Agenda

Date and TimeTitle
Jan 20, 2021
9:00am - 9:40am (Central)
MICRO FOCUS | Cybersecurity and cyber resilience: It's an evolution | Stan Wisseman, Chief Security Strategist | All viewers qualify for the chance to win a RTIC Cooler!

Cyber security and cyber resilience are often used interchangeably. While they are related, they’re far from being synonyms, and it’s crucial for everyone to understand the difference. In practical terms, a cyber-resilient organization assumes that at some point it will be successfully attacked. We must adapt to this reality and still enable the business to operate. Stan will get into the distinctions between what we know and how we can evolve to a more resilient state.

Jan 20, 2021
9:40am - 10:15am (Central)
BLUMIRA | How to Detect Common Threats Targeting Your Cloud Infrastructure | Amanda Berlin, Lead Incident Detection Engineer
Amanda Berlin, Lead Incident Response Engineer, Blumira
Description: This unprecedented era of remote work has forced a rapid move to the cloud for many organizations. But that can leave critical gaps in detecting security threats in the cloud.


Join Amanda Berlin, Sr. Incident Detection Engineer at Blumira for a discussion on common cloud security detections and how to detect threats targeting your cloud infrastructure.

In this talk, you'll learn about:

  • Different types of attacks targeting cloud infrastructure platforms like Microsoft Azure, Office 365, Okta, G Suite and Amazon Web Services
  • Common vulnerabilities that may lead to a compromise
  • How to properly detect cloud-related misconfigurations and potential threats to reduce your overall attack surface
Jan 20, 2021
10:30am - 11:45am (Central)
KEYNOTE | Incident Response Planning: The Missing Runbook | Ashley Ferguson, President & Managing Member & Chris Bullock, CEO, CISO and Managing Member, Cyber Investigations & Intelligence Agency (CI2A)
Jan 20, 2021
11:40am - 12:10pm (Central)
OKTA | CIAM in an Uncertain World | Keith Casey API Problem Solver | All viewers qualify for the chance to win a Wine Set

In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner.  That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and compliance standards, but also create frictionless customer experiences to meet customers where they are and in the ways they need.  Join our sessions as we discuss CIAM in more detail, how priorities have shifted this year and what CIAM maturity looks like.

 
Jan 20, 2021
12:20pm - 1:20pm (Central)
A Special “Chat with Dr. Chase Cunningham” | Chief Strategy Officer, Ericom Software

Interactive conversation with audience on the 2021 journey in cyber and talk about some of the predictions that have been made

Jan 20, 2021
1:30pm - 2:00pm (Central)
TENABLE | Seeing the forest through the trees - A risked based approach to maturing your VMP | Rob Walk, Sr. Security Engineer
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
Jan 20, 2021
2:00pm - 2:30pm (Central)
INFOBLOX | Transitioning DNS from IT Utility to Security Strategy | Jeff Miller, Specialist
Jan 20, 2021
2:45pm - 3:15pm (Central)
DIGITAL SHADOWS | Ransomware: It's Still a Big Deal | Austin Merritt, Cyber Threat Intelligence Analyst
Jan 20, 2021
3:15pm - 3:45pm (Central)
DARKTRACE | Changing Cyber Landscapes: The Battle of Algorithms | David Masson, Director of Enterprise Security | All viewers qualify for the chance to win a $100 Amazon GC

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.

In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI

Jan 20, 2021
4:00pm - 4:30pm (Central)
ONE IDENTITY | Making Zero Trust Real | Dan Conrad, IAM Strategist

In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD.  Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.

 
Jan 20, 2021
4:30pm - 5:00pm (Central)
DUO | See FIDO Run: Mobile Authenticators and Passwordless Advances | Nick Steele, Senior R&D Engineer