Date and Time | Title | |
---|---|---|
Mar 18, 2021 9:00am - 9:35am (Pacific) | Check Point | How Non-Integrated Solutions Challenge Overall Enterprise Security: Defining the modern cyber security architecture | Grant Asplund, Chief Cyber Security Evangelist The stakes have never been higher for organizations to get cyber security right. There are many forces driving this sense of urgency: companies adding new cloud platforms, products, geographic regions, apps and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped and under budget. In this session, we will discuss how businesses of all sizes can adopt a modern approach to cyber security with a consolidated architecture that fully automates preventing attacks before enterprise systems can be breached. | |
Mar 18, 2021 9:40am - 10:15am (Pacific) | Micro Focus | Cybersecurity and cyber resilience: It's an evolution | Eric Popiel, Cybersecurity Strategist/Evangelist, Security, Risk and Governance Cyber security and cyber resilience are often used interchangeably. While they are related, they’re far from being synonyms, and it’s crucial for everyone to understand the difference. In practical terms, a cyber-resilient organization assumes that at some point it will be successfully attacked. We must adapt to this reality and still enable the business to operate. Eric will get into the distinctions between what we know and how we can evolve to a more resilient state. | |
Mar 18, 2021 10:25am - 11:30am (Pacific) | Keynote | SolarWinds - What’s Coming Next | Morgan Wright, Chief Security Advisor, SentinelOne, Cyberterrorism and Cybercrime Analyst, Fox News Not everyone was a victim of the SolarWinds attack, but everyone will be impacted by it. The recent Senate Select Intelligence Committee hearings gave insight as to what’s coming next in regulations and legislation. Will there be mandatory breach reporting? Will immediate threat sharing be required? See what’s coming next and how it will impact you. | |
Mar 18, 2021 11:40am - 12:00pm (Pacific) | Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes. | |
Mar 18, 2021 12:05pm - 1:05pm (Pacific) | CISO Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | Laureen Smith, VP Global Strategic Alliances, Accellion | Jason Lewkowicz, Global Chief Information Security Officer, Cognizant | Pedro Serrano, Chief Information Secur Hear from cybersecurity leaders and experts on:
| |
Mar 18, 2021 1:20pm - 1:55pm (Pacific) | SentinelOne | Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware | Jared Phipps, Senior Vice President Worldwide Sales Engineering A look into the blurred lines of Nation State and Cybercrime actors and how the Insurance industry is fueling a massive growth in this attack vector. | |
Mar 18, 2021 1:55pm - 2:25pm (Pacific) | Reciprocity | The Art of Compliance: How to build a defensible compliance program | Rob Ellis, Senior Vice President & Scott McCormick, Chief Information Security Officer When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources. But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it. Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps. Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization. During this event they will discuss:
| |
Mar 18, 2021 2:35pm - 3:05pm (Pacific) | ExtraHop | Talking to the Board About the New Realities of IT Security | Jeff Costlow, Deputy CISO When attacks make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? CISOs must be prepared to lead board-level conversations about risk management amidst the stark new realities of IT. Join this virtual boardroom to discuss:
| |
Mar 18, 2021 3:05pm - 3:30pm (Pacific) | Digital Shadows | Initial Access Brokers: A Deep Dive | Christopher Morgan, Senior Cyber Threat Intelligence Analyst | |
Mar 18, 2021 3:40pm - 4:10pm (Pacific) | One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist | |
Mar 18, 2021 4:10pm - 4:40pm (Pacific) | Recorded Future | Review of The Most Widely Used Malicious Command & Control Infrastructure | Greg Lesnewich, Threat Intelligence Analyst Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes “suspicious” hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you’d imagine. In this session, Recorded Future has some fresh insight to keep you up to speed. This will include a first-look at the novel indicators and intelligence not otherwise available in the public domain. Get an inside look into:
| |
Mar 18, 2021 4:40pm - 5:00pm (Pacific) | Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | |
Mar 18, 2021 5:00pm - 5:15pm (Pacific) | Closing Remarks | |
Mar 24, 2021 12:48pm - 1:48pm (Pacific) | Test Zoom | |
Mar 25, 2021 1:40pm - 2:40pm (Pacific) | Sumulive Test |