Date and Time | Title | |
---|---|---|
Aug 24, 2022 8:00am - 8:07am (Central) | Opening Introductions | |
Aug 24, 2022 8:00am - 9:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 9:00am - 9:32am (Central) | Deepwatch | SecOps Maturity Metrics for the Boardroom | Greg Genung Director of Strategy & Innovation You can’t improve what you don’t measure. To mature your security operations program, you need to evaluate its effectiveness. But this is a task many organizations still struggle with when it comes to collection, detection, and response. If showing the effectiveness of your security operations is a challenge, it might be time to re-evaluate your KPls and your ability to measure them in order to communicate to your board the metrics that drive programmatic gains in your sec ops practices. | |
Aug 24, 2022 9:30am - 10:05am (Central) | Darktrace | Stopping Attacks, Not Your Business: AI & Autonomous Response | Austin Eppstein Senior Cyber Security Executive With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Austin in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios. | |
Aug 24, 2022 9:55am - 10:30am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 10:30am - 11:00am (Central) | Abnormal | Key Considerations for Choosing the Right Email Security Platform | Scott Deluke Manager, Enterprise Engineers Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years. Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense. | |
Aug 24, 2022 11:00am - 11:25am (Central) | Reciprocity | It Takes More than Automated Compliance to Get Ahead of Threats | Meghan Maneval Director of GRC Exports In a 2021 survey of CIOs, respondents cited limited resources, new or changing regulations and tracking and maintaining compliance as the top three challenges keeping them up at night. With teams stretched thin trying to keep up with compliance requirements and growing numbers of threats and stakeholder demands, manual processes can no longer keep up. Automation is a strong first step in reducing manual work and freeing up your team’s workload. However, it is insufficient if it doesn’t help your InfoSec leaders clearly communicate the risk associated with the organization’s business priorities so they can make informed, data-driven investment decisions. The ability to focus on strategic business priorities helps optimize the talents of small InfoSec teams. When you automate the more tactical and routine work, a more reliable and comprehensive approach to GRC is created while optimizing your teams’ talent by freeing them from manual work. Join us as we discuss how taking a strategic approach to risk management combined with automation can ensure that businesses stay ahead of the threats they face every day. Attend this webinar and learn how to:
| |
Aug 24, 2022 11:25am - 12:10pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 12:10pm - 1:00pm (Central) | Keynote | Laura Tibodeau Global Digital Innovation & Transformation Leader Ascend Performance Materials | "Creating a high-performance culture that features teamwork, collaboration, imagination, inclusion and innovation." | |
Aug 24, 2022 1:00pm - 1:30pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 1:30pm - 2:00pm (Central) | Pentera | Is Your Defensive Stack Ready For A Targeted Attack? | Jake Flynn Solutions Engineer Understanding the potential risks in a security program leads to a healthy security program. Penetration testing allows for this identification of risk, but frequent or continuous testing is not widely adopted across the industry. Automated Security Validation (ASV) allows organizations to identify and close any gaps by continually putting existing tools and controls to the test, and focusing on impact-based remediation vs. generic severity to make decisions. We will discuss in depth how taking an offensive approach, through Automated Security Validation, enhances a team’s current defensive strategies. | |
Aug 24, 2022 1:55pm - 2:30pm (Central) | Malwarebytes | Ransomware: Prevent what you can and mitigate the rest | Robert Elworthy Senior Solutions Engineer Practical and non-vendor specific steps to prevention and mitigation. | |
Aug 24, 2022 2:30pm - 2:45pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 2:45pm - 3:20pm (Central) | Phosphorus | Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices | Brian Contos Chief Security Officer Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about. Working globally with Fortune 500 enterprises and government agencies for the past six years, we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow. | |
Aug 24, 2022 3:15pm - 3:50pm (Central) | Elastic | Future-proof Security: Myth or Reality? | Scott Parkinson Principal Solutions Architect, Security Specialist There is no magic bullet in security. Yet there are many best practices adopted by enterprises across the globe that have proven to allow organizations to mitigate risk and mature their security posture. During this session you will learn about common trends and challenges in cybersecurity and what organizations are doing to keep up and be ready for the future. | |
Aug 24, 2022 3:45pm - 4:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 24, 2022 4:00pm - 5:05pm (Central) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
Aug 24, 2022 5:00pm - 5:15pm (Central) | Closing Remarks |