Agenda

Date and TimeTitle
Mar 10, 2021
9:00am - 9:30am (Central)
BeyondTrust | Best Practices: PAM Security and Data Privacy | Christopher Hills, Deputy Chief Technology Officer

What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. As a leader in the Privileged Access Management (PAM) market, BeyondTrust is constantly challenged with questions surrounding strategy, maturity and priorities, while managing security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why: 

 ·         Analyzing Best Practice 

·         Security considerations 

·         Key components for a successful PAM strategy 

Mar 10, 2021
9:30am - 10:00am (Central)
Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

Mar 10, 2021
10:15am - 11:25am (Central)
Keynote | Marc Ashworth, Chief Information Security Officer - Senior VP, First Bank | New Security Threats On A Much Larger Scale

In 2021, financial institutions and other industries will be faced with new security threats on a much larger scale.  The pandemic that began 2020 has changed how business conduct business. A large portion of the work force is now working from home.  This has dramatically increased the security footprint of organizations.  In June 2020 an estimated 42% of US labor force working from home, and that trend is expected to remain in effect for some time.  Hundreds of individual, unknown, and uncontrolled networks now have access to an employee’s trusted device 24×7.  These devices then connect into the corporate network.  How are you prepared for reducing risk, analyzing threats, and securing the business of the future?

Mar 10, 2021
11:25am - 11:55am (Central)
ProCircular | Effective Risk Management | Ty Hollins, Chief Information Security Officer

Includes the methods and processes used to:

  • manage risks
  • and seize opportunities related to business objectives.

Provides a framework to:

  • identify threats and opportunities
  • assess threats and opportunities in terms of likelihood and impact
  • determine a response strategy
  • and monitoring the process.
Mar 10, 2021
12:05pm - 1:15pm (Central)
Panel | “What really matters in CyberSecurity - with too much to do, so little resources to work with” | Mike Davis, Chief Information Security Officer, alliantgroup | Jack Leidecker, Chief Information Security Officer, Gong | Marc Ashworth, Chief Informa
Mar 10, 2021
1:15pm - 1:45pm (Central)
Recorded Future | Review of The Most Widely Used Malicious Command & Control Infrastructure | Greg Lesnewich, Threat Intelligence Analyst

Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes “suspicious” hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you’d imagine. In this session, Recorded Future has some fresh insight to keep you up to speed. This will include a first-look at the novel indicators and intelligence not otherwise available in the public domain. Get an inside look into:

  • Key 2020 findings related to over 10,000 unique command and control servers, across more than 80 families
  • Best practices for proactive detection, ongoing monitoring, and defense-in-depth approaches to adversary infrastructure
  • The 2021 outlook for C2s, and what you can do to stay ahead
Mar 10, 2021
1:45pm - 2:15pm (Central)
One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD.  Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.
Mar 10, 2021
2:25pm - 2:55pm (Central)
SentinelOne | Real-Time Defender Velocity - Code on Code Warfare | David Gold, Sr. Director, Sales Engineering

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI and big data analytics organizations can better prevent threats, find and detect what is missed, provide contextual linking for forensic and threat hunting – and even more importantly self heal and fully recover when necessary.

Mar 10, 2021
2:55pm - 3:25pm (Central)
Guardicore | Winning Against Ransomware | Igor Livshitz, Senior Director of Product Management

Igor Livshitz will share real (and daily) experience with helping customers hit by ransomware. Join us to hear how an attack looks like in real life, how incident response teams deal with it, and what can be learned from helping multiple customers to recover from ransomware breach. We will also discuss how efficiently applied segmentation can help your organization be better prepared if and when ransomware tries to go after you.

Mar 10, 2021
3:35pm - 4:05pm (Central)
HID | Making the Case for Authentication as a Platform | Yves Massard, Product Marketing Director

As organizations adopt advanced authentication practices, it’s critical to consider the varied modalities your organization requires. The “solution” should not be one that’s built from a collection of point solutions. For this reason, many businesses are turning to authentication solutions that are built as a platform. This holistic solution is accommodating to different modalities, applications and form factors. It can also control the authentication and credential management lifecycle. In this session, the experts from HID® Global will:

  • Address the most common challenges and concerns for enterprise organizations attempting to streamline authentication
  • Detail the intricacies of the authentication lifecycle
  • Help you identify what to look for in an authentication platform that meets your organization’s needs
Mar 10, 2021
4:05pm - 4:35pm (Central)
LogRhythm | MITRE ATT&CK with LogRhythm | Michael McGinnis, Senior Security Engineer

Over the past 15 years, the IT industry has been looking for a unified methodology to address security within organizations.  Many different methodologies have been proposed and published, but not until the arrival of the MITRE ATT&CK framework has the entire IT community collectively agreed that “this is the way”.  What sets the MITRE ATT&CK framework from others is its community approach to addressing security from a perspective of Tactics and Techniques.  In this webinar, we are going to discuss how leveraging the LogRhythm platform along with the MITRE ATT&CK framework will not just increase your security posture, but also align your organization to the top framework in the industry.

Mar 10, 2021
4:35pm - 4:55pm (Central)
Darktrace | How Cyber AI Detects Digital Fakes and Impersonation Attacks | Dan Fein, Director of Email Security Products

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session.

Mar 10, 2021
4:55pm - 5:10pm (Central)
Closing Remarks | Prize Winners Announced