Date and Time | Title | |
---|---|---|
Dec 6, 2023 8:00am - 8:45am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 8:00am - 8:05am (Eastern) | Opening Introductions | |
Dec 6, 2023 8:45am - 9:05am (Eastern) | Seemplicity | DevSecOps Alchemy: Communications, Processes and Visibility The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps. | |
Dec 6, 2023 9:05am - 9:35am (Eastern) | Dito | Implications on Generative AI to Enterprise Security Generative AI (GenAI) is a rapidly evolving field with the potential to revolutionize many aspects of our lives. However, as with any new technology, there are potential risks associated with GenAI, particularly in the realm of enterprise security. This presentation explores the implications of GenAI on enterprise security, highlighting both the potential benefits and risks when enabling this technology within an organization. | |
Dec 6, 2023 9:35am - 10:10am (Eastern) | Forescout | Today’s Threat Landscape Requires a Unique Capability | |
Dec 6, 2023 10:10am - 10:45am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 10:45am - 11:15am (Eastern) | Hyperproof | Communicating Risk With Your Leadership Team In response to the ever-changing risk environment, company leadership is asking more and more questions about how to best manage risk. But being able to answer those questions means having a system and process in place to accurately document, manage, mitigate, and report on those risks. | |
Dec 6, 2023 11:15am - 11:45am (Eastern) | Next DLP | Protecting Data in a Distributed World Change is the only constant. Back in the 1970s all computing data was predominantly held on mainframes, which were located in highly secure data centers. They were only accessed over private networks utilizing propriety communications protocols and hard-wired devices. Today that model has changed dramatically; both company confidential and customer data is available anywhere via a myriad of devices and often accessed remotely from the company’s offices as the data is stored in the cloud. Understanding exactly where that data is located and protecting it, is critical to all businesses, both from revenue protection and avoiding loss of credibility from high profile breaches and the regulatory fines that often accompany those breaches. Just because a company moves its data to the cloud does not absolve it of the responsibility and ownership of the required cybersecurity and data protection controls, and often this is regulated by governments or their agencies. Threats are evolving daily, and your cybersecurity team must stay on top of the controls that are required. They also need to be able to constantly monitor what is happening to the company’s sensitive data. Are you ready for those challenges? Let’s explain that journey. No man steps in the same river twice | |
Dec 6, 2023 11:40am - 12:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 12:15pm - 12:55pm (Eastern) | Keynote | Beyond Bits and Bytes: The Art of Cyber Adaptation | |
Dec 6, 2023 12:50pm - 1:20pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 1:30pm - 2:00pm (Eastern) | Palo Alto | Cloud Security Lessons Learned from Recent Cyber Attacks After two decades of rapid cloud adoption by organizations, 2024 could be considered a turning point for cloud security. The popularity and complexity of cloud technology is expanding the attack surface with vulnerabilities and misconfigurations for cybercriminals to exploit. This session will provide examples of recent cloud attacks and provide a wide angle view of the status of common misalignments leaving the door open to malicious activity. This session will provide observations from our recently released Unit 42 Cloud Threat Report, Volume 7 that provides analysis of data collected over the past 12 months from Unit 42 Incident Response engagements in addition to analyzing cloud security at over 1,000 organizations, 210,000 cloud environments and over 70,000 code repositories. We will wrap up by providing details on how most attacks work and what organizations can do to protect themselves from cyberattacks. | |
Dec 6, 2023 2:00pm - 2:30pm (Eastern) | Sprocket Security | Future of Security Testing | |
Dec 6, 2023 2:30pm - 2:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 2:45pm - 3:15pm (Eastern) | Veracode | The Crossroads of AI & Application Security The potential of Artificial Intelligence (AI) is vast, with many industries already harnessing the power of it. In Application Security, AI has made some significant improvements – including finding flaws faster, suggesting fixes, the ability to rewrite code and more likely to come. Although, as with any new technology, it brings its own risks – including incorrect code suggestions and more intelligent malware attacks. Join our session to discuss how to harness these tools to work for you while ensuring your organization stays secure. | |
Dec 6, 2023 3:15pm - 3:45pm (Eastern) | Bullwall | Ransomware, the case for containment rather than prevention Even the most well-protected organizations fall victim to ransomware – what do you do when this happens? Most organizations have already invested and implemented strong layers of security but are still vulnerable to ransomware. Cybercriminals are constantly outsmarting even the most robust security solutions; evolving methods and behaviors make it impossible for traditional security vendors to prevent them. Endpoint protection is no longer enough. This session is essential if you wish to stay ahead of the ransomware threat. It will provide you with the following knowledge:
| |
Dec 6, 2023 3:40pm - 4:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Dec 6, 2023 4:00pm - 5:00pm (Eastern) | Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices | |
Dec 6, 2023 5:15pm - 5:25pm (Eastern) | Closing Remarks |