Date and Time | Title | |
---|---|---|
Feb 8, 2023 8:00am - 8:05am (Central) | Opening Introductions | |
Feb 8, 2023 8:00am - 9:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 9:00am - 9:35am (Central) | Arctic Wolf | The State of Cyber Security & The Need for Security Operations __________________________ Cohesity | Leading the Next Era in Data Security & Management Cyber risk is a business risk. Unfortunately, the cybersecurity industry has been ineffective in reducing cyber risk for organizations. Every year we witness the innovation of new technologies and solutions—yet high-profile breaches continue to make headlines. This session will outline practical approaches you can take to end cyber risk for your organization. _______________________________________________________________
With ransomware attacks becoming more frequent than ever before and it not being a matter of if but when, data management and security should be at the forefront of every business today. In this session, we will highlight the necessity of being able to detect, protect and rapidly recover from ransomware attacks, the importance of having a strong ecosystem of alliance partners by your side and asking those challenging questions to ensure you have the best plan for keeping your data and company secure. | |
Feb 8, 2023 9:30am - 10:05am (Central) | LiveAction | Stories from the Front Lines: SOC Edition There’s never a dull moment in the Security Operations Center (SOC). In this session, Daniel Smallwood shares some of the most interesting security incidents he’s encountered during his 20-year career as a threat researcher and engineer in the federal and private sectors. These include: · The Case of the Missing Hard Drive: Lessons Learned from Handling an Insider Threat · From the UK to Aliens to Pink Floyd: The British Hacker Story · The Network is Overrun with Coin Miners: How to Approach an Overwhelming Breach | |
Feb 8, 2023 10:00am - 10:30am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 10:30am - 10:52am (Central) | Veeam | Understanding the 5 areas of the NIST Cybersecurity Framework (NSF) The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The five areas of the program includes Identify, Protect, Detect, Respond, and Recover. These five NIST functions all work concurrently and continuously to form the foundation where other essential elements can be built for successful high-profile cybersecurity risk management | |
Feb 8, 2023 10:52am - 11:30am (Central) | Phosphorus | Cameras, Cabinets, & Controllers: xIoT Security Chaos - A Story of Two Million Interrogated Devices Purpose-built IoT, OT, and network devices that are connected and disallow the installation of EDR software are part of a massive, rapidly growing category of targets that nefarious actors are exploiting. Attackers can use them to evade detection and maintain persistence. Nation-states, cybercriminals, and insiders have discovered that these devices can be easily compromised and used for a wide variety of malicious purposes. Countries like Russia have developed tools like Fronton that are specifically designed to attack and control these device types. Some common devices from countries like China have even been banned because they ship with malware preinstalled from the manufacturer. We’ve been researching IoT, OT and network device security for over five years across millions of devices and hundreds of organizations worldwide. This is unique research that isn’t being conducted by any other organization at this scale. This presentation will share several discoveries across device visibility, vulnerabilities, and exploits. The research calls out the most exploited device types, explores multiple war stories, and illustrates methods to mitigate the risks. These purpose-built devices are being turned against us and becoming a new cybersecurity frontline across the enterprise, smart cities, buildings, and ships, healthcare providers, manufacturing, defense, our homes, and more. Compromises are impacting the physical world by unlocking our doors, shutting down power, and spying with audio and video surveillance. Attackers can use these devices to mine cryptocurrency, conduct DDoS attacks, and engage in ransomware as well as and move laterally to compromise our IT and cloud-based assets. We don’t know what devices we have, so we don’t know what to fix. Even if we knew what to fix, it would be impossible to do so manually because of the scale. If we did fix it, we don’t have anything in place to ensure things stay fixed. This is leaving our IoT, OT and network devices at risk along with IT and cloud-based assets. These are our devices, and it’s time to take back control from the attackers. | |
Feb 8, 2023 11:30am - 12:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 12:00pm - 1:05pm (Central) | Keynote | Leadership Matters: Board Oversight of Cyber Risks in an Ever-Changing Landscape Enterprises must worry about cyber risks – including ransomware attacks, malware intrusions, software and supply chain problems – as well as concerns brought by rapidly evolving technologies. Pam will discuss cyber implications for adopting tech like the Internet of Things, cloud and artificial intelligence, as well as possible difficulties ahead with quantum computing and the future of cyber risk. Learn the steps you can take to ensure your enterprise is prepared. Learn the questions that a boards should be asking to ensure proper oversight and governance to manage current cyber risk and challenges ahead. | |
Feb 8, 2023 1:00pm - 1:30pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 1:30pm - 1:53pm (Central) | RangeForce | Building a Human-Based Defense Readiness Program Building a Human-Based Defense Readiness Program Abstract: Humans, not technology, are the cornerstone of a robust cybersecurity strategy. But how do you ensure your team is capable of detecting and defending against an ever-changing threat landscape? In this session, learn what a human-based defense readiness program looks like, how to deploy it, and how it can reduce your organization’s cyber risk. | |
Feb 8, 2023 1:53pm - 2:30pm (Central) | Banyan Security | Zero Trust: Modern Security’s Remedy to Today’s Cybersecurity Challenges Good security requires a defense-in-depth strategy. Ensuring user trust, password managers, MFA, EDR and SSO tools all work together in concert. But, human error is often the weakest link in the security chain, you must ensure that other layers are in place to close this final link in the chain and mitigate against all modern attacks. This talk will share a practitioner’s hard won insight from real-world implementations at two Fortune 500 enterprises and the journey those companies are on. We will share the vision that led these organizations down the path of a defense-in-depth strategy that included Zero Trust and Security Services Edge (SSE). | |
Feb 8, 2023 2:30pm - 2:35pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 2:35pm - 3:10pm (Central) | Next DLP | Modern Data Protection Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program. | |
Feb 8, 2023 3:05pm - 3:45pm (Central) | Infoblox | The Weaponization of DNS | |
Feb 8, 2023 3:35pm - 4:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Feb 8, 2023 4:00pm - 5:00pm (Central) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
Feb 8, 2023 5:00pm - 5:15pm (Central) | Closing Remarks |