Date and Time | Title | |
---|---|---|
Jan 26, 2023 8:00am - 8:05am (Pacific) | Opening Introductions | |
Jan 26, 2023 8:00am - 9:00am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 9:00am - 9:25am (Pacific) | Exabeam | How to Build an Insider Threat Program Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen. Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach. This presentation will explore:
| |
Jan 26, 2023 9:25am - 10:00am (Pacific) | Lumu | The Future of Cybersecurity Operations Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation. | |
Jan 26, 2023 10:00am - 10:30am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 10:30am - 10:57am (Pacific) | Novacoast | The future of cybersecurity tooling: What’s ahead for data collectors, EDR, SIEM, and XDR | |
Jan 26, 2023 10:55am - 11:30am (Pacific) | Elastic | Future-proof Security: Myth or Reality? | |
Jan 26, 2023 11:30am - 11:45am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 11:45am - 12:30pm (Pacific) | Keynote | The Use of AI in Information Security | Sujeet Bambawale, Chief Information Security Officer, 7-Eleven | |
Jan 26, 2023 12:30pm - 1:00pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 1:00pm - 1:28pm (Pacific) | Phosphorus | Cameras, Cabinets, & Controllers: xIoT Security Chaos - A Story of Two Million Interrogated Devices Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes. Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer. We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks. These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets. We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers. | |
Jan 26, 2023 1:28pm - 2:00pm (Pacific) | Esentire | Building Cyber Resilience By Prioritizing 24/7 Threat Detection and Response In today’s threat landscape, security leaders must shift their focus to improving their cyber resilience. The ability to anticipate, withstand, recover from, and adapt to the evolving cyber threats will dictate how well-equipped your cybersecurity program is at defending against these threats. However, given the lack of skilled in-house security resources, it can be challenging to balance the number of incoming security alerts with delivering swift response to eliminate known and unknown threats. In this presentation, join Brent Feller, Director Solutions Architect at eSentire, as they share insights on how you can leverage 24/7 threat detection, investigation, and response capabilities to reduce your cyber risk, build resilience and prevent business disruption. Key takeaways include:
| |
Jan 26, 2023 2:00pm - 2:15pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 2:15pm - 2:35pm (Pacific) | Banyan Security | Zero Trust – What’s Holding You Back? We’ve reached a bit of a post-COVID era plateau, where the new normal is represented by a diverse workforce using multiple devices from an endless variety of locations. The modern organization must be able to provide secure access to applications, infrastructure, and information across the internet from any device or location.
In this talk we will discuss: › What can a zero trust approach accomplish? › Real and imagined barriers › Achieving zero trust project wins › Getting Started | |
Jan 26, 2023 2:35pm - 3:15pm (Pacific) | Next DLP | ChatGPT and its Implications for Cybersecurity Preparing for Cybersecurity threats in the Age of AI
| |
Jan 26, 2023 3:10pm - 3:15pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 3:15pm - 3:30pm (Pacific) | Stellar Cyber | How to be Successful with SecOps in a Downturn SecOps groups are challenged more than ever as budgets tighten and cyber-threats continue to rise unabated. Ideally, SecOps should be a way to safely and confidently enable your security group (and your whole organization) to run leaner and more efficiently. Metrics are the foundation for SecOps, but you have to ensure that those metrics tell the real story, rather than keeping your analysts frustrated by chasing meaningless alerts. To do this, you need to assess your detection and response tools and move to a more holistic platform that integrates with your firewall, as an example, and gives you all of the metrics across your attack surface in one pane of glass, detects even the most complex attacks, and presents contextual information about exactly how to respond. And responding to attacks should mean more than locking down assets – when your analysts respond, the platform should enable them to create playbooks so the platform can automatically prevent similar scenarios from having any impact at all. We will cover these ideas in this session and give use case examples of how to succeed. | |
Jan 26, 2023 3:30pm - 4:00pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 26, 2023 4:00pm - 5:10pm (Pacific) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
Jan 26, 2023 5:10pm - 5:25pm (Pacific) | Closing Remarks |