Date and Time | Title | |
---|---|---|
May 26, 2021 8:00am - 8:05am (Eastern) | Opening Introductions | Start the Event Game! | |
May 26, 2021 8:05am - 8:55am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 8:55am - 9:00am (Eastern) | Session Kickoff with Kim Hakim | |
May 26, 2021 9:00am - 9:28am (Eastern) | Check Point | Stay Ahead – Prep and Protect Your Enterprise for a Post-Pandemic World | Brian Linder, Emerging Threats Expert and Evangelist | |
May 26, 2021 9:28am - 9:32am (Eastern) | Announcements with Kim Hakim | |
May 26, 2021 9:32am - 10:00am (Eastern) | Recorded Future | A Not So Happy Hour - Why Scammers Have Wine Drinkers Over a Barrel | Allan "Ransomware Sommelier" Liska, Senior Security Architect As the COVID-19 pandemic forced lockdowns around the world many people took to virtual happy hours to stay connected with friends, family and colleagues. The birth of virtual happy hours led to a sharp rise in the number of wine-themed domains being registered. As usual, scammers were quick to notice this trend and jumped on it, significantly increasing the number of malicious wine-themed domains registered as well. This presentation discusses the trends in malicious wine-themed domains, who was being targeted and how organizations can protect themselves. | |
May 26, 2021 10:00am - 10:15am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 10:15am - 11:18am (Eastern) | Keynote | “Talking to vendors is like dating, how both sides can better communicate to be more successful.” | Rick Doten, VP, Information Security at Centene Corporation, CISO, Carolina Complete Health | |
May 26, 2021 11:15am - 11:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 11:30am - 11:50am (Eastern) | Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes. | |
May 26, 2021 11:50am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 12:00pm - 1:10pm (Eastern) | Panel | "Incident Response Best Practices" | Laureen Smith, VP Global Strategic Alliances | Kareem Briggs, Chief Information Security Officer | Jonathan Fowler, Chief Information Security Officer | Jonathan Kimmitt, Chief Information Security Officer Hear from cybersecurity leaders and experts on:
| |
May 26, 2021 1:00pm - 1:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 1:15pm - 1:40pm (Eastern) | Axonius | Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic | Nathan Burke, CMO The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before. In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius. In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.” He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations. Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:
| |
May 26, 2021 1:40pm - 2:10pm (Eastern) | Digital Shadows | 2021: The Year of Third-Party Risk | Alec Alvarado, Threat Intelligence Manager Join Digital Shadows Threat Intelligence Manager, Alec Alvarado, as he dives into trends and incidents associated with third-party risk so far this year. In this session we’ll cover:
Forecasting for the future and how to mitigate these types of risks | |
May 26, 2021 2:10pm - 2:25pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 2:25pm - 2:40pm (Eastern) | Veeam | 5 Lessons Learned Fighting Ransomware | Rick Vanover, Senior Director of Product Strategy | Karinne Bessette, Technologist, Product Strategy There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam | |
May 26, 2021 2:40pm - 3:10pm (Eastern) | Reciprocity | The Art of Compliance: How to build a defensible compliance program | Scott McCormick, Chief Information Security Officer | Rob Ellis, Senior Vice President When it comes to doing business, being compliant is table stakes. Aside from the obvious necessity of a regulatory framework, it also helps foster a culture of compliance and ethics across your organization — an imperative for minimizing the potential risks and exposures from internal and external sources. But not all compliance programs are created equal. There’s a big difference between check-the-box annual or biannual compliance and defensible compliance, which empowers organizations to quickly and accurately understand the data they control, where it exists and how to properly secure, access, and manage it. Yet elevating GRC defensibility doesn’t have to be dauntingly complex. In fact, it can be as simple as leveraging a fully integrated and automated technology solution and taking five key steps. Join Reciprocity CISO Scott McCormick and SVP of Sales Rob Ellis as they break down what defensible compliance is, why you need it, and how to build GRC defensibility in your organization. During this event they will discuss:
| |
May 26, 2021 3:10pm - 3:25pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 3:25pm - 3:55pm (Eastern) | Sonatype | Rise of the Software Supply Chain Attacks | Brian Fox, Co-Founder and CTO | |
May 26, 2021 3:55pm - 4:00pm (Eastern) | Sponsor Prize Drawing with Kim Hakim must be in attendance to win | |
May 26, 2021 4:00pm - 4:30pm (Eastern) | Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist In this webinar you will learn:
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint. However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold. | |
May 26, 2021 4:30pm - 5:00pm (Eastern) | Forgerock | Identity Cloud Checklist | Chaitanya Yinti, Sr. Director | |
May 26, 2021 5:00pm - 5:10pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2021 5:10pm - 5:20pm (Eastern) | Closing Remarks | Sponsor Prize Drawing |