Date and Time | Title | |
---|---|---|
Jan 27, 2021 9:00am - 9:30am (Pacific) | ESENTIRE | Building Cyber Resilience: Finding Factors not Fault | Mark Sangster, Industry Security Strategist | |
Jan 27, 2021 9:30am - 10:00am (Pacific) | TENABLE | Seeing the forest through the trees - A risked based approach to maturing your VMP | Rob Walk, Sr. Security Engineer | |
Jan 27, 2021 10:10am - 11:25am (Pacific) | KEYNOTE | Leslie K. Lambert, Chief Executive Officer, Lambert Advanced Security and Privacy, LLC, | "The Future of Data Privacy" Leslie K. Lambert has more than 35 years experience, Lambert’s deep IT knowledge base extends across architecture, business infrastructure, operations, security, data protection and technical infrastructure. Prior to Juniper Networks, Lambert was an IT executive at Sun Microsystems for 18 years and served as Sun’s CISO. She received CSO Magazine’s 2010 Compass Award for security leadership and was named one of Computerworld’s Premier 100 IT Leaders in 2009. An Anita Borg Institute Ambassador since 2006, Lambert has mentored women across the world in technology. Lambert has also served on the board of the Bay Area CSO Council since 2005, and as its President since 2016. | |
Jan 27, 2021 11:20am - 11:50am (Pacific) | CORELIGHT | Making the SOC more effective by enabling automation with better data | Alex Kirk, Global Principal, Suricata/ Qualify for a Chance to Win a $100 Amazon gift card SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight. Qualify for a Chance to Win a $100 Amazon gift card | |
Jan 27, 2021 12:00pm - 1:15pm (Pacific) | KEYNOTE | Gary Berman, CEO of Cyberman Security, LLC & Creator, The Cyber Hero Adventures: Defenders of the Digital Universe | A View from the C-Suite: The Real-Life Story From an APT Insider Attack Victim and his Pivot to Help Defend the Digital Universe Gary Berman was the CEO of a successful marketing company when a small group of trusted insiders CLONED his company including 19 attack vectors, social engineering and identity theft. He was forced to shut down his SMB (100 team members). Unable to receive justice due to the difficulty of attribution and obfuscation, he has pivoted from victim to advocate to help others avoid the life-altering consequences of hacking. His educational vehicle is a super hero comic series and animated platform, “The CyberHero Adventures: Defenders of the Digital Universe.” Gary hosts an amazing Linkedin LIVE Show for his more than 22,000 Senior-Level Followers,” where he shines the light on the true, UNSUNG cybersecurity heroes who toil in anonymity to keep all of us safe online.
Gary will share some of the evidence that will surprise you including bluetooth, mac OS Thunderbolt, On-Star and many others. It sounds unbelievable…but it’s all TRUE! He’l also make you LAUGH about his Forrest Gump journey into comics and the super hero world:) | |
Jan 27, 2021 1:10pm - 1:40pm (Pacific) | DARKTRACE | Changing Cyber Landscapes: The Battle of Algorithms | David Masson, Director of Enterprise Security Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data. In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. In this session, learn about: -Paradigm shifts in the cyber-threat landscape | |
Jan 27, 2021 1:40pm - 2:10pm (Pacific) | IRONCAP | The need for post-quantum cybersecurity and its seamless integration | Andrew Cheung, CEO Quantum advancements have rapidly accelerated in 2020 and continue to do so in 2021; this directly affects our current security measures. Some people say that quantum computers are years away just like there are still people believing the Earth is flat. Almost all big tech firms and government agencies are heavily invested in quantum advancements. In fact, in 2016 NSA suggested that corporations and agencies become quantum-safe. Post-quantum cybersecurity is a cryptographic technology to withstand the hacking power of quantum computers. Most importantly, post-quantum cybersecurity is designed to be installed on conventional computers to allow current infrastructures to continue to be safe in the post-quantum era. | |
Jan 27, 2021 2:20pm - 2:50pm (Pacific) | BRAINTRACE | Uncover The Path to Ransomware | John Limb, CTO Many organizations in various industries have been the target of these specially crafted attacks. These attacks are well thought out and staged by some notorious syndicates. Crime syndicates use different trojans and malware for reconnaissance and exfiltration before deploying ransomware. Braintrace continually researches the latest malware threats and consistently discovers new zero-day attacks. Understanding the latest threat landscape is essential to know the strategies of these bad actors. In doing so, it dramatically increases the chance to stop attacks before malware is deployed. Join us to learn about how these threats are constructed and how to protect your organization from being impacted by malicious attacks. | |
Jan 27, 2021 2:50pm - 3:20pm (Pacific) | NETENRICH | Are you ready for Intelligent SOC? | Brandon Hoffman, Chief Information Security Officer | |
Jan 27, 2021 3:30pm - 4:00pm (Pacific) | EXTRAHOP | Talking to the Board About the New Realities of IT Security | Jeff Costlow, Deputy CISO When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT. Join this virtual boardroom to discuss:
| |
Jan 27, 2021 4:00pm - 4:30pm (Pacific) | RECIPROCITY | The Art of Compliance: How to build a defensible compliance program | Scott McCormick, Chief Information Security Officer & Rob Ellis, Senior Vice President When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources. But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it. Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps. Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization. During this event they will discuss:
| |
Jan 27, 2021 4:30pm - 5:00pm (Pacific) | BLACKBERRY | Rational Approach to Zero Trust | Chris Pittman, Senior Manager, Sales Engineering/Qualify to Win JBL Waterproof speaker |