Agenda

Date and TimeTitle
Jun 30, 2021
8:00am - 8:03am (Central)
Opening Introductions
Jun 30, 2021
8:03am - 8:55am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
8:55am - 9:30am (Central)
SentinelOne | What Elon Musk and SpaceX Can Teach Us About Ransomware and Cybersecurity | Morgan Wright Cyberterrorism and Cybercrime Analyst, Fox News Chief Security Advisor, SentinelOne

As a kid I always assumed that when you shot a rocket into space, other than the capsule, all the other parts burned up on re-entry into the atmosphere. Elon Musk asked why couldn’t you just reuse the rocket? And SpaceX was launched. To change cybersecurity, we have to change our mindset. In 30 minutes I will challenge conventional thinking, proverbial wisdom, and ask a new question.

 
Jun 30, 2021
9:30am - 10:02am (Central)
Bitdefender | Modern Security Programs – IT Evolution to Security Revolution | Daniel Clayton VP, Global Services and Support

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Join us to learn how MDR can help accelerate your movement up the security maturity curve, allowing your security team to focus on strategic priorities rather than chasing down alerts while delivering strategic insights to your business leaders–ultimately building a Modern Security Program that can meet the needs of the IT Revolution.

Jun 30, 2021
10:00am - 10:15am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
10:15am - 11:15am (Central)
Keynote | Data Security | Nish Majmudar, Deputy CISO, Director Of Information Security Engineering FEPOC CareFirst, BlueCross BlueShield
Jun 30, 2021
11:15am - 11:20am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
11:20am - 11:50am (Central)
Okta | CIAM in an Uncertain World | Keith Casey, API Problem Solver
In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner.  That is where customer identity and access management come in or “CIAM”. A CIAM solution must not only meet today’s security and compliance standards but also create frictionless customer experiences to meet customers where they are and in the ways they need.  Join our sessions as we discuss CIAM in more detail, how priorities have shifted this year and what CIAM maturity looks like.
 
Jun 30, 2021
11:50am - 11:55am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
11:55am - 1:05pm (Central)
Panel | “Cybersecurity Leaders on Preventing the Next Big Attack” | Chris Kubic | Craig Harber | Norman Kromberg | Morgan Wright

Over the past year, we’ve seen unprecedented cyber-attacks from sophisticated threat actors. Just in the last 3 months, the security world is still grappling with the after-effects of major breaches like Scripps, Colonial Pipeline, and JBS Meatpacking Plant. With this new level of cyber activity, what can organizations do to better prepare, defend, and respond to these ever-increasing threats?  

In this panel, moderated by Fidelis Cybersecurity’s CCSO Craig Harber, security experts including Chris Kubic, CISO at Fidelis, Norman Kromberg, CISO at SouthernCarlson, Inc., and Morgan Wright, Cyberterrorism and Cybercrime Analyst, Fox News and
Chief Security Advisor, SentinelOne, 
will discuss strategies they have or plan to adopt to better defend their enterprise environments from the next big attack.  

Jun 30, 2021
1:00pm - 1:15pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
1:15pm - 1:45pm (Central)
Darktrace | The Battle of Algorithms: How AI is beating AI at its own game | Marcus Fowler, Director of Strategic Threat

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

In this session, discover:

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
  • Why defensive AI technologies are uniquely positioned to fight back
Jun 30, 2021
1:45pm - 2:15pm (Central)
Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist

In this webinar you will learn:

  • How to maximize existing security controls, security capabilities, and investments
  • Pragmatic application of zero-trust principles to traditional and SaaS environments
  • What’s new in tactics and strategies for protecting hybrid environments

Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint.

However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold.

 
Jun 30, 2021
2:15pm - 2:30pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
2:30pm - 2:50pm (Central)
Guardicore | Winning Against Ransomware | Igor Livshitz, Senior Director of Product Management
Igor Livshitz will share real (and daily) experience with helping customers hit by ransomware. Join us to hear how an attack looks like in real life, how incident response teams deal with it, and what can be learned from helping multiple customers to recover from ransomware breach. We will also discuss how efficiently applied segmentation can help your organization be better prepared if and when ransomware tries to go after you.
 
Jun 30, 2021
2:50pm - 3:20pm (Central)
Axonius | Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic | Nathan Burke, CMO

The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before.

In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius.

In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.”

He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations.

Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:

  • How security teams are transforming policy and infrastructure post-pandemic
  • Key strategies security teams are using as employees return to the office for the first time in over a year
  • Why security teams are prioritizing automating asset inventories in 2021
Jun 30, 2021
3:20pm - 3:35pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
3:35pm - 4:00pm (Central)
Red Canary | 5 Critical Pillars of the SOC of the Future | Chris Abbey, Incident Handling Manager

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Jun 30, 2021
4:00pm - 4:05pm (Central)
Sponsor Prize Drawing with Kim Hakim

Must be in attandence to win 

Jun 30, 2021
4:05pm - 4:30pm (Central)
Reciprocity | Achieving New Levels of Efficiency, Automation, & Visibility in Third-Party Risk Management | Scott McCormick, CISO | Rob Ellis Senior Vice President | Jenny Victor Vice President of Marketing

Whether a start-up or an enterprise, you are probably working with multiple vendors, using their software and reliant on their systems. Yet while these external vendors provide invaluable services, they also introduce significant risk to your company’s information security.

How do you know if your vendors are meeting required contractual, security and privacy obligations?

If you don’t have processes in place to assess the risks these third parties pose, then your answer is most likely you don’t. And this is critical: You need to know the risks of working with third parties and that you can trust them — because if they go down, your business may, too.

Assessing risk, however, can be incredibly complex. Traditional risk management approaches that rely on manual processes, spreadsheets and even survey methods don’t scale well and are not automated enough. And they certainly can’t support a third-party vendor network once it reaches a certain size: spreadsheets and email folders become overwhelming, ad hoc processes and reporting cycles create confusion, and manual reviews lead to missed issues and trends. In fact, the more successful an organization is – and the more third-party vendors they work with – the more automation and continuous monitoring are required.

Jun 30, 2021
4:30pm - 4:50pm (Central)
BlackBerry | Artificial Intelligence (AI) in Cybersecurity Present and Future Role | Tony Lee Vice President, Global Services Technical Operations
Have you ever wondered about Artificial Intelligence (AI) in Cybersecurity? Maybe you are curious to know how it is currently being applied or how it might be applied in the future? Better yet, how AI relates to the current threat landscape and even your environment. If so, join us! Where we will break it all down and more. This is a zero to hero session so you don’t need a PhD in math or data science to enjoy the topic and learn something new.
 
Jun 30, 2021
4:50pm - 5:10pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 30, 2021
5:10pm - 5:15pm (Central)
Closing Remarks | Prize Drawing

must be in attendance to win