Date and Time | Title | |
---|---|---|
Jun 9, 2021 8:00am - 8:03am (Pacific) | Opening Introductions | |
Jun 9, 2021 8:03am - 8:55am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 8:55am - 9:00am (Pacific) | Session Kickoff with Kim Hakim | |
Jun 9, 2021 9:00am - 9:30am (Pacific) | Code42 | Insider Risk Management: The alternative to traditional data protection is here! | Tommy Todd, Vice President of Security We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling. | |
Jun 9, 2021 9:30am - 10:00am (Pacific) | HackEDU | How to use your vulnerabilities to train your developers on security | Jared Ablon, CEO The idea of secure coding training that covers just what you need, right when you need it, seems too good to be true. But it’s not. This webinar will reveal the most common vulnerabilities developers cause, and guide you on how to set up a secure coding training program that uses your vulnerabilities to improve your application security. | |
Jun 9, 2021 10:00am - 10:15am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 10:15am - 11:15am (Pacific) | Keynote | "Cognitive Malware - A Convergence Between Thought, Information Processing and Manipulation." | Michael Manrod, Chief Information Security Officer, Grand Canyon Education, Inc. | |
Jun 9, 2021 11:15am - 11:30am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 11:30am - 11:55am (Pacific) | Red Canary | 5 Critical Pillars of the SOC of the Future | Chris Abbey, Incident Handling Manager This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future. | |
Jun 9, 2021 11:55am - 12:05pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 12:05pm - 1:05pm (Pacific) | Panel | “CISO Transforming the Risk Agenda, and What’s Ahead” | Debbie Christofferson | Alex Wood | Kim Jones | Lanita Collette | Richard Greenberg The digital frontier, cybercrime, and global business dependency on having a protected infrastructure, means CISOs need to get it right. Defining what that means, in a complex, evolving technology environment with endless challenges takes the measure of a security leader and their team. These executive leaders will share their success strategies to support the business in a high stress field: How the role evolves in security threats, support to address them, plus career evolution, succession and planning.
| |
Jun 9, 2021 1:05pm - 1:20pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 1:20pm - 1:50pm (Pacific) | Onelogin | Extortionware: Your Privacy Problems Made Public | Lonnie Benavides, Head of Infrastructure and Application Security | |
Jun 9, 2021 1:50pm - 2:15pm (Pacific) | Veeam | 5 Lessons Learned Fighting Ransomware | Rick Vanover, Senior Director of Product Strategy | Karinne Bessette, Technologist, Product Strategy There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam | |
Jun 9, 2021 2:15pm - 2:30pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 2:30pm - 3:00pm (Pacific) | LogRhythm | Ransomware | Richard Bakos, Sales Engineering Director As the threat landscape continues to grow Ransomware has evolved to become a formidable weapon. Despite its evolution Ransomware attack methods remain largely unchanged. Today we’ll look at how ransomware has grown in recent history and discuss a few ways to help you mitigate risk. | |
Jun 9, 2021 3:00pm - 3:30pm (Pacific) | Malwarebytes | 2021 State of Malware | Michael Greer, Senior Engineer Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.Join us to learn how cybercrime evolved in 2020, and identify ways to safeguard your organization against what’s out there.We’ll explore:
| |
Jun 9, 2021 3:30pm - 3:45pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 3:45pm - 4:05pm (Pacific) | Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | |
Jun 9, 2021 4:05pm - 4:10pm (Pacific) | Sponsor Prize Drawing with Kim Hakim must be in attendance to win | |
Jun 9, 2021 4:10pm - 4:40pm (Pacific) | Foregrock | Identity Cloud Checklist | Chaitanya Yinti, Sr. Director | |
Jun 9, 2021 4:40pm - 5:00pm (Pacific) | Pcysys | Stay Ahead of the Hacker with Continuous Security Testing | Sion Retzkin, Head of Knowledge Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:
| |
Jun 9, 2021 5:00pm - 5:10pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 9, 2021 5:10pm - 5:15pm (Pacific) | Closing Remarks | Sponsor Prize Drawing |