Agenda

Date and TimeTitle
Sep 15, 2021
8:00am - 8:03am (Central)
Opening Introductions
Sep 15, 2021
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
9:00am - 9:25am (Central)
Bitglass | Rise of Secure Access Service Edge (SASE) | Kevin Sheu, Senior VP of Marketing

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases.
  • Architectural considerations you should keep in mind when comparing SASE vendors. 
Sep 15, 2021
9:25am - 9:55am (Central)
Check Point | A Strategy For Securing Your Everything; How Non-Integrated Solutions Challenge Overall Enterprise Security | Grant Asplund Chief Cyber Security Evangelist

Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

Join Grant Asplund, Growth Technologies Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:

  • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership
Sep 15, 2021
9:55am - 10:10am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
10:10am - 11:00am (Central)
Keynote | "Zero Trust or Bust: Build IT and they Won’t Come!" | Ron Zochalski Chief Technology Officer & Chief Information Security Officer Lake County Indiana
Sep 15, 2021
11:00am - 11:25am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
11:25am - 11:45am (Central)
Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing

The Enterprise Content Firewall

To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes.

Sep 15, 2021
11:45am - 12:45pm (Central)
Panel | "Zero Trust is Not Enough" | Laureen Smith | Endre Jarraux Walls | Ron Zochalski | Thad Phillips, PhD

The Zero Trust model is a big step forward in protecting organizations. But is it really enough to disrupt the cybercriminals? Criminals don’t care about trust. Equipped with endless time and resources, they will find a way to steal credentials, zero-day through barriers, and even attack new zero trust systems directly. Join this panel discussion on technologies and tactics that go beyond Zero Trust to protect your organization from cyberattacks.

 
Sep 15, 2021
12:45pm - 1:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
1:00pm - 1:31pm (Central)
Darktrace | The Battle of Algorithms: How AI is beating AI at its own game | Marcus Fowler, Director of Strategic Threat

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.  

 In this session, discover: 

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons  
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them 
  • Why defensive AI technologies are uniquely positioned to fight back
Sep 15, 2021
1:31pm - 1:55pm (Central)
Avanan | Why Securing Email Has Changed | Julie Adrounie, Solutions Engineer

This webinar covers how email security has changed for organizations and how we can be better prepared for securing the cloud across multiple collaboration applications. Attackers are evolving through new entry points through platforms like Slack and Teams. Traditional approaches to email security like a SEG are no longer enough to protect organizations from insider threats and the full suite of applications. This presentation also demonstrates how emerging technologies such as AI and Machine Learning can help us with these attack types that are dynamic and ever changing.

 
Sep 15, 2021
1:55pm - 2:10pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
2:10pm - 2:30pm (Central)
Guardicore | Winning Against Ransomware | Igor Livshitz, Senior Director of Product Management
Sep 15, 2021
2:30pm - 2:55pm (Central)
Reciprocity | Achieving New Levels of Efficiency, Automation, & Visibility in Third-Party Risk Management | Scott McCormick Chief Information Security Officer | Rob Ellis Senior Vice President | Jenny Victor Vice President of Marketing

Whether a start-up or an enterprise, you are probably working with multiple vendors, using their software and reliant on their systems. Yet while these external vendors provide invaluable services, they also introduce significant risk to your company’s information security.

How do you know if your vendors are meeting required contractual, security and privacy obligations?

If you don’t have processes in place to assess the risks these third parties pose, then your answer is most likely you don’t. And this is critical: You need to know the risks of working with third parties and that you can trust them — because if they go down, your business may, too.

Assessing risk, however, can be incredibly complex. Traditional risk management approaches that rely on manual processes, spreadsheets and even survey methods don’t scale well and are not automated enough. And they certainly can’t support a third-party vendor network once it reaches a certain size: spreadsheets and email folders become overwhelming, ad hoc processes and reporting cycles create confusion, and manual reviews lead to missed issues and trends. In fact, the more successful an organization is – and the more third-party vendors they work with – the more automation and continuous monitoring are required.

Sep 15, 2021
2:55pm - 3:10pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
3:10pm - 3:40pm (Central)
Onelogin | Leveraging IAM for Effective and Efficient Threat Mitigation | Lonnie Benavides, Head of Infrastructure and Application Security
Sep 15, 2021
3:40pm - 3:50pm (Central)
Sponsor Networking Time | LAST CHANCE! - chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a prize Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 15, 2021
3:50pm - 4:12pm (Central)
Arctic Wolf | Making Cybersecurity Work | Tom Utley Sr. Presales Systems Engineer
Sep 15, 2021
4:12pm - 4:37pm (Central)
Illumio | Crawl, Walk, Run Your Segmentation Strategy for Zero Trust | Christer Swartz, Principal Technical Marketing Engineer

While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.

 
Sep 15, 2021
4:37pm - 4:45pm (Central)
Closing Remarks | Prize Drawing Winners Announced