Date and Time | Title | |
---|---|---|
Jan 13, 2021 9:00am - 9:35am (Eastern) | ACCEPTTO | Going Passwordless: Buzzword or Reality? | Shahrokh Shahidzadeh, CEO & Alan Krassowski, VP of Technology/Drop Your Name in Chat Qualify to Win Apple AirPod Pro’s “Passwordless” is a fashionable term in cybersecurity, with its usage increasing as the field advances. But is it a conceivable reality, or just a pipedream? In this presentation, we will discuss what passwordless means, the empowering abilities of a passwordless solution, and some common misconceptions surrounding the technology. We will also cover:
| |
Jan 13, 2021 9:40am - 10:15am (Eastern) | CYRAL | Making access management secure, scalable and fun! | Timothy Nguyen, Engineering Lead/ All viewers qualify for chance to win $100 Amazon Gift Card With 37% of breaches in 2019 using compromised credentials and 30% involving internal actors1, privileged accounts are one of the biggest attack vectors in almost every organization. Access management is a demonstrably critical issue, and yet most companies struggle to do it right. By manually granting and revoking permissions, teams end up with security policies scattered across documents, tickets, and configuration files. This is how most organizations become incapable of deriving a holistic view of their security status. We discuss how recent shifts in the development process can be applied in a security context to address these challenges. Strategies such as Policy as Code and ChatOps make access management granular, auditable, and agile, thus enabling teams to establish proper security posture without all the headache. Key Takeaways
| |
Jan 13, 2021 10:30am - 11:30am (Eastern) | KEYNOTE | Morgan Wright, Chief Security Advisor | SENTINELONE | "Trust No Longer Exists As You Know It". Qualify to win Apple Airpods! Traditional trust models have failed us. Frameworks are just a panacea that mask a bigger problem. What happens when a determined adversary analyzes human weakness in order to exploit vulnerabilities in technology? SUNBURST and SolarWinds. Was this a failure of cybersecurity, or a failure of imagination? Could this be a prelude to war enabled by a massive intelligence failure, or just a black swan? It’s time to question everything we believe in order to create a lasting solution. | |
Jan 13, 2021 11:45am - 12:10pm (Eastern) | ACCELLION | Conquering Cyber Risk in 3rd Party Communications |Attend Session or Visit Booth and Qualify for $200 NIKE GC Conquering Cyber Risk in 3rd Party Communications To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes. | |
Jan 13, 2021 12:10pm - 1:25pm (Eastern) | CISO Panel: Vice President, Chief Information Security Officer at SAIC/Vice President, Chief Information Security Officer at U.S .Postal Service/Chief Information Security Officer at LogMeIn, Inc./Chief Security Advisor, SentinelOne Hear from cybersecurity leaders and experts on:
Interactive Q&A | |
Jan 13, 2021 1:25pm - 1:55pm (Eastern) | CROWDSTRIKE | Threat Hunting and the Rise of Targeted eCrime Intrusions | Jason Wood, Senior Tactical Intelligence Researcher/Attend Session Chance to Win $100 DoorDash Gift Card The term threat hunting has frequently been thrown around in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? How would an organization start doing threat hunting? In this session, Jason will dive into what threat hunting means and how you can use it to actively find intrusions. We will examine threat hunting techniques executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplished, and how the threat actors attempted to avoid discovery. | |
Jan 13, 2021 1:55pm - 2:25pm (Eastern) | ESENTIRE | Building Cyber Resilience: Finding Factors not Fault | Mark Sangster, Industry Security Strategist/Attend Session and Qualify to Win a "YOU PICK YOUR PRIZE" 8 possible prize options that the winner is able to select speakers, headphones, etc.) | |
Jan 13, 2021 2:35pm - 3:00pm (Eastern) | OKTA | Move Fast...Without Breaking Things | 3 Tips for Securing Hybrid IT | Kelsey Nelson, Security Specialist/Qualify for Boise Headphones | |
Jan 13, 2021 3:00pm - 3:30pm (Eastern) | FIDELIS | Arm Your Security Team Against Advanced Attacks with XDR | Jerry Mancini, COO- Join Session and a Chance to Win Your Own Cyber Warrior t-shirt! Many security teams are overwhelmed by the sheer volume of security alerts with no clear path to resolution. Security analysts, working in small teams and with smaller budgets, are often presented with more alerts than are humanly possible to triage and investigate, granting adversaries more time to evade detection because of the time required analyze and respond to threats. In this presentation, our COO, Jerry Mancini, discusses using integrated and automated platforms like eXtended Detection and Response (XDR) solutions to increase ROI, reduce alert fatigue, and automate response to detected threats. | |
Jan 13, 2021 3:45pm - 4:15pm (Eastern) | RED CANARY | 5 Critical Pillars for the SOC of the Future | Keith McCammon, Chief Security Officer & Co-Founder This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future. | |
Jan 13, 2021 4:15pm - 4:45pm (Eastern) | DIGITAL SHADOWS | Ransomware: It's Still a Big Deal | Austin Merritt, Cyber Threat Intelligence Analyst/ATTEND SESSION OR VISIT BOOTH AND QUALIFY TO WIN $50 Amazon |