Agenda

Date and TimeTitle
Apr 8, 2021
9:00am - 9:30am (Eastern)
Code42 | Employees are not the Enemy: Insider Risk and Employee Trust in the Enterprise | Tommy Todd, Vice President of Security

As the evolution of working from home becomes a permanent part of the employee experience, security teams are rethinking how they address Insider Risk. Too often employees are perceived as the enemy by both the security organization and the tools they use due to a lack of trust. This “guilty until proven innocent” approach creates obstacles, which impede productivity and stifle healthy collaboration. The result is a “bypass culture”, wherein users intentionally circumvent security controls just to be able to do their job. By attending this session, executives and practitioners alike will learn how a “trust but verify” approach to insider risk can reduce data exposure events without disrupting the user experience.

 
Apr 8, 2021
9:35am - 10:05am (Eastern)
Stellar Cyber | SolarWinds Breach and Ransomware in 2021 | Snehal Contractor, Vice President Worldwide Systems Engineering & Technical Services

We’ll discuss how to gain visibility into your environment and vulnerabilities to detect them early and effectively and expand your defense beyond the perimeter through XDR to stay prepared for the next breach. Because it’s not if you get breached, it’s when.

What you’ll learn:

  • How hackers used highly evasive malware to compromise SolarWinds defenses.
  • Assessing your environment and determining vulnerability.
  • Finding and addressing lateral movement in your environment.
Apr 8, 2021
10:20am - 11:20am (Eastern)
Keynote | The CISO Dilemma – Changing our approach with the Executive suite and boardroom | James Azar, Chief Information Security Officer, Host of The CyberHub Podcast, CISO Talk

In the aftermath of SolarWinds and the recent Microsoft Exchange Zero days, CISO’s are under the gun to answer questions that few can answer effectively. The time has come to change our approach with executive leadership; in the era of a SaaS, IaaS and Cloud, we need to start having the right conversations and adjusting the expectations around security in the supply chain and within the leadership in our organizations. This talk will give real practical conversation points to take away and into the business right away.

 
Apr 8, 2021
11:30am - 12:03pm (Eastern)
Red Canary | 5 Critical Pillars for the SOC of the Future | Keith McCammon, Chief Security Officer & Co-Founder

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Apr 8, 2021
12:10pm - 1:12pm (Eastern)
Panel | "Is My Private Information on the Dark Web?" | Scott Schober, President and CEO | Bob Schiff, Founder & CEO | James R. LaPiedra, President and CEO | Andrew Garlick, CEO and Principal
Apr 8, 2021
1:25pm - 1:55pm (Eastern)
ManageEngine | Cybersecurity Backup Checklist | Sagay Joseph, Strategic Account Manager
Apr 8, 2021
1:55pm - 2:20pm (Eastern)
Blumira | How to Detect Common Threats Targeting Your Cloud Infrastructure | Patrick Garrity, VP of Operations

This unprecedented era of remote work has forced a rapid move to the cloud for many organizations. But that can leave critical gaps in detecting security threats in the cloud.
Join Patrick Garity, VP of Operations at Blumira for a discussion on common cloud security detections and how to detect threats targeting your cloud infrastructure.

In this talk, you’ll learn about:
-Different types of attacks targeting cloud infrastructure platforms like Microsoft Azure, Office 365, Okta, G Suite and Amazon Web Services
-Common vulnerabilities that may lead to a compromise
-How to properly detect cloud-related misconfigurations and potential threats to reduce your overall attack surface

Apr 8, 2021
2:30pm - 2:51pm (Eastern)
ColorTokens | Achieving Cyber Resilience through Zero Trust | Tony Scott Former, Federal CIO of The United States and ColorTokens Board Member
Apr 8, 2021
2:51pm - 3:23pm (Eastern)
Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

Apr 8, 2021
3:23pm - 3:35pm (Eastern)
Sponsor Networking Time | Book a demo with a sponsor for the chance to win your choice of: a Keurig Coffee Machine, a NutriBullet, a set of Steak Knives, a Moscow Mule Box, a Mixology Bartender Kit, or a $100 Visa

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with sponsors and be entered into our prize drawing for the chance to win your choice of: a Keurig Coffee Machine, a NutriBullet, a set of Jean Dubost Laguiole Steak Knives, a Moscow Mule Box, a Mixology Bartender Kit, or a $100 FutureCon Visa

 

Apr 8, 2021
3:35pm - 4:00pm (Eastern)
Illumio | Securing Apps in SDN & Hybrid-Cloud Environments | Nathanael Iversen, Chief Evangelist
Apr 8, 2021
4:00pm - 4:05pm (Eastern)
Sponsor Prize Drawing with Kim Hakim

must be in attendance to win 

Apr 8, 2021
4:05pm - 4:35pm (Eastern)
One Identity | Making Zero Trust Real | Dan Conrad, IAM Strategist
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD.  Elevated privileges in AD don’t usually fit into an Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.
 
Apr 8, 2021
4:35pm - 5:03pm (Eastern)
Malwarebytes | 2021 State of Malware | Adam Gates, Senior Sales Engineer
Apr 8, 2021
5:03pm - 5:23pm (Eastern)
Closing Remarks | Prize Drawing Winners Announced