Agenda

Date and TimeTitle
Apr 21, 2021
8:00am - 8:05am (Central)
Opening Introductions | Start the Event Game!
Apr 21, 2021
8:05am - 8:55am (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
8:55am - 9:00am (Central)
Session Kickoff with Kim Hakim
Apr 21, 2021
9:00am - 9:30am (Central)
Exabeam | Why SOC’s Fail: The Maturity Model Required for Cyber Resiliency | Stephen Moore, Vice President and Chief Security Strategist & Luke Voigt, Vice President, Customer Success

Billions of dollars are spent annually to set up SOCs across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are SOCs failing? Listen as Exabeam’s Steve Moore and Luke Voigt talk about why SOCs always fail when built under the current operating model. And what to do to make SOCs more cyber resilient using a simple maturity model based on outcomes and use cases.

Key Learnings:

  • Why an outcome-based approach is the only way for SOCs to offer effective coverage and protection for your organization
  • How the most successful SOCs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
  • Why it is critical for Security Operations (SecOps) to become more use case-driven and full lifecycle workflow orientated
  • Lastly, learn about a new simple framework and maturity model that will help your organization approach SOCs the right way
Apr 21, 2021
9:30am - 10:03am (Central)
Red Canary | 5 Critical Pillars for the SOC of the Future | Keith McCammon, Chief Security Officer & Co-Founder

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Apr 21, 2021
10:00am - 10:15am (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
10:15am - 11:25am (Central)
Keynote | "The Biggest Breaches and What They Mean for the Future of Cybersecurity" | Dr. Neil Daswani, Director, Stanford University Advanced Security

This talk covers the key lessons learned and root causes from the biggest mega-breaches over the past several years, and analyzes their correlation to the over $45 billion invested in cybersecurity thus far.   Based on hard data of over 4,000 cybersecurity companies that have been funded thus far, and what they have focused on to-date, some hypotheses on where future investment is required will be presented.  Whether you’re interested in how your current company is positioned for the future of cybersecurity, considering a job change, or even potentially starting a cybersecurity company yourself, this talk will arm you with the information that you need about the security landscape, both on the business and technology fronts.  Future trends in cybersecurity will also be discussed.

 
Apr 21, 2021
11:15am - 11:30am (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
11:30am - 11:50am (Central)
Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Apr 21, 2021
12:00pm - 1:05pm (Central)
CISO Panel | “The Race to Secure Your Supply Chain” | Laureen Smith VP Global Strategic Alliances | Helen Mohrmann CISO | John L. Sullivan Global CISO and Resiliency Officer | Jason Lewkowicz Global CISO

Join this panel of industry experts for tips on how to implement a third-party risk management program and reduce your exposure to a supply chain breach.

 
Apr 21, 2021
1:00pm - 1:15pm (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
1:15pm - 1:45pm (Central)
Blumira | Building Intentional Security in a Time of Complexity | Matthew Warner, CTO & Co-Founder

The information security industry has hit an inflection point of complexity at the same time as ransomware is rising to become a $20 billion industry for cybercriminals. Why is information security so hard? Why hasn’t it been solved yet? And what is a good approach to building an intentional security strategy in the midst of all this chaos? This session explores what exactly makes infosec so complicated, and how companies can start to solve those challenges through a positive and thoughtful security approach.

 
Apr 21, 2021
1:45pm - 2:17pm (Central)
Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

Apr 21, 2021
2:17pm - 2:30pm (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
2:30pm - 2:55pm (Central)
Illumio | Securing Apps in SDN & Hybrid-Cloud Environments | Nathanael Iversen, Chief Evangelist
Apr 21, 2021
2:55pm - 3:25pm (Central)
Crowdstrike | Securing the Cloud Control Plane - How to Make Security Predictable in the Cloud | Spencer Parker, Senior Director of Product Management & Sowmya Karmali, Director of Product Management

More than ever, organizations are grappling with how to secure cloud-native applications. Protecting these applications — a combination of containers, virtual machines, APIs and serverless functions — from development to runtime requires reworking the approach many organizations take toward security. In a new survey from Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.

Join CrowdStrike’s session to learn how to make security more predictable in the cloud. Spencer Parker and Sowmya Karmali will highlight best practices that DevOps and SecOps teams can employ to secure your applications in the cloud.

Attendees will:

  • Learn about cloud-native security challenges and how to prevent inconsistency, uncover misconfigurations and improve visibility
  • Understand the cloud-native threat landscape and the need for an integrated defense-in-depth strategy
  • See recommendations on how to enable a centralized approach to securing heterogeneous cloud-native applications deployed across distributed clouds
Apr 21, 2021
3:25pm - 3:40pm (Central)
Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
3:40pm - 4:10pm (Central)
ReversingLabs | The Malware Lab: Rethinking Enterprise File Analysis | Chip Epps, Director of Product & Solutions

Cyberthreats represent one of the most significant risks to modern businesses. Malware is pervasive; embedded in videos, hidden in software updates, and uploaded by unsuspecting customers. Yet the tools to investigate these threats are often manual and burdensome to maintain. Organizations recognize these challenges, but simply don’t know how to get started.

This session is a great opportunity to hear about a growing trend from one of ReversingLabs experts, Chip Epps. Chip will discuss centralizing the challenging tasks of investigating files and providing actionable intelligence to the entire organization. Some other areas of focus include:

  • Streamlining file analysis and making security more responsive and proactive
  • Why centralizing malware research into an enterprise “Malware Lab” is both efficient and effective
  • How to benefit all lines of business and reduce cyber risks
Apr 21, 2021
4:10pm - 4:20pm (Central)
Sponsor Networking Time | Sponsor Prize Drawing

must be in attendance to win

Apr 21, 2021
4:20pm - 4:40pm (Central)
Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products

Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues.

Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response.

In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done.

Find out how in this session.

Apr 21, 2021
4:40pm - 5:05pm (Central)
Tenable | Seeing the forest through the trees - A risked based approach to maturing your VMP | Rob Walk, Sr. Security Engineer
We will dive into how organizations are moving to a more risk-centric approach to their vulnerability management programs. Included will be practical tips and takeaways you can apply immediately to your own VM program.
 
Apr 21, 2021
5:05pm - 5:15pm (Central)
Last Chance | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with a sponsor for the chance to win a Nintendo Switch Lite

Apr 21, 2021
5:15pm - 5:25pm (Central)
Closing Remarks | Sponsor Prize Drawing