Agenda

Date and TimeTitle
Mar 18, 2021
9:00am - 9:35am (Pacific)
Check Point | How Non-Integrated Solutions Challenge Overall Enterprise Security: Defining the modern cyber security architecture | Grant Asplund, Chief Cyber Security Evangelist

The stakes have never been higher for organizations to get cyber security right. There are many forces driving this sense of urgency: companies adding new cloud platforms, products, geographic regions, apps and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped and under budget.

In this session, we will discuss how businesses of all sizes can adopt a modern approach to cyber security with a consolidated architecture that fully automates preventing attacks before enterprise systems can be breached.

Mar 18, 2021
9:40am - 10:15am (Pacific)
Micro Focus | Cybersecurity and cyber resilience: It's an evolution | Eric Popiel, Cybersecurity Strategist/Evangelist, Security, Risk and Governance

Cyber security and cyber resilience are often used interchangeably. While they are related, they’re far from being synonyms, and it’s crucial for everyone to understand the difference. In practical terms, a cyber-resilient organization assumes that at some point it will be successfully attacked. We must adapt to this reality and still enable the business to operate. Eric will get into the distinctions between what we know and how we can evolve to a more resilient state.

 
Mar 18, 2021
10:25am - 11:30am (Pacific)
Keynote | SolarWinds - What’s Coming Next | Morgan Wright, Chief Security Advisor, SentinelOne, Cyberterrorism and Cybercrime Analyst, Fox News

Not everyone was a victim of the SolarWinds attack, but everyone will be impacted by it. The recent Senate Select Intelligence Committee hearings gave insight as to what’s coming next in regulations and legislation. Will there be mandatory breach reporting? Will immediate threat sharing be required? See what’s coming next and how it will impact you.

 
 
Mar 18, 2021
11:40am - 12:00pm (Pacific)
Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Mar 18, 2021
12:05pm - 1:05pm (Pacific)
CISO Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | Laureen Smith, VP Global Strategic Alliances, Accellion | Jason Lewkowicz, Global Chief Information Security Officer, Cognizant | Pedro Serrano, Chief Information Secur

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Mar 18, 2021
1:20pm - 1:55pm (Pacific)
SentinelOne | Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware | Jared Phipps, Senior Vice President Worldwide Sales Engineering

A look into the blurred lines of Nation State and Cybercrime actors and how the Insurance industry is fueling a massive growth in this attack vector.
The latest threat intel & analysis of ransomware campaigns and how this can be used to shape your cybersecurity strategy
Stories from recent Incident Response (IR) engagements doing eradication of Ransomware including payment negotiations & IR strategies and limitations of EDR
How to block the most advanced attacks before they can become a breach or even an incident.

Mar 18, 2021
1:55pm - 2:25pm (Pacific)
Reciprocity | The Art of Compliance: How to build a defensible compliance program | Rob Ellis, Senior Vice President & Scott McCormick, Chief Information Security Officer

When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources.

But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it.

Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps.

Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization.

During this event they will discuss:

  • Moving to a zero-trust model
  • Why certifications are just the start
  • How automation future-proofs for change
  • Reframing the narrative from a cost center to profit protector/business enabler

Mar 18, 2021
2:35pm - 3:05pm (Pacific)
ExtraHop | Talking to the Board About the New Realities of IT Security | Jeff Costlow, Deputy CISO

When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT.

Join this virtual boardroom to discuss:

  • Achieving alignment across the board
  • Building a “roadmap to yes”
  • Focusing on risk and reward for core business objectives
Mar 18, 2021
3:05pm - 3:30pm (Pacific)
Digital Shadows | Initial Access Brokers: A Deep Dive | Christopher Morgan, Senior Cyber Threat Intelligence Analyst
Mar 18, 2021
3:40pm - 4:10pm (Pacific)
One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD.  Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.
 
Mar 18, 2021
4:10pm - 4:40pm (Pacific)
Recorded Future | Review of The Most Widely Used Malicious Command & Control Infrastructure | Greg Lesnewich, Threat Intelligence Analyst

Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes “suspicious” hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you’d imagine. In this session, Recorded Future has some fresh insight to keep you up to speed. This will include a first-look at the novel indicators and intelligence not otherwise available in the public domain. Get an inside look into:

  • Key 2020 findings related to over 10,000 unique command and control servers, across more than 80 families
  • Best practices for proactive detection, ongoing monitoring, and defense-in-depth approaches to adversary infrastructure
  • The 2021 outlook for C2s, and what you can do to stay ahead
Mar 18, 2021
4:40pm - 5:00pm (Pacific)
Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.

Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response.

In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.

Find out how in this session.

 
Mar 18, 2021
5:00pm - 5:15pm (Pacific)
Closing Remarks
Mar 24, 2021
12:48pm - 1:48pm (Pacific)
Test Zoom
Mar 25, 2021
1:40pm - 2:40pm (Pacific)
Sumulive Test