Date and Time | Title | |
---|---|---|
Feb 24, 2021 9:00am - 9:30am (Eastern) | ONELOGIN | Extortionware: Your Privacy Problems Made Public | Lonnie Benavides, Head of Infrastructure and Application Security | |
Feb 24, 2021 9:30am - 10:05am (Eastern) | MICRO FOCUS | Becoming a Cyber Resilient Enterprise | Rob Aragao, Chief Security Strategist Cyber resilience is a shift to enable enterprise resilience and the ability for organizations to thrive despite adversities, crises, and business volatility. Being resilient equips organizations with the ability to “pivot” at scale during adverse cyber events and market conditions (including non-business events such as a global pandemic) and to adapt to customer changes, digital transformation, and hyper-scaled growth. | |
Feb 24, 2021 10:20am - 11:30am (Eastern) | KEYNOTE | Phyllis Woodruff Vice President, IT Risk and Compliance, Global Payments Inc. | "Leading through Change" 2020 turned our world on its head. Hundreds of thousands dead. Entire industries at risk–countless business losses. Social and political unrest that papered the news each day. As we enter 2021, we need to help our associates and our companies settle into a new normal. This presentation will discuss the skills you need to make that happen. | |
Feb 24, 2021 11:30am - 12:00pm (Eastern) | DUO | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist In this webinar you will learn:
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint. However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold. | |
Feb 24, 2021 12:10pm - 1:20pm (Eastern) | CISO Panel: “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | Greg Anderson VP, Chief Privacy Officer, E.W. Scripps Company | Jeff Schilling, Global Chief Information Security Officer, Teleperformance | Rob Aragao Chief Security | |
Feb 24, 2021 1:20pm - 1:40pm (Eastern) | NETENRICH | Are you ready for Intelligent SOC? | Brandon Hoffman, Chief Information Security Officer | |
Feb 24, 2021 1:40pm - 2:10pm (Eastern) | BLUMIRA | How to Detect Common Threats Targeting Your Cloud Infrastructure | Patrick Garrity, VP of Operations This unprecedented era of remote work has forced a rapid move to the cloud for many organizations. But that can leave critical gaps in detecting security threats in the cloud. In this talk, you’ll learn about: | |
Feb 24, 2021 2:20pm - 2:50pm (Eastern) | MALWAREBYTES | Enduring from Home: COVID-19’s Impact on Business Security | Adam Gates Senior Sales Engineer All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them. | |
Feb 24, 2021 2:50pm - 3:20pm (Eastern) | TUFIN | Security Policy Automation for Resilient and Modern Security Operations | Hillary Madge, VP Product Marketing According to Gartner, one of the top 3 themes driving 2021’s strategic technology trends is resilient delivery. Gartner’s Top Strategic Technology Trends for 2021 explains that this entails the ability to nimbly adapt or pivot in a dynamic business or IT environment. The underlying assumption is that volatility exists and persists. It’s vital to have the operational skills, processes and systems to constantly adapt. Please join Tufin’s VP of Product Marketing who will share the challenges posed by this consistent volatility, specifically as related to security policy management. The volume and complexity of policies across today’s modern architecture continues to grow. She will present a strategy for policy abstraction and automation that enables organizations to gain cohesive and consistent control of their security policies, spanning hybrid cloud and on-prem environments. | |
Feb 24, 2021 3:30pm - 4:00pm (Eastern) | FORGEROCK | Identity Cloud Checklist | Chaitanya Yinti, Sr. Director | |
Feb 24, 2021 4:00pm - 4:30pm (Eastern) | PCYSYS | Stay Ahead of the Hacker with Continuous Security Testing | Sion Retzkin, Head of Knowledge Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
| |
Feb 24, 2021 4:30pm - 5:00pm (Eastern) | DARKTRACE | How Cyber AI Detects Digital Fakes and Impersonation Attacks | Dan Fein, Director of Email Security Products, Americas Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | |
Feb 24, 2021 5:00pm - 5:15pm (Eastern) | Closing Remarks | Prize Drawing |