Agenda

Date and TimeTitle
Dec 3, 2020
9:00am - 9:30am (Pacific)
CENTRIFY | How to Improve Cyber Resilience with Identity-Centric PAM | Tony Goulding, CyberSecurity Evangelist

Cyber breaches are more frequent and impactful than ever. Hardly a day goes by without headlines alerting us to yet another devastating attack. To protect against such breaches, Identity-Centric PAM founded on Zero Trust is in the spotlight, seeing huge growth in adoption.

There are many starting points on the path to Identity-Centric PAM. However, all roads still converge on identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, compromised user accounts that have administrative access to critical systems in the organization.

The session will explore how Identity-Centric PAM helps organizations ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, and secure.

Dec 3, 2020
9:30am - 10:00am (Pacific)
KNOWBE4 | Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim? | Roger Grimes, Data-Driven Defense Evangelist

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will dive into:

  • Why data backups (even offline backups) won’t save you
  • Evolved threats from data-theft, credential leaks, and corporate impersonation
  • Why ransomware isn’t your real problem
  • How your end users can become your best, last line of defense
Dec 3, 2020
10:15am - 11:15am (Pacific)
KEYNOTE | How the Transition from the Digital Office to the Digital Workplace Will Change Cybersecurity Forever | Darin Andersen, CEO & Co-Founder, NXT Robotics
Dec 3, 2020
11:30am - 1:15pm (Pacific)
ACCELLION | CISO PANEL | The Security Impact Of The Coronavirus
Dec 3, 2020
1:15pm - 1:45pm (Pacific)
GIGAMON | Architecting the Agentless | Andy Hutchison, Senior Sales Engineer
Dec 3, 2020
1:45pm - 2:10pm (Pacific)
DARKTRACE | Securing the Future of Work: How Cyber AI Learns on the Job | Justin Fier, Director for Cyber Intelligence and Analysis

Though parts of the world are slowly transitioning back to ‘normal’, cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.

Join Justin Fier, Darktrace’s Director of Cyber Intelligence and Analysis, as he discusses how traditional cyber security tools are ill-equipped to protect today’s dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings.

In this presentation, discover how Cyber AI:
· Autonomously detects and responds to cyber-attacks in the first instance and before damage is done
· Thwarted a Covid-19 email impersonating the CEO of an electricity distributor
· Neutralized a SaaS takeover at a Panamanian bank

Dec 3, 2020
2:20pm - 2:50pm (Pacific)
GUARDICORE | When Firewalls and Traditional Segmentation Fail: The Era of Software-Based Segmentation | Dave Klein, Senior Director of Engineering & Architecture

Legacy security and segmentation techniques are woefully inadequate in today’s fast moving enterprises where innovation and speed are musts. Dave Klein takes us through why these techniques have failed, discusses the business and technical drivers demanded by industry, the threats we face including ransomware and provides us with a recipe for success in Software-Based Segmentation.

Dec 3, 2020
2:50pm - 3:20pm (Pacific)
NETENRICH | Are you ready for Intelligent SOC? | Brandon Hoffman, Chief Information Security Officer
The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC.  Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.
Dec 3, 2020
3:30pm - 4:00pm (Pacific)
RECIPROCITY | Running Reports That Matter: Get The Most From Your GRC Data | Rob Ellis, Senior Vice President

Tracking, managing and sharing out status and results of your compliance and risk programs is a key part of what you do. And it isn’t always easy to get the insight you need to answer the tough questions. If you know when your reports are right - you can act in a way that betters your program. But how do you know which reports to build and which data to use?

Join us as Reciprocity's SVP of Sales, Rob Ellis, walks you through reports that matter. He has helped many customers get more from their GRC data and, in this session, he will show you what to look for, how to structure, and what data is critically important.  

Learn about the following:

  • The importance of relationships in reporting
  • Ensuring data integrity so your reports are accurate
  • Which reports to prioritize and why
  • Making sure your audience gets what they need
Dec 3, 2020
4:00pm - 4:30pm (Pacific)
BLACKBERRY | Rational Approach to Zero Trust | Chris Pittman, Senior Manager, Sales Engineering
Dec 4, 2020
6:30am - 7:30am (Pacific)
ACCELLION | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.