Agenda

Date and TimeTitle
Mar 18, 2021
8:00am - 9:00am (Central)
Exhibitor Hall Open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

 
 
Mar 18, 2021
8:15am - 8:56am (Central)
A Modern Approach to Information Protection

Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations—especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021?

 
Mar 18, 2021
8:15am - 9:11am (Central)
Not Just a Checkbox Anymore: InfoSec Policies that Drive Accountability and Security-Mindedness

Security policies are a foundational requirement of any security program. Most of us have them, auditors review them, and we update them annually. That is a good start, but are your policies working for you in a way that advances your security program? A well-designed policy structure coupled with strategic communication, training, and processes will enable organizational clarity, gain executive buy-in, drive accountability, and even help advance security culture.

Tina Meeker, CISSP, CIPP/US, and Sr. Director of Information Security for Sleep Number, will share proven practices to help you take your policy design and operational practices to the next level (or build from scratch) based on her experience in this space for over 15 years across several organizations across various industries.

In this session, you will learn how to:

  • Architect a policy structure that fits your organization’s needs
  • Gain buy-in from the top and key stakeholders early and often
  • Identify key stakeholders to develop and deliver custom messaging (and training if needed) and drive ownership and accountability
  • Establish a simple “policy operations” process to help capture challenges and exceptions and to ensure proper visibility to risks
  • Evolve policy over time, staying in line with business capabilities and priorities
Mar 18, 2021
8:15am - 9:02am (Central)
The Challenge of Detecting Threats in the Cloud

Detecting threats in the cloud presents several challenges: dealing with new technologies and facing new threat scenarios, exacerbated by the COVID-19 accelerated cloud adoption. Gartner indicates that organizations have been expanding their adoption of cloud security-oriented tools, such as Cloud Security Posture Management (CSPM) and Cloud Access Security Broker (CASB), as they try to keep cloud-related threats under control. However, not all organizations have an interest in adopting all these added technologies, and even when they do, the challenge of integrating them into their security monitoring infrastructure remains.

Join this discussion to learn:

  • What are the differences between traditional threats and cloud threats?
  • How to align your security monitoring architecture to the new cloud monitoring requirements
  • How to optimize cloud security monitoring with a cloud-first SIEM approach
Mar 18, 2021
9:00am - 9:45am (Central)
[Opening Keynote] Security as an Innovation Lab

Traditionally, security is seen as a cost center. What if we could flip that on its head by using security concepts to drive business revenue? Every department would want the security team at the table. In this session, I’ll talk about innovative ways to draw positive attention to information security in a way that makes people want to give time and resources to security.

 
Mar 18, 2021
9:45am - 10:00am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
10:00am - 10:35am (Central)
Top 4 Reasons Why Privileged Access Management Implementations Fail

It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management (PAM) technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.

Join Remediant in this discussion to:

  • Learn the five reasons why privileged access management implementations fail
  • Identify areas in your IAM program where you can reduce admin access risk
  • Capitalize on existing investments, while improving your risk posture

Presentation level: TECHNICAL (deeper dive including TTPs)

Mar 18, 2021
10:00am - 10:57am (Central)
Enemies Among Your Friends: Vendor Management in a Post SolarWinds World

We have had one of the most seismic shifts in the world of data privacy and cybersecurity in the SolarWinds breach. In this single incident, we see the convergence of what security and data privacy experts have been railing about for years: namely, the terrifying reality of prolonged access to a system and a robust supply chain breach.

One of the most important considerations in cybersecurity does not involve your own direct network security; it involves your partners and vendors. You are only as strong as the weakest link in your vendor chain. The ease, convenience, and cost effectiveness of outsourcing certain business functions frequently overshadows the potential pitfalls lurking in using outside third parties and vendors.

This presentation will include technology and legal perspectives as we “unpack” the SolarWinds breach. Providing interplay between the two worlds, we will begin with a technology overview of the “reach of the breach,” then discuss the legal ramifications in terms of contractual obligations, insurance coverage, and regulatory issues. Finally, we will discuss the steps your organization needs to take to ensure that any partners or vendors with access to your network systems or company data are meeting (at least) a minimum level of security requirements. We will go through the steps involved in a vendor management program and explain how to get started (or how to get better) at managing vendors.

Mar 18, 2021
10:00am - 10:45am (Central)
Achieving the Security Data Lake

The promise of the Security Data Lake is to provide a centralized, massively scalable repository for ALL data relevant for the Security Operations team, enabling many core functions required by the modern enterprise -- monitoring and alerting, threat hunting, advanced persistent threat protection, DDoS mitigation and many others.  

But the quest to achieve it has been a rocky one, as infrastructure complexity has prevented most teams from achieving the vision.  

This session will explain the benefits of achieving a true security data lake, explain the previous barriers that companies have faced, and describe a new approach which is allowing companies to achieve the vision, and finally put the Security Data Lake at the heart of their overall Security Architecture.  

 

Mar 18, 2021
10:30am - 10:45am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
10:45am - 11:33am (Central)
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack

Following in the footsteps of a cybercriminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker’s techniques used and how they went from zero to full domain admin compromise that resulted in a nasty ransomware incident.

 
Mar 18, 2021
10:45am - 11:20am (Central)
Conquering Cloud Complexity

Cloud security is hard, not least because cloud platforms change so quickly.  This talk presents several lessons learned from security teams struggling to get their arms around the sprawl of modern infrastructure, using practical analogies from pandemics and earthquakes.

 
Mar 18, 2021
10:45am - 11:28am (Central)
Business Continuity Planning: The Sequel

One year into the pandemic, we’ve battle tested our business continuity plans. What worked and what do we need to adjust? Now, get ready for the sequel. Organizations now need to consider collecting and tracking key metrics of employee health and safety, especially for those returning to the office. Join Milinda Rambel Stone, Vice President & CISO at Provation Medical, as she discusses the next plan your organization may need: how to securely collect and protect employee health and safety data.

 
Mar 18, 2021
11:15am - 11:30am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
11:30am - 12:08pm (Central)
The Implementation Journey of Zero Trust and SASE: Realizing the Benefits

Most organizations have a hybrid implementation of cloud and on-prem services. With the rapid adoption of business digitalization and expanding remote work force, how do we consolidate controls and enhance the security of the systems?

In this hybrid mode, enterprises need speed, visibility, security, and reliability without compromise. Enter the secure access service edge, better known as SASE. It’s inevitable that SASE implementations and Zero Trust implementations will provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, James Christianson will discuss:
·  How to migrate your security controls to take advantage of SASE
·  Reducing cost while increasing your security posture
·  Implementing a road map for SASE / Zero Trust

Mar 18, 2021
11:30am - 12:09pm (Central)
How to Effectively Manage the Modern Risks of Open Source Code

Today’s modern applications depend on of a substantial amount of open source components and third-party libraries, and developers acknowledge that utilizing open source allows them to focus more on unique code attributes instead of recreating what’s already been successfully established. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base and cannot consistently address the widening hazards they face.

As a result, organizations desire automated, repeatable processes for open source usage, risk management, and vulnerability remediation that fit within modern development environments.

In this session, attendees will hear recommendations from Stephen Gates, Checkmarx SME, on how to effectively implement an approach to:

  • Identify open source with confidence
  • Minimize open source security and license risks
  • Prioritize exploitable vulnerabilities
  • Accelerate informed remediation
  • Integrate and automate open source analysis

Presentation level: MANAGERIAL (security and business leaders)

Mar 18, 2021
11:30am - 12:09pm (Central)
Making the Complex Consumable: Conducting the Information Security Symphony

Information Security programs protect complex businesses. Learn how to keep it simple.

Securing your organization can be daunting—further complicated by a global pandemic. You enter a new organization and you need to build a Security team and a practice. Where do you start? Your business, Board, colleagues, leadership, and stakeholders all have expectations. Do not get overwhelmed. Learn how to leverage your resources to orchestrate an Information Security program.

Presentation level: MANAGERIAL (security and business leaders)

Mar 18, 2021
12:00pm - 12:15pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
12:15pm - 12:56pm (Central)
Get Beyond Compliance and Achieve Real Data Security

To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future.

We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.

Mar 18, 2021
12:15pm - 1:00pm (Central)
The Unified Controls Framework

In this presentation, Mia Boom-Ibes, Allstate Vice President, will explore the Secure Software Development Life Cycle and how you can deliver secure products—making the easy thing the right thing to do for your product development teams.

You’ll get examples that you can put into practice, and leave armed with the knowledge and skills on how to improve code quality and gain transparency into the residual risks. The presentation will also cover a future focus on the unified control framework program and how the world of secure software development is innovating to stay in front of emerging threats.

Mar 18, 2021
12:15pm - 1:10pm (Central)
[Panel] Workforce 2.0: The New Normal

Our panelists will discuss the continued challenges with managing the remote workforce securely. Whether people go back to an office again is up in the air, but InfoSec and Operations must have processes and technology in place to keep the business running with an acceptable risk. Bring your questions for our panel.

 
 
Mar 18, 2021
1:00pm - 1:15pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
1:15pm - 2:15pm (Central)
[Panel] Ransomware, BEC Attacks, and Insider Threats - What's Next?

Even a pandemic didn’t slow the roll of hackers and other nefarious groups. Ransomware and BEC attacks are at an all-time high, and insider threats (malicious and unknowing) are on the rise, as well. It seems if a dollar is to be had, someone is trying to take it. So, how do we arm our clients, partners, and coworkers with the tools they need to identify these next-level threats?

 
 
Mar 18, 2021
1:15pm - 2:15pm (Central)
[Panel] Let's Talk About Clouds

It’s been a year now since many companies were forced to adopt cloud services or perish. For many, this was a huge shift and a leap of faith. This discussion will cover lessons learned, positives we have uncovered, and some of the new alphabet soup relating to cloud—CASB, SaaS, IaaS, etc.

 
 
Mar 18, 2021
1:15pm - 1:52pm (Central)
The Intersection of the Cyber and Biological Pandemics

The world changed overnight, and we adapted to it, but so did the hackers and cybercriminals. We are seeing a new breed of cyber mercenaries for hire, hackers for hire, ransomware-as-a-service (RAAS), and enterprise-level tools and servers to help manage this new Dark Web of consulting services. This is why we are all players in the new game of WWD even if we do not know it.

The false security we wrap ourselves in—hoping the other guy, tool, or services we have invested in, even at the lowest level that will protect us—is fleeting. The Dark Web is becoming the e-commerce for obtaining off the shelf roadmaps to your systems architecture, the data you hold, the tools and processes needed to access your environment—physical, logical, and your R&D.

All animals, including humans, are wired to either fight or flight when challenged. The new predators on the planet include a hybrid of human-animal that is adopting new tools that leverage AI/ML, pitting offense and defense with no evolutionary road map and little remorse for the outcome.

Presentation level: TECHNICAL (deeper dive including TTPs)

Mar 18, 2021
2:00pm - 2:15pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Mar 18, 2021
2:15pm - 2:45pm (Central)
Office, Home, or Hybrid: Manage and Secure Endpoints Anywhere, Anytime

Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

Mar 18, 2021
2:15pm - 2:44pm (Central)
Faking It: Stopping Impersonation Attacks with Cyber AI

Today, 94% of cyber threats still originate in the inbox. “Impersonation attacks” are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or digital fakes, that expertly mimic the writing style of trusted contacts and colleagues.

Humans can no longer distinguish real from fake on their own, and businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response.

In an era when thousands of documents can be encrypted in minutes, “immune system” technology takes action in seconds—stopping cyber threats before damage is done.

Find out how in this session.

Mar 18, 2021
3:00pm - 3:44pm (Central)
[Closing Keynote] Adapting in the Wild: How Businesses, Their CISOs, and IT Organizations Have Responded to COVID-19

IT professionals have had an incredible front row seat to one of the most extensive and lengthy business continuity plan (BCP) exercises we’ve ever seen, so in many ways, this has been a case study in resilience—both of systems and the human spirit. The pandemic fundamentally altered how people worked, and IT was the enabler.

The audience will gain insights as to how COVID-19 has impacted the IT field and how CISO organizations have had to shift their responsibilities during the pandemic. Tina will reflect on considerations for employees returning from the wild and share what steps companies can take to improve their risk management posture moving forward.

Presentation level: MANAGERIAL (security and business leaders)