Agenda

Date and TimeTitle
Jan 13, 2021
9:00am - 9:35am (Eastern)
ACCEPTTO | Going Passwordless: Buzzword or Reality? | Shahrokh Shahidzadeh, CEO & Alan Krassowski, VP of Technology/Drop Your Name in Chat Qualify to Win Apple AirPod Pro’s

“Passwordless” is a fashionable term in cybersecurity, with its usage increasing as the field advances. But is it a conceivable reality, or just a pipedream?

In this presentation, we will discuss what passwordless means, the empowering abilities of a passwordless solution, and some common misconceptions surrounding the technology. We will also cover:

  • The chronic pain and agony of passwords that we’ve all grown accustomed to
  • Questions to ask yourself regarding your current authentication practices
  • Viewing authentication as a continuum vs. a single binary event
  • The challenges and latest best practices for state-of-the-art authentication
  • The sheer delight of replacing your passwords with a highly secure and frictionless alternative
  • How to phase in passwordless auth in an environment that still uses passwords
Jan 13, 2021
9:40am - 10:15am (Eastern)
CYRAL | Making access management secure, scalable and fun! | Timothy Nguyen, Engineering Lead/ All viewers qualify for chance to win $100 Amazon Gift Card

With 37% of breaches in 2019 using compromised credentials and 30% involving internal actors1, privileged accounts are one of the biggest attack vectors in almost every organization. Access management is a demonstrably critical issue, and yet most companies struggle to do it right. By manually granting and revoking permissions, teams end up with security policies scattered across documents, tickets, and configuration files. This is how most organizations become incapable of deriving a holistic view of their security status.

We discuss how recent shifts in the development process can be applied in a security context to address these challenges. Strategies such as Policy as Code and ChatOps make access management granular, auditable, and agile, thus enabling teams to establish proper security posture without all the headache.

Key Takeaways

  • Ideal access control systems enable granular access control and effective auditing without obstructing day to day operations.

  • Policy as Code leverages version control and code generation to encourage minimum privileges and enable teams to review the who, what, when, and why of access control changes.

  • ChatOps tools remove bottlenecks by empowering individuals to interact with their organization’s systems in a familiar way while leveraging messaging interfaces for auditability.

Jan 13, 2021
10:30am - 11:30am (Eastern)
KEYNOTE | Morgan Wright, Chief Security Advisor | SENTINELONE | "Trust No Longer Exists As You Know It". Qualify to win Apple Airpods!

Traditional trust models have failed us. Frameworks are just a panacea that mask a bigger problem. What happens when a determined adversary analyzes human weakness in order to exploit vulnerabilities in technology? SUNBURST and SolarWinds. Was this a failure of cybersecurity, or a failure of imagination? Could this be a prelude to war enabled by a massive intelligence failure, or just a black swan? It’s time to question everything we believe in order to create a lasting solution.

 
Jan 13, 2021
11:45am - 12:10pm (Eastern)
ACCELLION | Conquering Cyber Risk in 3rd Party Communications |Attend Session or Visit Booth and Qualify for $200 NIKE GC

Conquering Cyber Risk in 3rd Party Communications

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

 
Jan 13, 2021
12:10pm - 1:25pm (Eastern)
CISO Panel: Vice President, Chief Information Security Officer at SAIC/Vice President, Chief Information Security Officer at U.S .Postal Service/Chief Information Security Officer at LogMeIn, Inc./Chief Security Advisor, SentinelOne

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security

Interactive Q&A

  •  
Jan 13, 2021
1:25pm - 1:55pm (Eastern)
CROWDSTRIKE | Threat Hunting and the Rise of Targeted eCrime Intrusions | Jason Wood, Senior Tactical Intelligence Researcher/Attend Session Chance to Win $100 DoorDash Gift Card

The term threat hunting has frequently been thrown around in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? How would an organization start doing threat hunting? In this session, Jason will dive into what threat hunting means and how you can use it to actively find intrusions. We will examine threat hunting techniques executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplished, and how the threat actors attempted to avoid discovery.

 
Jan 13, 2021
1:55pm - 2:25pm (Eastern)
ESENTIRE | Building Cyber Resilience: Finding Factors not Fault | Mark Sangster, Industry Security Strategist/Attend Session and Qualify to Win a "YOU PICK YOUR PRIZE" 8 possible prize options that the winner is able to select speakers, headphones, etc.)
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Jan 13, 2021
2:35pm - 3:00pm (Eastern)
OKTA | Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT | Kelsey Nelson, Security Specialist/Qualify for Boise Headphones
Jan 13, 2021
3:00pm - 3:30pm (Eastern)
FIDELIS | Arm Your Security Team Against Advanced Attacks with XDR | Jerry Mancini, COO- Join Session and a Chance to Win Your Own Cyber Warrior t-shirt!

Many security teams are overwhelmed by the sheer volume of security alerts with no clear path to resolution. Security analysts, working in small teams and with smaller budgets, are often presented with more alerts than are humanly possible to triage and investigate, granting adversaries more time to evade detection because of the time required analyze and respond to threats. In this presentation, our COO, Jerry Mancini, discusses using integrated and automated platforms like eXtended Detection and Response (XDR) solutions to increase ROI, reduce alert fatigue, and automate response to detected threats.

 
Jan 13, 2021
3:45pm - 4:15pm (Eastern)
RED CANARY | 5 Critical Pillars for the SOC of the Future | Keith McCammon, Chief Security Officer & Co-Founder

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Jan 13, 2021
4:15pm - 4:45pm (Eastern)
DIGITAL SHADOWS | Ransomware: It's Still a Big Deal | Austin Merritt, Cyber Threat Intelligence Analyst/ATTEND SESSION OR VISIT BOOTH AND QUALIFY TO WIN $50 Amazon