Date and Time | Title | |
---|---|---|
Dec 1, 2022 8:00am - 8:07am (Eastern) | Opening Introductions | |
Dec 1, 2022 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 9:00am - 9:30am (Eastern) | Igel | Business Continuity: It’s More than Just a Backup Data Center | Dan Dillman Director – Enterprise Relationships, Great Lakes | |
Dec 1, 2022 9:30am - 10:00am (Eastern) | Exabeam | The Future of SIEM | Ben Burkholder Senior Sales Engineer Cybersecurity teams are struggling to keep up with a high volume of alerts with real threats buried in a sea of noise. With today’s breaches rooted in compromised credentials, it is difficult for defenders to know what is abnormal when everything appears “normal”. Without a holistic view of events across your environment with automation to speed investigations, it is difficult to identify, investigate, and respond to threats quickly, consistently and accurately. If today’s SIEMs aren’t keeping up, what does the future hold? Attend this talk and learn how:
| |
Dec 1, 2022 10:00am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 10:30am - 11:00am (Eastern) | ThreatLocker | Zero Trust at the Endpoint: Fighting Ransomware | Chad Maskill Cyber Hero The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware. | |
Dec 1, 2022 11:01am - 11:26am (Eastern) | Reciprocity | See Risk Differently! Surface unseen risk to get ahead of threats! | Meghan Maneval Director of Technical Product Management Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments. And they’re usually a few steps ahead of you. How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams? You need to see risk differently by taking a different approach! Join this session and learn how to:
| |
Dec 1, 2022 11:25am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 12:00pm - 1:00pm (Eastern) | Fireside Chat | Building Teams and Thinking Differently | |
Dec 1, 2022 1:00pm - 1:30pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 1:30pm - 2:00pm (Eastern) | Phosphorus | Cameras, CACs & Clocks: xIoT Security Sucks: A story of millions of interrogated Things | Robert Esposito Director of Security Strategy Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes. Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer. We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks. These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets. We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers. | |
Dec 1, 2022 2:00pm - 2:30pm (Eastern) | Illumio | Zero Trust and Microsegmentation – Easier Than You Think | Christer Swartz Principal Technical Engineer Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay. | |
Dec 1, 2022 2:30pm - 2:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 2:45pm - 3:15pm (Eastern) | Darktrace | How AI Can Think Like an Attacker | John Allen VP Cyber Risk & Compliance | |
Dec 1, 2022 3:15pm - 3:45pm (Eastern) | Red Canary | Threat Detection & Response Beyond Your Endpoints | Laura Hamel Principal of Managed Detection and Response Combatting ransomware attacks requires effective endpoint threat detection & response (EDR). But EDR alone is not enough: teams need to defend their networks, identities, cloud infrastructures, and more—often without the necessary internal expertise to handle an incident appropriately. That’s where Managed Detection & Response (MDR) providers can help. Join us for our upcoming webinar to learn how MDR extends your coverage beyond the endpoint, detects threats that bypass security products, and saves time and money by offloading labor-intensive tasks. What you’ll learn
| |
Dec 1, 2022 3:45pm - 4:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a Total Wine, Amazon, or BestBuy Gift Card! Sponsor Networking Time | Chat with our sponsors for the chance to win a Total WIne, Amazon, or BestBuy Gift Card! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win either a Total Wine, Amazon, or BestBuy Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 1, 2022 4:00pm - 5:08pm (Eastern) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
Dec 1, 2022 5:08pm - 5:23pm (Eastern) | Closing Remarks |