Date and Time | Title | |
---|---|---|
Nov 17, 2022 8:30am - 3:00pm (Central) | Exhibitor Hall open Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes. | |
Nov 17, 2022 9:00am - 9:54am (Central) | [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service | |
Nov 17, 2022 9:45am - 10:00am (Central) | Networking Break Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. | |
Nov 17, 2022 10:00am - 10:50am (Central) | Transforming Information Security for Businesses of All Sizes In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirement that does not scale. Requirements placed on the end organization exacerbate the burden, whereas “shift left,” setting requirements on the vendor, can alleviate it. Industry has a unique opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns for security management is paramount. | |
Nov 17, 2022 10:00am - 10:59am (Central) | Addressing Modern-Day Data Breaches | |
Nov 17, 2022 10:45am - 11:00am (Central) | Networking Break Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. | |
Nov 17, 2022 11:00am - 11:41am (Central) | Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:
| |
Nov 17, 2022 11:00am - 11:58am (Central) | The Inadvertent Remote Insider Threat Threat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices. This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls. Objectives:
Key Takeaways:
| |
Nov 17, 2022 11:45am - 12:00pm (Central) | Networking Break Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. | |
Nov 17, 2022 12:00pm - 12:42pm (Central) | Special film screening of "Made in Beijing: The Plan for Global Market Domination" With special film screening of "Made in Beijing: The Plan for Global Market Domination"
The FBI’s Office of Private Sector, Counterintelligence Division and Training Division present this 30-minute film entitled “ Made in Beijing: The Plan for Global Market Domination.” In the world of global adversaries, the People’s Republic of China stands at the forefront with its sustained and brazen campaign of industrial espionage, posing the single greatest threat to our freedom, national security, and economic vitality. This film sounds the alarm, helping private sector partners recognize the urgent need to protect their crown jewels against industrial espionage. | |
Nov 17, 2022 12:00pm - 12:57pm (Central) | Interview with the CISO We chatted with Jason Kikta, CISO at Automox, and asked him about the current threat landscape, threat actors and hunting, and more. Some of his answers might surprise you! | |
Nov 17, 2022 12:45pm - 1:00pm (Central) | Networking Break Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. | |
Nov 17, 2022 1:00pm - 1:25pm (Central) | Zero Trust in a Modern IT World | |
Nov 17, 2022 1:00pm - 1:54pm (Central) | Incredible Email Hacks You'd Never Expect and How You Can Stop Them If you think the only way your network and devices can be compromised via email is phishing, think again! A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms, cybercriminals have more than enough email-based tricks that mean trouble for your InfoSec team. In this webinar Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering and phishing to trick your users into revealing sensitive data or enabling malicious code to run. Roger will show you how hackers compromise your network. You’ll also see incredible demos including a (pre-filmed) hacking demo by Kevin Mitnick, the World’s Most Famous Hacker and KnowBe4’s Chief Hacking Officer. Roger will teach you:
Email is still a top attack vector cybercriminals use. Don’t leave your network vulnerable to these attacks. | |
Nov 17, 2022 1:45pm - 2:00pm (Central) | Networking Break Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. | |
Nov 17, 2022 2:00pm - 2:54pm (Central) | [Closing Keynote] Ukraine vs. Russia: The Cyber War, 8 Month Update For a preview of Col. Cedric’s Leighton’s presentation, read the SecureWorld News article, “World’s First Hybrid War in Ukraine Holds Important Cyber Lessons.” |