Agenda

Date and TimeTitle
Sep 29, 2021
8:00am - 8:03am (Eastern)
Opening Introductions
Sep 29, 2021
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
9:00am - 9:30am (Eastern)
Vectra | How to stop Ransomware BEFORE it starts. | Kevin Kennedy VP of Product Management

Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense.  Please join me as I share how ransomware has changed, how to see it before it starts, and what I predict ransomware will exploit next.

 
Sep 29, 2021
9:30am - 10:03am (Eastern)
Bitdefender | Modern Security Programs – IT Evolution to Security Revolution | Daniel Clayton, Global VP of Services & Support

The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOB devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.

What must an organization do to maintain its business and operational excellence? It must build a Modern Security Program based on threat intelligence, predicted outcomes, a layer of defenses and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule.

Sep 29, 2021
10:05am - 10:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
10:15am - 11:18am (Eastern)
Keynote | Cybersecurity & The Board: Choosing success over the Sarlacc Pit | Brian Contos, VP & CISO Mandiant Advantage
Sep 29, 2021
11:15am - 11:25am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
11:25am - 11:50am (Eastern)
Bitglass | Rise of Secure Access Service Edge (SASE) | Kevin Sheu, Senior VP of Marketing

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:

  • The core components of a SASE platform like Bitglass.
  • The functionality you need to secure cloud, web, and remote access use cases.
  • Architectural considerations you should keep in mind when comparing SASE vendors. 
Sep 29, 2021
11:50am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
12:00pm - 1:01pm (Eastern)
Industry Expert Panel | "Crucial! Security Must Match SW Delivery @ Light Speed!" | Mike Skurko | Brook Schoenfield | Damilare D. Fagbemi | Anmol Misra
Sep 29, 2021
1:00pm - 1:15pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
1:15pm - 1:35pm (Eastern)
ForgeRock | Hybrid. It’s Never Only One Thing. | Eve Maler, Chief Technology Officer

New technology is often seen as a total replacement for whatever came before. This is evident in the “Move to Cloud”! However, we are almost never in a greenfield position: we must interoperate with legacy systems and the demands of the business drive towards different and competing solutions for different problems. We will discuss the challenges of a hybrid deployment, addressing multi-cloud as well as on-premises components, and how a hybrid approach to identity is required to competently address these often conflicting requirements. We will use real-world examples of hybrid solutions to demonstrate the solutions.

 
Sep 29, 2021
1:35pm - 2:10pm (Eastern)
Recorded Future | 5 Ways to Optimize Your SOC | Jamie Zajac, Vice President of Product
As more and more businesses adopt a SOC team for managing operations, the scope of work for SOC managers and operators continually grows. More sources, more events, and higher expectations. In this session, Jamie Zajac, VP of Product at Recorded Future will speak to 5 ways you can optimize your SOC, emphasizing changes you can make that don’t require you to buy new tools promising to be a silver bullet.
Sep 29, 2021
2:10pm - 2:25pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
2:25pm - 2:55pm (Eastern)
Malwarebytes | Protecting Your Organization from the Business of Ransomware | Robert Zamani, Senior Director of Engineering

Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative?

Join this session to learn more about:

  • The business of ransomware
  • The evolving threat landscape
  • Ransomware Protection Tactics and Techniques
  • Your Security Roadmap for Hybrid and Remote Workers
  • Leveraging an EDR with Limited Security Staff
 
Sep 29, 2021
2:55pm - 3:20pm (Eastern)
Netenrich | Cyber Resilience for Digital Operations | Christopher Morales, CISO and Head of Security Strategy
Security operations needs context awareness to ensure the success of business initiatives in a world of advanced, targeted attacks. Netenrich empowers security, IT and cloud operations to thrive during adversity with adaptive incident resolution using real time, data driven risk and trust-based decision making. The Netenrich Resolution Intelligence platform streamlines the process of managing, analyzing, and fixing the root cause of incidents to prevent future disruption.
Sep 29, 2021
3:20pm - 3:35pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a Top Golf, Steak House, or BestBuy Gift Card!

Sponsor Networking Time | Chat with our sponsors for the chance to win a Yeti CoolerVisit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win either a Top Golf, Steak House, or BestBuy gift card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Sep 29, 2021
3:35pm - 4:00pm (Eastern)
Illumio | Crawl, Walk, Run Your Segmentation Strategy for Zero Trust | Christer Swartz, Principal Technical Marketing Engineer
While there are varying definitions of what zero trust actually is, there is one thing everyone can agree on – segmentation is a key pillar.  Another thing everyone can agree on?  Segmentation is hard.  This presentation will highlight a way to begin your zero trust journey leveraging enforcement boundaries which will enable you to protect your digital crown jewels as you work through your end to end zero trust plan.
 
Sep 29, 2021
4:00pm - 4:05pm (Eastern)
Sponsor Prize Drawing with Kim Hakim

must be in attendance to win 

Sep 29, 2021
4:05pm - 4:35pm (Eastern)
Beyond Identity | The Past, Present and Future of Strong Authentication | Jasson Casey, CTO

Authentication is a foundational element of every cybersecurity program. With more than 80% of data breaches and most ransomware incidents stemming from credential-based attacks (e.g., phishing, credential stuffing, RDP brute, etc.), it has become clear that passwords are a fatally flawed authentication method. Unfortunately, many common solutions are “band-aids” on top of passwords and are lacking from both a security and user experience perspective.  Replacing passwords as an authentication factor is finally possible. While eliminating passwords is a critical step in stopping credential-based attacks, it is just a first step on the journey to advanced authentication and access control needed to achieve zero trust.

In this talk, we will discuss:

  • A brief history of authentication
  • Changing requirements in the new work from home(or anywhere) business model and cloud-centric architectures
  • Can we gain risk-reduction improvements by converging the traditionally disparate identity and security processes and technologies?
  • A case for continuous user authentication
  • What is device risk and why is the real-time assessment of endpoint security important
Sep 29, 2021
4:35pm - 5:05pm (Eastern)
Darktrace | The Battle of Algorithms: How AI is beating AI at its own game | Marcus Fowler, Director of Strategic Threat
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.   In this session, discover: 

 

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons  
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them 
  • Why defensive AI technologies are uniquely positioned to fight back
 
Sep 29, 2021
5:05pm - 5:15pm (Eastern)
Closing Remarks | Prize Drawing Winners Announced