Date and Time | Title | |
---|---|---|
May 26, 2022 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 8:00am - 8:07am (Eastern) | Opening Introductions | |
May 26, 2022 9:00am - 9:30am (Eastern) | Bitdefender | Modern Security Programs – IT Evolution to Security Revolution | Daniel Clayton VP Global Security Operations and Services The IT Revolution we have experienced over the last few years has forced organizations to rethink their security program. The degradation of the perimeter, the growth of micro-services, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees. What must an organization do to remain secure? It must build a Modern Security Program that combines visibility, data analytics and security expertise. That Security Program must be able to prevent, detect, respond AND remediate on a 24 x7 schedule. | |
May 26, 2022 9:30am - 10:05am (Eastern) | Exabeam | Why SOCs Fail - The Maturity Model Required for Cyber Resilience | Scott Gillis Regional Director Enterprise East/Caribbean Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient. | |
May 26, 2022 10:00am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 10:30am - 11:00am (Eastern) | Deepwatch | Security Whimsy and Misinformation: AI and ML? | Neal Humphrey AVP, Security Strategy This talk is on the basics, similarities, and differences between Artificial Intelligence and Machine Learning, at a layman’s level, and to attempt the separation of marketing terms and claims from the actual current and near term capabilities and possibilities. | |
May 26, 2022 11:00am - 11:30am (Eastern) | ThreatLocker | Zero Trust for Applications | Chad Maskill Cyber Hero The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware. | |
May 26, 2022 11:30am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 12:00pm - 1:05pm (Eastern) | Keynote | "Security Foundations: Building a program with minimum viable security" | Benjamin Corll VP, Cyber Security Coats | |
May 26, 2022 1:00pm - 1:30pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 1:30pm - 1:55pm (Eastern) | Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Jeff Stauffer Technical Engineer Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay. | |
May 26, 2022 1:55pm - 2:20pm (Eastern) | Alert Logic | Achieving Effective Security with Managed Detection and Response | Antonio Sanchez Technical Marketing Managed Detection and Response (MDR) continues to have significant growth and expected to be over $2 billion in the next 5 years. Many consider this a conservative estimate and there are differing views around MDR so this session is going to focus on answering three questions:
| |
May 26, 2022 2:20pm - 2:35pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 2:35pm - 3:05pm (Eastern) | AttackIQ | Continuous Security Validation and You: a tale as old as epoch time | Cris Carreon Engineer With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise | |
May 26, 2022 3:05pm - 3:30pm (Eastern) | Darktrace | Fast and Furious Attacks: Using AI to Surgically Respond | Justin Fier Director for Cyber Intelligence and Analysis | |
May 26, 2022 3:30pm - 3:50pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 26, 2022 3:50pm - 5:00pm (Eastern) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
May 26, 2022 5:00pm - 5:10pm (Eastern) | Closing Remarks |