Agenda

Date and TimeTitle
Jul 28, 2021
8:00am - 8:03am (Eastern)
Opening Introductions
Jul 28, 2021
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
9:00am - 9:30am (Eastern)
ManageEngine | Warning:Cyber attacks ahead, what's your cybersecurity strategy? | Harish Sekar, Senior Evangelist
Jul 28, 2021
9:30am - 9:55am (Eastern)
Lumu | 7 Habits of Highly Effective Cybersecurity Operations | Ricardo Villadiego, Founder & CEO
Jul 28, 2021
9:55am - 10:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
10:15am - 11:21am (Eastern)
Keynote | “Protecting the Ecosystem from Supply Chain Attacks – We’re all in this Together!” | Dawn Cappelli, VP, Global Security and Chief Information Security Officer, Rockwell Automation
Jul 28, 2021
11:15am - 11:25am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
11:25am - 11:55am (Eastern)
Telos | The Need for Invisibility over the public Internet | Tom Badders, Sr Product Manager

Cyber security vulnerabilities are being leveraged by cyber criminals at an ever increase pace and level of sophistication, inflicting damage on networks and network resources world-wide.

Typical approaches to inhibiting these attacks have not resulted in the protection needed for critical asset security and privacy. With the expanded use of cloud computing and the significant move to remote operating environments, the public internet has become new enterprise network.  The internet was never designed for security.  Therefore, there is a need to look at novel approaches to eliminating the risk of operating on the internet. There is a need to make users, devices, information, and critical networks resources invisible on the public internet.

Jul 28, 2021
11:55am - 12:05pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
12:05pm - 1:15pm (Eastern)
Panel | “Cybersecurity Leaders and Experts on Current Cyberthreats and Practices” | Andy Swenson | Nish Majmudar | Keith McMenamin | Art Thompson

Hear from cybersecurity leaders and experts on:

  • Current cybersecurity threats and practices
  • Post-pandemic security
Jul 28, 2021
1:05pm - 1:20pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
1:20pm - 1:50pm (Eastern)
Recorded Future | 5 Ways to Optimize Your SOC | Jamie Zajac, Vice President of Product
As more and more businesses adopt a SOC team for managing operations, the scope of work for SOC managers and operators continually grows. More sources, more events, and higher expectations. In this session, Jamie Zajac, VP of Product at Recorded Future will speak to 5 ways you can optimize your SOC, emphasizing changes you can make that don’t require you to buy new tools promising to be a silver bullet.
Jul 28, 2021
1:50pm - 2:15pm (Eastern)
Veeam | 5 Lessons Learned Fighting Ransomware | Rick Vanover, Senior Director of Product Strategy | Karinne Bessette, Technologist, Product Strategy

There are many threats to your data. These threats can be intentional, accidental or downright malicious. In this session, see from the eyes of a leading backup provider (Veeam) what you can learn from organizations who have dealt with Ransomware. Product Strategy team members Rick Vanover and Karinne Bessette will show you a number of learnings over the years from our role here at Veeam

 
Jul 28, 2021
2:15pm - 2:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
2:30pm - 2:55pm (Eastern)
Red Canary | 5 Critical Pillars of the SOC of the Future | Chris Abbey, Incident Handling Manager

This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:

  • Threat intelligence
  • Threat research
  • Detection engineering
  • Investigation
  • Incident handling

This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future.

Jul 28, 2021
2:55pm - 3:15pm (Eastern)
Pentera | Stay Ahead of the Hacker with Continuous Security Testing | Sion Retzkin, CISO & Head of Knowledge & Practice

Join Sion Retzkin, CISO & Head of Knowledge & Practice, Pcysys to learn how to:

  • Build up your cyber resilience with continuous risk validation

  • Prioritize remediation efforts with a threat-facing perspective

  • Increase the productivity of your security teams

Jul 28, 2021
3:15pm - 3:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
3:30pm - 3:55pm (Eastern)
Acceptto | Stop Repetitive MFA Requests with the Power of AI and Machine Learning | Matt Sparks, Director of Sales Engineering

In today’s world, CISO’s around the world have deployed MFA as a means to counter credential theft. This leads to introducing endless MFA prompts throughout the IT ecosystem whether that be a cloud service, perimeter network device or an internal resource. In this session you will learn how AI and Machine Learning can dramatically reduce the number of times a user is ever asked to provide MFA. You’ll also learn about:

  • What a user’s authentication journey would look like by using machine learning
  • How it can drastically reduce account take over
  • Why traditional MFA/SSO context engines provide a false sense of security
  • Why it’s important to consider user behavior during an authentication request
Jul 28, 2021
3:55pm - 4:00pm (Eastern)
Sponsor Prize Drawing with Kim Hakim

Must be in attandence to win 

Jul 28, 2021
4:00pm - 4:30pm (Eastern)
Onelogin | Leveraging IAM for Effective and Efficient Threat Mitigation | Lonnie Benavides, Head of Infrastructure and Application Security

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.

Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?

Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your busines

Jul 28, 2021
4:30pm - 5:00pm (Eastern)
Illumio | Crawl, Walk, Run Your Segmentation Strategy for Zero Trust | Christer Swartz, Principal Technical Marketing Engineer

While there are varying definitions of what zero trust actually means, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on? Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.

 
Jul 28, 2021
5:00pm - 5:10pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti Cooler

Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a Yeti Cooler! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jul 28, 2021
5:10pm - 5:15pm (Eastern)
Closing Remarks | Prize Drawing Winners Announced