? What about others? What are the event logs that you should know by hand or have a cheat-sheet for? What are some tools that you should be using and how can you automate them to help detect lateral movement. Also, we will be leveraging opensource tools. No, additional $ is not required. Trying harder, building your technical skills and doing proactive threat hunting will help you and your team. “Don’t worry all of this information will be useful for all no matter what level.” Per time permitting, we might also quickly talk about incident response as well, initially. Also, bring your technical questions too during our Q&A session.
Presentation Level: TECHNICAL (deeper dive including TTPs)

Oct 22, 2020
1:00pm - 1:15pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
1:15pm - 2:10pm (Central)
The Changing Legal Enforcement in Cyber and Privacy

With the changing legislation, here in the U.S. and globally, there is an increasing emphasis on enforcement of data privacy and cybersecurity, both by regulators and individuals. The ability to bring a private right of action by individuals is a sword that data subjects are using to enforce their rights, both in the U.S. and Europe. This session will provide a detailed update on key enforcement actions, with the courts and by agencies, to ensure that companies understand the challenges and their potential liabilities.

Oct 22, 2020
1:15pm - 2:05pm (Central)
[Panel] Remote Workforce: Lessons Learned

Companies had no real choice as we all moved to the “new normal” and a fledgling at home workforce due to the coronavirus outbreak. If you stop and think about it, it was quite the feat—a massive cloud migration the likes of which had never been seen before. Now that things are somewhat settled into a pattern, what are you discovering that should have been done differently? Realizing that a lot of the same things need to be done? How is the network perimeter now? How many devices are suddenly on your networks? IoT devices from the remote workers piggybacking on the home connections? What are the legal challenges now (think reasonable security)? Join us for a panel discussion of security experts.

 
Oct 22, 2020
1:45pm - 2:00pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Oct 22, 2020
2:00pm - 3:04pm (Central)
[Closing Keynote] Turning the Tables: Putting Threat Intel to Work Against Attackers

We read about hacks and breaches on a daily basis, but what do we actually know about these cybercrime groups and how they conduct these attacks?

In this session, we will dive into a few hacking techniques, demonstrate what types of tools hackers are using today, examine the scope of these attacks, and discuss best practices to protect ourselves and our businesses. During the session, we will review security issues with people, process, and technology, see how OSINT (Open Source Intelligence) is leveraged for social engineering attacks, and review some of the latest attacks seen in the wild. We will close by examining how to operationalize threat intelligence using security frameworks such as MITRE ATT&CK framework in conjunction with cyber threat intelligence best practices.