Agenda

Date and TimeTitle
Jul 7, 2021
8:00am - 8:03am (Pacific)
Opening Introductions
Jul 7, 2021
8:03am - 8:55am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
8:55am - 9:00am (Pacific)
Session Kickoff with Kim Hakim
Jul 7, 2021
9:00am - 9:30am (Pacific)
Recorded Future | 5 Ways to Optimize Your SOC | Jamie Zajac, Vice President of Product

As more and more businesses adopt a SOC team for managing operations, the scope of work for SOC managers and operators continually grows. More sources, more events, and higher expectations. In this session, Jamie Zajac, VP of Product at Recorded Future will speak to 5 ways you can optimize your SOC, emphasizing changes you can make that don’t require you to buy new tools promising to be a silver bullet.

 
Jul 7, 2021
9:30am - 10:00am (Pacific)
Darktrace | The Battle of Algorithms: How AI is beating AI at its own game | Marcus Fowler, Director of Strategic Threat

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

In this session, discover:

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
  • Why defensive AI technologies are uniquely positioned to fight back
Jul 7, 2021
10:00am - 10:15am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
10:15am - 11:15am (Pacific)
Keynote | No More Kicking the Can Down the Road – Five Things We Have to Finally Grapple With | William Lidster, Ph.D., Chief Information Security Officer, AAA Washington

Keynote will discuss the five things security just has to get in front of.

  1. Breach Detection and Response Technologies – Vendor Focus
  2. IoT Security – Developers
  3. Supply Chain Security – Business (with security advising/supporting0
  4. Risk Management and Communication – CISOs
  5. Protecting Operational Technology – Everyone
Jul 7, 2021
11:15am - 11:30am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
11:30am - 11:50am (Pacific)
BeyondTrust | 10 Key Components for A Successful 2021 PAM Strategy | Christopher Hills, Deputy Chief Technology Officer

2021 is here and many security and IT professionals are faced with the same question: What will the new workforce look like from a people perspective and what security implications do I need to look out for?

Join BeyondTrust to get the winning recipe of how to enable the long-term PAM success. BeyondTrust’s Deputy CTO, Chris Hills will discuss 10 key considerations for building your 2021 PAM strategy that will enable you to be more efficient and secure while effectively supporting employees in the year(s) ahead.

Join this session to learn about:

  • The evolution of PAM digital security
  • 3 pillars of Privileged Access Management
  • 10 must-haves for a successful PAM strategy
Jul 7, 2021
11:50am - 12:00pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
12:00pm - 1:02pm (Pacific)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | DJ Sampath | Jonathan Kimmitt | Brian Grayek | William Lidster, Ph.D.

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Jul 7, 2021
1:00pm - 1:15pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
1:15pm - 1:40pm (Pacific)
LogRhythm | MITRE ATT&CK and LogRhythm | Michael McGinnis, Senior Security Engineer
Jul 7, 2021
1:40pm - 2:05pm (Pacific)
Veeam | 5 Lessons Learned Fighting Ransomware | Rick Vanover Senior Director of Product Strategy | Karinne Bessette Technologist, Product Strategy

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam

 
Jul 7, 2021
2:05pm - 2:07pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
2:07pm - 2:20pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
2:20pm - 2:50pm (Pacific)
AttackIQ | Continuous Security Validation: Exercise Your Environment more than the Adversary | Jose Barajas, Technical Director, North America

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise

 
Jul 7, 2021
2:50pm - 3:17pm (Pacific)
Code42 | Insider Risk Management: The alternative to traditional data protection is here! | Tommy Todd, Vice President of Security
We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.
Jul 7, 2021
3:17pm - 3:35pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
3:35pm - 4:05pm (Pacific)
ReversingLabs | The Malware Lab: Rethinking Enterprise File Analysis | Chip Epps, Director of Product & Solutions

Cyberthreats represent one of the most significant risks to modern businesses. Malware is pervasive; embedded in videos, hidden in software updates, and uploaded by unsuspecting customers. Yet the tools to investigate these threats are often manual and burdensome to maintain. Organizations recognize these challenges, but simply don’t know how to get started.

This session is a great opportunity to hear about a growing trend from one of ReversingLabs experts, Chip Epps. Chip will discuss centralizing the challenging tasks of investigating files and providing actionable intelligence to the entire organization. Some other areas of focus include:

  • Streamlining file analysis and making security more responsive and proactive
  • Why centralizing malware research into an enterprise “Malware Lab” is both efficient and effective
  • How to benefit all lines of business and reduce cyber risks
Jul 7, 2021
4:05pm - 4:10pm (Pacific)
Sponsor Prize Drawing with Kim Hakim

Must be in attandence to win 

 
Jul 7, 2021
4:10pm - 4:35pm (Pacific)
Red Canary | 5 Critical Pillars of the SOC of the Future | Chris Abbey, Incident Handling Manager

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Jul 7, 2021
4:35pm - 5:00pm (Pacific)
RangeForce | Building and Maintaining an Effective Cyber Range | Ben Langrill, Director of Solutions Engineering
Jul 7, 2021
5:00pm - 5:10pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 7, 2021
5:10pm - 5:15pm (Pacific)
Closing Remarks | Prize Drawing Winners Announced