Date and Time | Title | |
---|---|---|
Mar 10, 2021 9:00am - 9:30am (Central) | BeyondTrust | Best Practices: PAM Security and Data Privacy | Christopher Hills, Deputy Chief Technology Officer What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. As a leader in the Privileged Access Management (PAM) market, BeyondTrust is constantly challenged with questions surrounding strategy, maturity and priorities, while managing security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why: · Analyzing Best Practice · Security considerations · Key components for a successful PAM strategy | ![]() |
Mar 10, 2021 9:30am - 10:00am (Central) | Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist In this webinar you will learn:
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint. However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold. | ![]() |
Mar 10, 2021 10:15am - 11:25am (Central) | Keynote | Marc Ashworth, Chief Information Security Officer - Senior VP, First Bank | New Security Threats On A Much Larger Scale In 2021, financial institutions and other industries will be faced with new security threats on a much larger scale. The pandemic that began 2020 has changed how business conduct business. A large portion of the work force is now working from home. This has dramatically increased the security footprint of organizations. In June 2020 an estimated 42% of US labor force working from home, and that trend is expected to remain in effect for some time. Hundreds of individual, unknown, and uncontrolled networks now have access to an employee’s trusted device 24×7. These devices then connect into the corporate network. How are you prepared for reducing risk, analyzing threats, and securing the business of the future? | ![]() |
Mar 10, 2021 11:25am - 11:55am (Central) | ProCircular | Effective Risk Management | Ty Hollins, Chief Information Security Officer Includes the methods and processes used to:
Provides a framework to:
| ![]() |
Mar 10, 2021 12:05pm - 1:15pm (Central) | Panel | “What really matters in CyberSecurity - with too much to do, so little resources to work with” | Mike Davis, Chief Information Security Officer, alliantgroup | Jack Leidecker, Chief Information Security Officer, Gong | Marc Ashworth, Chief Informa | ![]() |
Mar 10, 2021 1:15pm - 1:45pm (Central) | Recorded Future | Review of The Most Widely Used Malicious Command & Control Infrastructure | Greg Lesnewich, Threat Intelligence Analyst Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes “suspicious” hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you’d imagine. In this session, Recorded Future has some fresh insight to keep you up to speed. This will include a first-look at the novel indicators and intelligence not otherwise available in the public domain. Get an inside look into:
| ![]() |
Mar 10, 2021 1:45pm - 2:15pm (Central) | One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist | ![]() |
Mar 10, 2021 2:25pm - 2:55pm (Central) | SentinelOne | Real-Time Defender Velocity - Code on Code Warfare | David Gold, Sr. Director, Sales Engineering Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can better prevent threats, find and detect what is missed, provide contextual linking for forensic and threat hunting – and even more importantly self heal and fully recover when necessary. | ![]() |
Mar 10, 2021 2:55pm - 3:25pm (Central) | Guardicore | Winning Against Ransomware | Igor Livshitz, Senior Director of Product Management Igor Livshitz will share real (and daily) experience with helping customers hit by ransomware. Join us to hear how an attack looks like in real life, how incident response teams deal with it, and what can be learned from helping multiple customers to recover from ransomware breach. We will also discuss how efficiently applied segmentation can help your organization be better prepared if and when ransomware tries to go after you. | ![]() |
Mar 10, 2021 3:35pm - 4:05pm (Central) | HID | Making the Case for Authentication as a Platform | Yves Massard, Product Marketing Director As organizations adopt advanced authentication practices, it’s critical to consider the varied modalities your organization requires. The “solution” should not be one that’s built from a collection of point solutions. For this reason, many businesses are turning to authentication solutions that are built as a platform. This holistic solution is accommodating to different modalities, applications and form factors. It can also control the authentication and credential management lifecycle. In this session, the experts from HID® Global will:
| ![]() |
Mar 10, 2021 4:05pm - 4:35pm (Central) | LogRhythm | MITRE ATT&CK with LogRhythm | Michael McGinnis, Senior Security Engineer Over the past 15 years, the IT industry has been looking for a unified methodology to address security within organizations. Many different methodologies have been proposed and published, but not until the arrival of the MITRE ATT&CK framework has the entire IT community collectively agreed that “this is the way”. What sets the MITRE ATT&CK framework from others is its community approach to addressing security from a perspective of Tactics and Techniques. In this webinar, we are going to discuss how leveraging the LogRhythm platform along with the MITRE ATT&CK framework will not just increase your security posture, but also align your organization to the top framework in the industry. | ![]() |
Mar 10, 2021 4:35pm - 4:55pm (Central) | Darktrace | How Cyber AI Detects Digital Fakes and Impersonation Attacks | Dan Fein, Director of Email Security Products Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | ![]() |
Mar 10, 2021 4:55pm - 5:10pm (Central) | Closing Remarks | Prize Winners Announced |