Date and Time | Title | |
---|---|---|
Apr 4, 2024 8:00am - 8:09am (Eastern) | Opening Introductions | |
Apr 4, 2024 8:00am - 8:45am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 8:45am - 9:06am (Eastern) | Interpres | Operationalizing Cyber Threat Intelligence To Optimize Your Defenses | |
Apr 4, 2024 9:03am - 9:38am (Eastern) | Zyston | Cybersecurity Program Management in the Complex Environment of Cybersecurity | |
Apr 4, 2024 9:35am - 10:05am (Eastern) | Infoblox | Weaponizing DNS to Defend the Enterprise Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but can also an incredible opportunity to prevent and detect threats. Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities. | |
Apr 4, 2024 10:10am - 10:40am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 10:40am - 11:10am (Eastern) | Imperva | DDoS attacks are on the rise: see a live attack and mitigation demo What does a DDoS (Distributed Denial of Service) attack really look like? What problems can it present for your organization? And why is it important to be able to immediately mitigate such attacks? Join Alex Bakshtein, a global DDoS expert, to see a DDoS attack simulation and mitigation. Alex will discuss and show:
| |
Apr 4, 2024 11:10am - 11:45am (Eastern) | Illumio | 30 Years of Arguing with Adults In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach. | |
Apr 4, 2024 11:45am - 12:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 12:15pm - 1:15pm (Eastern) | Keynote | "Emotional Intelligence: Does your cybersecurity leadership have it?" | |
Apr 4, 2024 1:10pm - 1:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 1:45pm - 2:15pm (Eastern) | Next DLP | AI for Security What to know when talking to vendors about their implementation of Artificial Intelligence into their products. | |
Apr 4, 2024 2:10pm - 2:45pm (Eastern) | Cavelo | Attack Surface Management – The Missing Middle of Cybersecurity Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices. In this presentation, we will discuss: The role of CAASM and attack surface management (ASM) in the future of risk management technologies Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack Different methods of ASM and benefits of automation for continuous management | |
Apr 4, 2024 2:45pm - 3:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 3:00pm - 3:25pm (Eastern) | Proofpoint | Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses. | |
Apr 4, 2024 3:23pm - 3:43pm (Eastern) | Cloudflare | Moving Towards a Zero Trust Mindset Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively. | |
Apr 4, 2024 3:40pm - 4:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Apr 4, 2024 4:10pm - 5:10pm (Eastern) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | |
Apr 4, 2024 5:10pm - 5:25pm (Eastern) | Closing Remarks |