Date and Time | Title | |
---|---|---|
Mar 31, 2021 9:00am - 9:20am (Eastern) | Blackberry | Artificial Intelligence (AI) in Cybersecurity Present and Future Role | Tony Lee, Vice President, Global Services Technical Operations Have you ever wondered about Artificial Intelligence (AI) in Cybersecurity? Maybe you are curious to know how it is currently being applied or how it might be applied in the future? Better yet, how AI relates to the current threat landscape and even your environment. If so, join us! Where we will break it all down and more. This is a zero to hero session so you don’t need a PhD in math or data science to enjoy the topic and learn something new. | |
Mar 31, 2021 9:30am - 10:05am (Eastern) | BeyondTrust | Zero Trust: Getting Least Privilege Right, Finally | Christopher Hills, Deputy Chief Technology Officer The more the traditional perimeter blurs or dissolves, the more zero trust comes into focus. At its core, zero trust aspires to eliminate persistent trust, and enforce continuous authentication, least privilege, and microsegmentation. This approach reduces the threat surface and also minimizes the threat windows during which attackers can inflict damage, helping to protect against everything from simple malware to advanced persistent threats. The reality is, for most organizations, achieving a 100% zero-trust state is a pipe dream. However, any implementation of zero trust controls should substantively help minimize your attack surface and cyber risk. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust. In this session we’ll explore: · What zero trust is and how NIST defines it · The goals of zero trust · Roadblocks to zero trust (legacy architectures and technologies) · How Privileged Access Management aligns with and enables zero trust If you’re ready to cut through zero trust myths and clearly grasp what it will take for you to improve zero trust security controls, and how your organization stands to benefit, don’t miss this session! | |
Mar 31, 2021 10:15am - 11:15am (Eastern) | Keynote | "Practical Security in an Impractical World" | Rex Tolman, Chief Information Security Officer, VP Information Security, Kforce | |
Mar 31, 2021 11:25am - 11:55am (Eastern) | KnowBe4 | Your Ransomware Hostage Rescue Guide | Erich Kron, Security Awareness Advocate, Technical Evangelist Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks. So, how can your organization avoid getting held hostage? Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware. In this webcast we will cover:
Don’t get held hostage by ransomware and become a statistic! | |
Mar 31, 2021 12:05pm - 1:08pm (Eastern) | Panel | "Privacy and the future of compliance and other issues of the New digital workforce" | Rebecca Herold, Founder and CEO | George Viegas, CISO and Privacy Champion | Ken Dawson, CIO & CISO | Jyotin Gambhir, CISO/CIO, Security/Privacy | |
Mar 31, 2021 1:20pm - 1:40pm (Eastern) | Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | |
Mar 31, 2021 1:40pm - 2:05pm (Eastern) | HID | Making the Case for Authentication as a Platform | Yves Massard, Product Marketing Director As organizations adopt advanced authentication practices, it’s critical to consider the varied modalities your organization requires. The “solution” should not be one that’s built from a collection of point solutions. For this reason, many businesses are turning to authentication solutions that are built as a platform. This holistic solution is accommodating to different modalities, applications and form factors. It can also control the authentication and credential management lifecycle. In this session, the experts from HID® Global will:
| |
Mar 31, 2021 2:20pm - 2:50pm (Eastern) | One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist | |
Mar 31, 2021 2:50pm - 3:20pm (Eastern) | Onelogin | Extortionware: Your Privacy Problems Made Public | Lonnie Benavides, Head of Infrastructure and Application Security | |
Mar 31, 2021 3:35pm - 3:55pm (Eastern) | PCYSYS | Stay Ahead of the Hacker with Continuous Security Testing | Sion Retzkin, Head of Knowledge Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
| |
Mar 31, 2021 3:55pm - 4:00pm (Eastern) | Sponsor Prize Drawing with Kim Hakim Must be in attendance to win! | |
Mar 31, 2021 4:00pm - 4:30pm (Eastern) | ForgeRock | Identity Cloud Checklist | Chaitanya Yinti, Sr. Director | |
Mar 31, 2021 4:30pm - 5:00pm (Eastern) | Corelight | Making the SOC more effective by enabling automation with better data | Alex Kirk, Global Principal, Suricata SOAR has been pitched to the industry as a way to resolve alert fatigue by automating common analyst workflows. Experience shows, however, that automation is only as good as the data that underlies it – so many people avoid SOAR, because of the complexity of getting “ready” for it. This talk will discuss open source Zeek as an approach for simplifying the acquisition of network data that’s directly applicable to SOAR, and the application of it through open source playbooks being released by Corelight. | |
Mar 31, 2021 5:00pm - 5:15pm (Eastern) | Closing Remarks | Sponsor Prize Drawing |