Agenda

Date and TimeTitle
Feb 29, 2024
8:00am - 9:00am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
8:00am - 8:09am (Pacific)
Opening Introductions
Feb 29, 2024
9:00am - 9:32am (Pacific)
Novacoast | The Future of Identity
Where is Identity (IDM, IGA, SSO, MFA, PAM, and the other acronyms in the Identity bucket) headed? What is driving what we’re doing and what new challenges will we be facing? Starting with the current buzz – how will AI affect Identity? What will the purpose of Identity change into? What do we need to have in place to be ready? It’s not all doom and gloom SkyNet, but it’s also not the same Identity we’ve been doing for 20 years.
Feb 29, 2024
9:30am - 10:00am (Pacific)
Gradiant Cyber | The What, Who For, and Why of MXDR

In this talk, we will first explain what Managed Extended Detection and Response (MXDR) is – given the ‘acronym soup’ of detection and response solutions (XDR, MDR, NDR, EDR, CDR, etc). Next, we will delve into why mid-market organizations should integrate MXDR into their security strategies – focusing on the specific profiles of security teams that benefit most from its implementation. The presentation will be capped with two to three customer case studies, demonstrating MXDR’s practical impact in real-world scenarios. Attendees will gain a clear understanding of MXDR’s advantages, its applicability to various organizations, and actionable insights from successful deployments

Feb 29, 2024
10:00am - 10:30am (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
10:30am - 11:00am (Pacific)
StackHawk | Unlock Shift Left: Right Teams, Right Tools, Fixed Problems

To match the pace of API-driven development, it’s essential to implement a proactive approach to security testing. However, organizations struggle despite a strong desire to integrate security into software delivery cycles effectively. This talk will dive into the “how” of shifting left, focusing on three key principles: people, process, and technology. 

Feb 29, 2024
11:00am - 11:30am (Pacific)
Cloudflare | Cloudflare Threat Radar - Current Trends and Recommendations

What are the current cybersecurity trends and recommendations to prevent and mitigate

Feb 29, 2024
11:25am - 12:00pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
12:00pm - 1:05pm (Pacific)
Keynote | "Elevating Your Cybersecurity Program: Key Priorities for CISOs"

As we truly put the pandemic behind us, we should look forward and ensure we have a new vigor to our information security program.  We should be looking at how we can assure stakeholders that we have a strong and resilient program. This requires a shift in how we position ourselves in the organization and how we communicate our risk management performance.

This discussion covers five topics that cyber risk managers should consider moving forward to improve the organization’s risk posture.

Feb 29, 2024
1:00pm - 1:30pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
1:30pm - 2:00pm (Pacific)
Fastly | Bringing DevSecOps to Cloud Security

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

Topics covered:
·      Understanding there is no one-size-fits-all model for DevSecOps
·      Best practices for integrating DevSecOps into your cloud security strategy
·      Exploring the intersection between development, security and DevSecOps

Feb 29, 2024
1:55pm - 2:30pm (Pacific)
Interpres | DRIVING INTELLIGENCE WITH MITRE ATT&CK: LEVERAGING LIMITED RESOURCES TO BUILD AN EVOLVING THREAT REPOSITORY

Building threat intelligence is challenging, even under the most ideal circumstances. But what if you are even more limited in your resources? You are part of a small (but skilled) team, with high expectations, and people are relying on you to make business-critical decisions…all the time! What do you do in that situation? Turn a Toyota Tercel into a tank, of course. The Interpres Security threat intelligence team found itself in that exact situation. Wanting to leverage the MITRE ATT&CK catalog in creating a comprehensive and timely threat intelligence repository, the Interpres team built a series of tools, processes, and paradigms that we call Intelligence Engineering. In this talk, we’ll examine how we combined ATT&CK, STIX2, the Vertex Project’s open-source intelligence platform, Synapse, and custom code to deliver meaningful, rapid, verifiable intelligence to our customers. We’ll share lessons learned on automation, how to run multiple ATT&CK libraries side-by-side, and making programmatic intelligence delivery scalable and effective – just like building a tank out of an imported sedan.

Feb 29, 2024
2:25pm - 2:45pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
2:45pm - 3:15pm (Pacific)
DNS Filter | Protective DNS Unleashed: A Ransomware Defense Strategy

In today’s ever-evolving threat landscape, securing your assets and infrastructure has become a formidable challenge. Traditional defense walls have fallen with rise on-the-go workforces and the relentless onslaught of cyber adversaries. But fear not, there’s a beacon of hope—protective DNS.

In this session, we’ll break down the power of protective DNS as a pivotal element in safeguarding your business against ransomware and other insidious threats:

  • Unmasking the Phishing Threat: How deceptive phishing tactics open the door to digital mayhem and how to spot them to keep your organization safe.
  • Multi-Layered Defense with DNS Filtering: Discover why the DNS layer is your first line of defense and how it can safeguard your assets and infrastructure from ransomware attacks.
  • DNS-Based Threat Intelligence: The importance of purpose-built intelligence can be used to better detect and prevent zero-day threats at the DNS layer before they strike.
  • Compliance and Security Frameworks: Protective DNS isn’t just a nice-to-have; it’s increasingly essential for staying compliant with the big cybersecurity standards like ISO 27001, CMMC, and NIST.
Feb 29, 2024
3:10pm - 3:45pm (Pacific)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 29, 2024
3:40pm - 4:45pm (Pacific)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Feb 29, 2024
4:45pm - 4:55pm (Pacific)
Closing Remarks