Date and Time | Title | |
---|---|---|
Jun 30, 2021 8:00am - 8:03am (Central) | Opening Introductions | |
Jun 30, 2021 8:03am - 8:55am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 8:55am - 9:30am (Central) | SentinelOne | What Elon Musk and SpaceX Can Teach Us About Ransomware and Cybersecurity | Morgan Wright Cyberterrorism and Cybercrime Analyst, Fox News Chief Security Advisor, SentinelOne As a kid I always assumed that when you shot a rocket into space, other than the capsule, all the other parts burned up on re-entry into the atmosphere. Elon Musk asked why couldn’t you just reuse the rocket? And SpaceX was launched. To change cybersecurity, we have to change our mindset. In 30 minutes I will challenge conventional thinking, proverbial wisdom, and ask a new question. | |
Jun 30, 2021 9:30am - 10:02am (Central) | Bitdefender | Modern Security Programs – IT Evolution to Security Revolution | Daniel Clayton VP, Global Services and Support The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees. What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule. Join us to learn how MDR can help accelerate your movement up the security maturity curve, allowing your security team to focus on strategic priorities rather than chasing down alerts while delivering strategic insights to your business leaders–ultimately building a Modern Security Program that can meet the needs of the IT Revolution. | |
Jun 30, 2021 10:00am - 10:15am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 10:15am - 11:15am (Central) | Keynote | Data Security | Nish Majmudar, Deputy CISO, Director Of Information Security Engineering FEPOC CareFirst, BlueCross BlueShield | |
Jun 30, 2021 11:15am - 11:20am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 11:20am - 11:50am (Central) | Okta | CIAM in an Uncertain World | Keith Casey, API Problem Solver | |
Jun 30, 2021 11:50am - 11:55am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 11:55am - 1:05pm (Central) | Panel | “Cybersecurity Leaders on Preventing the Next Big Attack” | Chris Kubic | Craig Harber | Norman Kromberg | Morgan Wright Over the past year, we’ve seen unprecedented cyber-attacks from sophisticated threat actors. Just in the last 3 months, the security world is still grappling with the after-effects of major breaches like Scripps, Colonial Pipeline, and JBS Meatpacking Plant. With this new level of cyber activity, what can organizations do to better prepare, defend, and respond to these ever-increasing threats? In this panel, moderated by Fidelis Cybersecurity’s CCSO Craig Harber, security experts including Chris Kubic, CISO at Fidelis, Norman Kromberg, CISO at SouthernCarlson, Inc., and Morgan Wright, Cyberterrorism and Cybercrime Analyst, Fox News and | |
Jun 30, 2021 1:00pm - 1:15pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 1:15pm - 1:45pm (Central) | Darktrace | The Battle of Algorithms: How AI is beating AI at its own game | Marcus Fowler, Director of Strategic Threat Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike. In this session, discover:
| |
Jun 30, 2021 1:45pm - 2:15pm (Central) | Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist In this webinar you will learn:
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint. However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold. | |
Jun 30, 2021 2:15pm - 2:30pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 2:30pm - 2:50pm (Central) | Guardicore | Winning Against Ransomware | Igor Livshitz, Senior Director of Product Management | |
Jun 30, 2021 2:50pm - 3:20pm (Central) | Axonius | Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-Pandemic | Nathan Burke, CMO The pandemic — with it’s overnight switch to work-from-home and the resulting challenges from going remote — drove more IT complexity across cybersecurity than ever before. In fact, IT and security professionals across the globe cite a whopping 77% increase in complexity over the last two years, according to new research from Enterprise Strategy Group (ESG) and Axonius. In this session, Nathan Burke of Axonius, takes a deep dive into the findings from the report, “Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities.” He’ll share key trends — like how 55% of IT and cybersecurity pros cite remote workers as the leading cause of complexity (up over 30% from last year), driving plans to increase investments in asset inventory for 82% of organizations. Join “Where Do We Go From Here?: Global Survey Reveals Security Priorities Post-pandemic” to learn:
| |
Jun 30, 2021 3:20pm - 3:35pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 3:35pm - 4:00pm (Central) | Red Canary | 5 Critical Pillars of the SOC of the Future | Chris Abbey, Incident Handling Manager This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future. | |
Jun 30, 2021 4:00pm - 4:05pm (Central) | Sponsor Prize Drawing with Kim Hakim Must be in attandence to win | |
Jun 30, 2021 4:05pm - 4:30pm (Central) | Reciprocity | Achieving New Levels of Efficiency, Automation, & Visibility in Third-Party Risk Management | Scott McCormick, CISO | Rob Ellis Senior Vice President | Jenny Victor Vice President of Marketing Whether a start-up or an enterprise, you are probably working with multiple vendors, using their software and reliant on their systems. Yet while these external vendors provide invaluable services, they also introduce significant risk to your company’s information security. How do you know if your vendors are meeting required contractual, security and privacy obligations? If you don’t have processes in place to assess the risks these third parties pose, then your answer is most likely you don’t. And this is critical: You need to know the risks of working with third parties and that you can trust them — because if they go down, your business may, too. Assessing risk, however, can be incredibly complex. Traditional risk management approaches that rely on manual processes, spreadsheets and even survey methods don’t scale well and are not automated enough. And they certainly can’t support a third-party vendor network once it reaches a certain size: spreadsheets and email folders become overwhelming, ad hoc processes and reporting cycles create confusion, and manual reviews lead to missed issues and trends. In fact, the more successful an organization is – and the more third-party vendors they work with – the more automation and continuous monitoring are required. | |
Jun 30, 2021 4:30pm - 4:50pm (Central) | BlackBerry | Artificial Intelligence (AI) in Cybersecurity Present and Future Role | Tony Lee Vice President, Global Services Technical Operations | |
Jun 30, 2021 4:50pm - 5:10pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 30, 2021 5:10pm - 5:15pm (Central) | Closing Remarks | Prize Drawing must be in attendance to win |