Date and Time | Title | |
---|---|---|
Dec 9, 2021 8:00am - 8:03am (Central) | Opening Introductions | Start the Event Game! | |
Dec 9, 2021 8:00am - 9:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 9:00am - 9:30am (Central) | Vectra | How to stop Ransomware BEFORE it starts. | Kevin Kennedy VP of Product Management | |
Dec 9, 2021 9:30am - 9:46am (Central) | Okta | Build vs. Buy: Advantages of a Pre-Built Solution | John Wilke Senior Product Marketing | |
Dec 9, 2021 9:45am - 10:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 10:00am - 11:05am (Central) | Keynote | IoT Security and Privacy at Home: Keeping the Digital Spies Out | Rebecca Herold, The Privacy Professor, Founder and CEO of The Privacy Professor Consultancy When it comes to security and privacy in areas where IoT devices are used, it is important to remember that anything connected to the internet needs to be secured using a variety of security methods. Certainly a strong password, but also so much more. Basic effective layers of security throughout the IoT product ecosystem. Safety at home, and family privacy and security, matter very much, as they always have. And now, with a large portion of the world working from home, and attending school from home, and having numerous online smart devices use for fun and efficiency, we’ve brought the digital school and work networks into employee homes. Often times they become mingled, which introduces even more security and privacy risks. People are often surprised when they learn how much data just a mobile phone can suck up. So, what type of data collections, and other actions, do IoT devices have the abilities to do, in ways that negatively impact security and privacy? For example, you may love your Alexa, but do you realize the ways in which your digital friend may be violating your privacy and defeating your security controls? What about all those other IoT devices that have become ubiquitous within our homes, offices, and public places we visit? How should we think about sentient listening? What are some parental controls to think about for this scenario? This session will provide an overview of the security and privacy issues, and provide attendees with at least ten actions to take to better protect their privacy, and to strengthen the security of their digital spaces where they live and work. Rebecca will be sharing her research findings, insights, and tips for how you can secure your home. She will also share her Privacy & Security Brainiacs latest infographic, PSB Smart Home IoT, and provide information you can provide to your loved ones “IoT for grandparents- and everybody else!” and the accompanying free flipbooks series from her Privacy & Security Brainiacs business:
A supplementary paperback book with expanded versions of the flipbooks (additional details, more tips, checklists, resources, a glossary, and more) will be available on Amazon, worldwide, in November, 2021, entitled, “Cybersecurity for Grandparents (And Everyone Else!): Q4 2021 Edition IoT Security.” | |
Dec 9, 2021 11:00am - 11:15am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 11:15am - 11:31am (Central) | Check Point | Never Trust. Always Verify | Eddie Doyle Cyber Security Evangelist Humans are inherently both trusting & distrusting, without even knowing it! We pick up on innumerable subtle micro expressions & nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process & alert us to “things out of place” & focus our attention, silencing distractions so we can verify trust. In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts. | |
Dec 9, 2021 11:30am - 11:45am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 11:45am - 12:50pm (Central) | Panel | “The Maturing Role of Cyber Security Responsibilities” | Brian Contos | Steve Lodin | Eddie Doyle | Evan Peña | Greg Fitzgerald | |
Dec 9, 2021 12:45pm - 1:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 1:00pm - 1:30pm (Central) | IP Pathways | Keep Your Company Out Of The Headlines With The Tools In The Security Toolkit | Dwight Barthelman Solutions Architect In an increasingly connected world, securing your infrastructure from bad actors is paramount to continuing business operations. In this session, we will discuss the Security Toolkit and what it means for the prevention of, and recovery from, ransomware attacks. With new exploits being found every day, IT departments of all sizes need to plan for the next attack. The tools in the Security Toolkit will provide the best possible defense against these attacks, as well as ensure timely recovery when an exploit is finally successful. | |
Dec 9, 2021 1:30pm - 2:00pm (Central) | Proofpoint | Deploying DLP for All the Wrong Reasons | Brian Reed Information Protection Evangelist Data Loss Prevention is a misnamed and misapplied technology – not all data is in scope, you will never cover every loss scenario, and while protecting data sounds like a great idea in theory, in practice data protection isn’t always the optimal goal. Many organizations are required to deploy DLP technology to comply with a regulatory compliance requirement or to protect specific intellectual property. This session will cover a brief history of DLP, how you should go about taking a people-centric approach to designing your information protection program, and using metrics for success that matter, as well as how to communicate your program to a non-technical audience | |
Dec 9, 2021 2:00pm - 2:15pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 2:15pm - 2:40pm (Central) | Illumio | Crawl, Walk, Run Your Segmentation Approach | Christer Swartz Principal Technical Marketing Engineer | |
Dec 9, 2021 2:40pm - 3:05pm (Central) | Reciprocity | Achieving New Levels of Efficiency, Automation, & Visibility in Third-Party Risk Management | Scott McCormick CISO | Rob Ellis Senior Vice President | Jenny Victor Vice President of Marketing | |
Dec 9, 2021 3:05pm - 3:15pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 3:15pm - 3:40pm (Central) | Rapid7 | The Boulevard of Broken Buckets | Tod Beardsley Director of Research | Bob Rudis Chief Data Scientist Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud. | |
Dec 9, 2021 3:40pm - 4:13pm (Central) | Darktrace | Ransomware in Focus, presented by Brianna Leddy, Director of Analysis | Brianna Leddy Director of Analysis In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover. But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Self-Learning AI is helping thousands of organizations fight back against ransomware. We’ll discuss:
| |
Dec 9, 2021 4:10pm - 4:19pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Target, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Target, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 9, 2021 4:19pm - 4:40pm (Central) | Rangeforce | Building and Maintaining an Effective Cyber Range | Ben Langrill Director of Solutions Engineering Cyber ranges are invaluable tools for training security operations teams and establishing cyber resilience. In this session, learn about the key components of an effective cyber range, common challenges in building a range, and how to optimize functionality, maintenance, and attack scenarios that keep a cyber range efficient and relevant.
| |
Dec 9, 2021 4:40pm - 5:10pm (Central) | CISCO Secure | Securing Trust - How The Security Leader Enables Business Outcomes | Helen Patton Advisory CISO | |
Dec 9, 2021 5:10pm - 5:20pm (Central) | Closing Remarks | Prize Winners Announced |