Agenda

Date and TimeTitle
Jan 27, 2021
9:00am - 9:30am (Pacific)
ESENTIRE | Building Cyber Resilience: Finding Factors not Fault | Mark Sangster, Industry Security Strategist
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
 
Jan 27, 2021
9:30am - 10:00am (Pacific)
TENABLE | Seeing the forest through the trees - A risked based approach to maturing your VMP | Rob Walk, Sr. Security Engineer
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
 
Jan 27, 2021
10:10am - 11:25am (Pacific)
KEYNOTE | Leslie K. Lambert, Chief Executive Officer, Lambert Advanced Security and Privacy, LLC, | "The Future of Data Privacy"

Leslie K. Lambert has more than 35 years experience, Lambert’s deep IT knowledge base extends across architecture, business infrastructure, operations, security, data protection and technical infrastructure. Prior to Juniper Networks, Lambert was an IT executive at Sun Microsystems for 18 years and served as Sun’s CISO.

She received CSO Magazine’s 2010 Compass Award for security leadership and was named one of Computerworld’s Premier 100 IT Leaders in 2009. An Anita Borg Institute Ambassador since 2006, Lambert has mentored women across the world in technology. Lambert has also served on the board of the Bay Area CSO Council since 2005, and as its President since 2016.

Jan 27, 2021
11:20am - 11:50am (Pacific)
CORELIGHT | Making the SOC more effective by enabling automation with better data | Alex Kirk, Global Principal, Suricata/ Qualify for a Chance to Win a $100 Amazon gift card

SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight.

 Qualify for a Chance to Win a $100 Amazon gift card

 
 
 
Jan 27, 2021
12:00pm - 1:15pm (Pacific)
KEYNOTE | Gary Berman, CEO of Cyberman Security, LLC & Creator, The Cyber Hero Adventures: Defenders of the Digital Universe | A View from the C-Suite: The Real-Life Story From an APT Insider Attack Victim and his Pivot to Help Defend the Digital Universe
Gary Berman was the CEO of a successful marketing company when a small group of trusted insiders CLONED his company including 19 attack vectors, social engineering and identity theft. He was forced to shut down his SMB (100 team members). Unable to receive justice due to the difficulty of attribution and obfuscation, he has pivoted from victim to advocate to help others avoid the life-altering consequences of hacking. His educational vehicle is a super hero comic series and animated platform, “The CyberHero Adventures: Defenders of the Digital Universe.” Gary hosts an amazing Linkedin LIVE Show for his more than 22,000 Senior-Level Followers,” where he shines the light on the true, UNSUNG cybersecurity heroes who toil in anonymity to keep all of us safe online.
 
Gary will share some of the evidence that will surprise you including bluetooth, mac OS Thunderbolt, On-Star and many others. It sounds unbelievable…but it’s all TRUE! He’l also make you LAUGH about his Forrest Gump journey into comics and the super hero world:)
Jan 27, 2021
1:10pm - 1:40pm (Pacific)
DARKTRACE | Changing Cyber Landscapes: The Battle of Algorithms | David Masson, Director of Enterprise Security

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data.

In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

-Paradigm shifts in the cyber-threat landscape
·Advancements in offensive AI attack techniques
·How defensive AI can fight back
·Real-world examples of emerging threats that were stopped with Cyber AI

Jan 27, 2021
1:40pm - 2:10pm (Pacific)
IRONCAP | The need for post-quantum cybersecurity and its seamless integration | Andrew Cheung, CEO

Quantum advancements have rapidly accelerated in 2020 and continue to do so in 2021; this directly affects our current security measures. Some people say that quantum computers are years away just like there are still people believing the Earth is flat. Almost all big tech firms and government agencies are heavily invested in quantum advancements. In fact, in 2016 NSA suggested that corporations and agencies become quantum-safe.

Post-quantum cybersecurity is a cryptographic technology to withstand the hacking power of quantum computers.  Most importantly, post-quantum cybersecurity is designed to be installed on conventional computers to allow current infrastructures to continue to be safe in the post-quantum era.

Jan 27, 2021
2:20pm - 2:50pm (Pacific)
BRAINTRACE | Uncover The Path to Ransomware | John Limb, CTO

Many organizations in various industries have been the target of these specially crafted attacks. These attacks are well thought out and staged by some notorious syndicates.

Crime syndicates use different trojans and malware for reconnaissance and exfiltration before deploying ransomware. Braintrace continually researches the latest malware threats and consistently discovers new zero-day attacks. Understanding the latest threat landscape is essential to know the strategies of these bad actors.  In doing so, it dramatically increases the chance to stop attacks before malware is deployed.

Join us to learn about how these threats are constructed and how to protect your organization from being impacted by malicious attacks.

Jan 27, 2021
2:50pm - 3:20pm (Pacific)
NETENRICH | Are you ready for Intelligent SOC? | Brandon Hoffman, Chief Information Security Officer
The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC.  Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.
 
Jan 27, 2021
3:30pm - 4:00pm (Pacific)
EXTRAHOP | Talking to the Board About the New Realities of IT Security | Jeff Costlow, Deputy CISO

When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.

Join this virtual boardroom to discuss:

  • Achieving alignment across the board
  • Building a “roadmap to yes”
  • Focusing on risk and reward for core business objectives
Jan 27, 2021
4:00pm - 4:30pm (Pacific)
RECIPROCITY | The Art of Compliance: How to build a defensible compliance program | Scott McCormick, Chief Information Security Officer & Rob Ellis, Senior Vice President

When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources.

But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it.

Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps.

Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization.

During this event they will discuss:

  • Moving to a zero-trust model

  • Why certifications are just the start

  • How automation future-proofs for change

  • Reframing the narrative from a cost center to profit protector/business enabler

Jan 27, 2021
4:30pm - 5:00pm (Pacific)
BLACKBERRY | Rational Approach to Zero Trust | Chris Pittman, Senior Manager, Sales Engineering/Qualify to Win JBL Waterproof speaker