Agenda

Date and TimeTitle
Nov 17, 2021
8:00am - 8:30am (Eastern)
Opening Security Briefing with the U.S. Department of Justice
Nov 17, 2021
8:30am - 9:15am (Eastern)
Opening Security Keynote with Verizon: Putting Security Data into Action - Verizon’s DBIR and the VERIS Framework

Verizon’s annual Data Breach Investigations Report (DBIR) has always been a powerful tool for security teams to sharpen their focus on specific threats to their industries. Now, Verizon is taking its security leadership one step further by mapping the DBIR’s underlying data-collection framework of the MITRE ATT&CK Framework. In this presentation, Verizon’s David Grady and Philippe Langlois share highlights from the 2021 DBIR and explain why the “VERIS-to-MITRE” mapping is so important.

 

Nov 17, 2021
9:15am - 9:50am (Eastern)
Presenting Security Keynote with ProcessUnity: Create A Control-Centered Approach To Managing Your Risk

In this session you will learn to:

  • Construct a Best-Practice Cybersecurity Program
  • React To Evolving Regulations and Standards
  • Utilize Controls as the Foundation
  • Empower The Team To Detect Failures
  • Respond To High-Level Pressure
Nov 17, 2021
9:50am - 10:15am (Eastern)
Darktrace Presentation: The Battle of Algorithms - How AI is Beating AI at Its Own Game

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.  

In this session, discover: 

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons  
  •  What an AI-powered spoofing threat may look like, and why humans will not be able to spot them 
  •  Why defensive AI technologies are uniquely positioned to fight back  
Nov 17, 2021
10:15am - 10:40am (Eastern)
HYPR Presentation: The State of Passwordless Security

With the Passwordless Decade well underway, more and more organizations are asking the question: Why is now the right time to move beyond passwords?

George Avetisov, CEO of HYPR, will discuss the rise of organizations moving to the cloud, how the perimeter fades and the attack surface gets larger. Modern tools such as SNIPR and Modlishka make it easier for hackers to launch large-scale automated attacks, bringing credential re-use and two-factor-authentication attacks to record highs. 

How did we get here, and will mainstream adoption of passwordless security have an impact? We will explore how the rise of virtual desktop infrastructure and a remote workforce has affected workstation login and review how the evolution of authentication has impacted organizations’ identity and access management systems.

In this session, you’ll learn:

• Why this is the Passwordless Decade
• Why credential reuse at all-time highs
• How authentication has evolved
• How businesses are solving the authentication problem by decoupling authentication from identity providers
Nov 17, 2021
10:40am - 11:25am (Eastern)
Panel 1: The Future of Cloud Security

Over the past few years, the number of organizations that have adopted cloud-based systems has grown exponentially, largely due to the COVID-19 pandemic. In turn, cloud security has become a critical issue for IT security executives and their teams. McAffee reported an increase of 630% in attacks by external actors targeting cloud services between January and April of 2020. This uptick in cloud security breaches is projected to persist even after the pandemic as many companies continue to utilize the cloud and leverage its benefits.

While migrating to the cloud offers numerous advantages, it also poses certain threats and challenges. In a recent report by Oracle & KPMG, over 90% of IT Professionals felt their organization had a cloud security readiness gap. A significant concern for many who are adapting to a cloud-based workforce is misconfigurations and gaps in cloud security programs. Additionally, cloud-based infrastructure requires adopting new security policies and processes. Many companies believe their existing security teams lack the necessary skillsets and knowledge that the cloud environment requires, especially as organizations turn to multi-cloud, hybrid cloud, and distributed cloud models.

This panel will highlight the areas where cloud systems can leave enterprises vulnerable, ways to minimize common misconfiguration errors, and other best practices to mitigate threats when migrating to the cloud. Our lineup of Industry Experts will provide their expertise on developing a robust cloud security strategy that addresses these issues and insight on how to stay secure in the future of cloud security.

Nov 17, 2021
11:25am - 11:50am (Eastern)
Fortinet Presentation: Securing Critical Infrastructure

Today’s adversaries are more motivated and capable than ever to find ways to exploit our systems and data. Unfortunately, no industry is immune—including our critical infrastructure.  As we have seen with recent attacks, adversaries and cyber criminals will stop at nothing when it comes to financial gain and causing disruption.  This includes financial services who remain under constant attack and need to stay one-step ahead. This session will focus on the who, what, and how organizations can protect their systems and data while ensuring their operations, brand, and revenue remain intact.

Nov 17, 2021
11:50am - 12:15pm (Eastern)
ExtraHop Presentation: Building a Response Strategy to Advanced Threats

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

Nov 17, 2021
12:15pm - 12:40pm (Eastern)
Bitglass Presentation: Rise of Secure Access Service Edge (SASE)

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases.
  • Architectural considerations you should keep in mind when comparing SASE vendors. 
Nov 17, 2021
12:45pm - 1:10pm (Eastern)
Arctic Wolf Presentation: Current State of Security Operations

It is important to recognize that, overall, the industry has an effectiveness problem. The escalation in threat activity and the talents shortage in the industry has created a situation where, despite lots of products and cybersecurity spend, we aren’t getting better protection. To put a finer point on it, there are over 3,000 vendors selling products in the industry. The total spend last year was $120B+ and even with all of that there we almost 4,000 breaches — a 96% increase over the previous year.​ The key takeaway from these breaches is that they are NOT product failures.​ They are operational failures. ​To prevent these kinds of breaches from happening again in the future, we believe, the industry needs to adopt a new approach – an operational approach – to cybersecurity. ​

Nov 17, 2021
12:45pm - 1:10pm (Eastern)
Auth0 Presentation: 2021 State of Secure Identity Report

Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security.

The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.

During this webinar, we’ll provide greater insight into which industries are: 

  • Most highly targeted by credential stuffing attacks
  • Most highly targeted by SQL injection attacks
  • Leading the way in MFA adoption to improve overall security posture

We’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats. 

Nov 17, 2021
1:10pm - 1:35pm (Eastern)
Fidelis Presentation: It’s Time to Get Active…Defense

Whose game are you playing? Today’s adversaries are more sophisticated. They get in deeper, hide longer, and wreak more havoc on your IT environment. Your adversaries are playing blindfold chess. Change the game to your advantage. Attend this session to learn how shifting to active defense changes the game on your adversaries by reshaping the attack surface so you can regain control and find, respond and neutralize threats earlier in the attack lifecycle.

Nov 17, 2021
1:10pm - 1:35pm (Eastern)
Team Cymru Presentation: Threat Reconnaissance - The Evolution of Threat Hunting

External threat hunting and adversary infrastructure mapping are wish list items for most organizations. However, more and more organizations are establishing these capabilities and creating forward-leaning threat reconnaissance programs to leverage their security analysts in a more strategic way. These more advanced analyst teams are given on-demand access to global internet traffic telemetry, and as a result, these teams are becoming tip-of-the-spear components of the security program, as opposed to reactionary tactical teams. Learn how this new model is delivering longer-lasting outcomes that optimize an organization’s security program as a whole.

In this session:

  • Threat hunting maturity model
  • Challenges: supply chain, APTs, phishing
  • Real-world examples of threat reconnaissance
  • Long-term benefits of external threat hunting
  • Forrester Total Financial Impact™ Study results
Nov 17, 2021
1:35pm - 2:20pm (Eastern)
Panel 2: Identifying & Avoiding Insider Threats in Today’s Remote Workforce Age

Insider Threat has become increasingly problematic to businesses as the frequency and cost of these threats have risen over the last several years. In a global study conducted by Ponemon Institute in September of 2019, there was a 31% increase in overall cost of Insider Threat and a 47% increase in the total number of Insider Incidents from 2018.

Today, Insider Threat poses an even greater risk to businesses in the wake of the COVID-19 pandemic. Forrester Research, Inc. reported that in 2020, a quarter of all security breaches were caused by an insider and estimates that in 2021, Insider Threats will account for 33% of security breaches.

This panel will discuss the various factors that contribute to this increase in Insider breaches, how remote work has impacted the malicious & non-malicious Insider Threats facing businesses, and the implications this has on enterprises today. Our lineup of Industry Experts will offer their insight & provide best-practices on how businesses and their IT Security Teams should address these risks and adapt in order to defend against Insider Threats.

Nov 17, 2021
2:20pm - 2:45pm (Eastern)
Zscaler Presentation: The future of CASB. Here’s where it’s headed

No data security program would be complete without a CASB strategy. While CASB has tremendous potential to improve your security posture, its future is still being written. IT leaders are pondering some foundational questions as they strategize for 2022: Standalone or Platform? How will it integrate into SASE? Can it secure and improve the BYOD experience? Tune in to this forward looking webinar to discover:

  • What type of architecture is best for delivering CASB
  • How CASB fits into Gartner’s view of SASE and their new Security Service Edge (SSE).
  • Why Data Protection works best when CASB is unified across a zero-trust platform
  • What you should be thinking when building your data protection strategy
Nov 17, 2021
2:50pm - 3:15pm (Eastern)
Check Point Software Technologies Presentation: As the Cyber World Turns: A Strategy to Increase Security Efficiency
Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies. 
 
These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices. 
 
Join Grant Asplund, Chief Security Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that: 
 
• Increases security efficiency with a unified security architecture 
• Improves your organization’s overall threat prevention profile
• Eliminates complexity caused by managing disparate systems
• Reduces total cost of ownership
Nov 17, 2021
3:15pm - 3:40pm (Eastern)
IBM Security: Security Operations and the Convergence of Pretty Much Everything

As each organization implements a layered security program, across a distributed infrastructure and shared responsibility with their service providers, how can they gain visibility into malicious activity and orchestrate effective, business-wide responses to attacks?


Implementing great tools for IAM, PAM, Network, Data and Application security address many of the layers of controls required. Deploying solutions such as SIEM, SOAR, EDR, NDR, MDR and XDR provide varying levels of visibility and detection and response, however these silos need to be far better connected for maximum effectiveness and return on your investment.


Join IBM Security to hear how we see this all coming together while keeping the solutions that are already working well for you.

Nov 17, 2021
3:40pm - 4:05pm (Eastern)
Neustar Presentation: Ransomware Hold My Beer - Ransom DDoS Attacks Take Center Stage

When you hear “ransom attack” you probably think of ransomware – the malware that can encrypt or block files or entire systems until you pay the attacker to restore access. But there’s been a massive surge in a virulent new type of ransom attack. And the defenses you’ve established to fight ransomware won’t help defeat this new threat, because it doesn’t require malware. Instead, the extortionists simply threaten to shut down your network with a massive Distributed Denial of Service (DDoS) attack at a specified day and time – unless you pay. 

Attend this session to learn:

  • Why these new attacks are so dangerous
  • How a typical attack unfolds
  • What to do if you’re threatened
  • How to prepare to fight one off successfully
Nov 17, 2021
4:05pm - 4:30pm (Eastern)
Menlo Security Presentation: SASE is a Menu and Not a Recipe

If you’re a growing modern business, you likely have an appetite for the secure access service edge (SASE). We hate to break it to you, but there’s no “secret sauce” when it comes to successfully implementing the SASE framework. Every organization is different, with variying priorities for protecting their employees, customers, data, devices, and applications. It’s best to look at SASE as a themed menu of converged technologies that allows you to choose ones that will deliver the maximum business impact. During this discussion featuring Menlo Security’s Senior Director of Cybersecurity Strategy, Mark Guntrip, he invites you to take a seat at the SASE table to learn about the deployment menu you can build for your organization. Attendees can expect to learn:

• Why Zero Trust and SASE are the perfect pairings
• How SASE enables organizations to taste productivity gains
• How organizations can create a mix of satisfying integrated controls

Nov 17, 2021
4:30pm - 4:55pm (Eastern)
SonicWall Presentation: Thwarting Latest Ransomware Tactics

Join a security veteran who spent a year talking with a Russian ransomware crew who eventually spent months meeting and interviewing other hackers from Anonymous cells to everyday teenagers in their quest to hone their hacking skills. Learn how they manipulate social media platforms to hack companies like yours, how to stop them, and ultimately hire some of the most endeavoring hackers in history

Nov 17, 2021
4:55pm - 5:40pm (Eastern)
Panel 3: Ransomware on the Rise - Utilizing Zero Trust to Avoid Becoming a Hostage to Cyber Criminals and What to Do if You Fall Victim to an Attack

In 2020, there was an unprecedented growth in ransomware attacks and this trend shows no signs of slowing down. Rather, these attacks are evolving and becoming more harmful as cyber criminals become more organized and effective. It is predicted that in 2021, businesses will fall victim to a ransomware attack every 11 seconds with an estimated cost of over $20 billion – 57 times more than in 2015, making ransomware the fastest growing type of cybercrime.

As a result, companies are transitioning from the traditional “trust but verify” method and implementing a Zero Trust model, requiring all users to be authenticated and continually authorized in order to be granted access and maintain access to company data and applications. By leveraging various technologies & techniques such as multifactor authentication, IAM, least privilege access, and microsegmentation, the Zero Trust model reduces the risk of a ransomware attack and minimizes the potential damage from a breach.

This panel will highlight where enterprises are most vulnerable to becoming a victim of ransomware and how utilizing a Zero Trust model minimizes this risk. Industry experts will discuss best practices to avoid a ransomware attack including adapting the Zero Trust model, what to do if your company is being held for ransom, ways to mitigate the damage caused by an attack, and how to recover afterwards.

Nov 17, 2021
5:40pm - 6:05pm (Eastern)
Cisco Secure Endpoint Presentation: Stopping Ransomware - Two is Better Than One

Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore. Take any of the recent cyber attacks seen on the news, for example. What if you could stay safer from ransomware, however it may attempt to get into your network? Join this event to learn how to stop ransomware infections with a first line and last line of defense approach from the cloud edge to the endpoint. Learn how this layered defense approach can help provide ultimate visibility with ultimate responsiveness against ransomware.

Nov 17, 2021
5:40pm - 6:05pm (Eastern)
Reciprocity Presentation: Achieving New Levels of Efficiency, Automation & Visibility in Third-Party Risk Management

Whether a start-up or an enterprise, you are probably working with multiple vendors, using their software and reliant on their systems. Yet while these external vendors provide invaluable services, they also introduce significant risk to your company’s information security. 

How do you know if your vendors are meeting required contractual, security and privacy obligations? 

If you don’t have processes in place to assess the risks these third parties pose, then your answer is most likely you don’t. And this is critical: You need to know the risks of working with third parties and that you can trust them — because if they go down, your business may, too. 

Assessing risk, however, can be incredibly complex. Traditional risk management approaches that rely on manual processes, spreadsheets and even survey methods don’t scale well and are not automated enough. And they certainly can’t support a third-party vendor network once it reaches a certain size: spreadsheets and email folders become overwhelming, ad hoc processes and reporting cycles create confusion, and manual reviews lead to missed issues and trends. In fact, the more successful an organization is – and the more third-party vendors they work with – the more automation  and continuous monitoring are required.

At Reciprocity, we work with companies of all sizes to help streamline and improve third-party risk management. Join Reciprocity CISO Scott McCormick and VP Rob Ellis as they walk you through:

  • Examples of vulnerabilities and common attack techniques
  • Steps to mature your third-party risk management program 
  • How to implement automation and make our program more proactive (or continuous)
  • A case study detailing how ZenGRC helped Conversica drastically improve its compliance and risk posture resulting in 60 saved days and $80K in hard savings
Nov 17, 2021
6:05pm - 6:30pm (Eastern)
Critical Start Presentation: Come on! Not ransomware again!
Nov 17, 2021
6:30pm - 6:57pm (Eastern)
Cyber Security Summit Exclusive Closing Keynote Presentation: "Looking through the Eyes of the Cyber Attacker" Presented by The NSA

Prior to defending an organization against a determined attacker, their techniques must be understood. This presentation provides an adversarial viewpoint to inform network defense leaders how the attackers see their organizations and are able to be successful with their objectives, even when well defended. The presenter will draw upon over 17 years of personal experience as a Red Team operator and leader to illustrate how your organizations are viewed, through the eyes of an adversary.

Nov 17, 2021
6:57pm - 7:20pm (Eastern)
Q&A with Quinn Carman, NSA Red Team Chief

Join us for an interactive Q&A with Quinn Carman, NSA Red Team Chief.