Date and Time | Title | |
---|---|---|
Dec 3, 2020 9:00am - 9:30am (Pacific) | CENTRIFY | How to Improve Cyber Resilience with Identity-Centric PAM | Tony Goulding, CyberSecurity Evangelist Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption. There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization. The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure. | |
Dec 3, 2020 9:30am - 10:00am (Pacific) | KNOWBE4 | Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim? | Roger Grimes, Data-Driven Defense Evangelist There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear. Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will dive into:
| |
Dec 3, 2020 10:15am - 11:15am (Pacific) | KEYNOTE | How the Transition from the Digital Office to the Digital Workplace Will Change Cybersecurity Forever | Darin Andersen, CEO & Co-Founder, NXT Robotics | |
Dec 3, 2020 11:30am - 1:15pm (Pacific) | ACCELLION | CISO PANEL | The Security Impact Of The Coronavirus | |
Dec 3, 2020 1:15pm - 1:45pm (Pacific) | GIGAMON | Architecting the Agentless | Andy Hutchison, Senior Sales Engineer | |
Dec 3, 2020 1:45pm - 2:10pm (Pacific) | DARKTRACE | Securing the Future of Work: How Cyber AI Learns on the Job | Justin Fier, Director for Cyber Intelligence and Analysis Though parts of the world are slowly transitioning back to ‘normal’, cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges. Join Justin Fier, Darktrace’s Director of Cyber Intelligence and Analysis, as he discusses how traditional cyber security tools are ill-equipped to protect today’s dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings. In this presentation, discover how Cyber AI: | |
Dec 3, 2020 2:20pm - 2:50pm (Pacific) | GUARDICORE | When Firewalls and Traditional Segmentation Fail: The Era of Software-Based Segmentation | Dave Klein, Senior Director of Engineering & Architecture Legacy security and segmentation techniques are woefully inadequate in today’s fast moving enterprises where innovation and speed are musts. Dave Klein takes us through why these techniques have failed, discusses the business and technical drivers demanded by industry, the threats we face including ransomware and provides us with a recipe for success in Software-Based Segmentation. | |
Dec 3, 2020 2:50pm - 3:20pm (Pacific) | NETENRICH | Are you ready for Intelligent SOC? | Brandon Hoffman, Chief Information Security Officer | |
Dec 3, 2020 3:30pm - 4:00pm (Pacific) | RECIPROCITY | Running Reports That Matter: Get The Most From Your GRC Data | Rob Ellis, Senior Vice President Tracking, managing and sharing out status and results of your compliance and risk programs is a key part of what you do. And it isn’t always easy to get the insight you need to answer the tough questions. If you know when your reports are right - you can act in a way that betters your program. But how do you know which reports to build and which data to use?
| |
Dec 3, 2020 4:00pm - 4:30pm (Pacific) | BLACKBERRY | Rational Approach to Zero Trust | Chris Pittman, Senior Manager, Sales Engineering | |
Dec 4, 2020 6:30am - 7:30am (Pacific) | ACCELLION | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes. |