Agenda

Date and TimeTitle
May 2, 2024
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
8:00am - 8:09am (Central)
Opening Introductions
May 2, 2024
9:00am - 9:30am (Central)
Illumio | Breach Containment: Assuming breach and isolating threats.
May 2, 2024
9:30am - 10:00am (Central)
Cavelo | Attack Surface Management – The Missing Middle of Cybersecurity

Cyber asset attack surface management (CAASM) is the process of identifying, analyzing, and mitigating potential vulnerabilities in an organization’s systems, networks, and devices.

In this presentation, we will discuss:

  • The role of CAASM and attack surface management (ASM) in the future of risk management technologies
  • Key steps including, asset discovery, risk analysis, and implementing controls to reduce the likelihood of a successful attack
  • Different methods of ASM and benefits of automation for continuous management
May 2, 2024
10:00am - 10:30am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
10:30am - 11:00am (Central)
Lares, a Damovo Company | The Executive Guide to Red Team Testing

Red teaming is a proven methodology for identifying vulnerabilities and improving organizational resilience. However, organizations often misunderstand red teaming, resulting in suboptimal outcomes. This talk will provide an executive guide to red teaming to demystify this powerful technique and equip leaders with the knowledge and tools to leverage it effectively.

We will begin by clarifying the meaning of red teaming and outlining what it involves and doesn’t. We will delve into the various components that make up red teaming, encompassing activities such as penetration testing, physical security testing, and adversarial simulations, and analyze the circumstances in which each is most suitable. Also, we will underscore the importance of setting up defined goals, properly scoping the project, and choosing the best team members.

Last but not least, we will tackle the cultural and organizational factors that can influence the outcome of red teaming. We will focus on fostering a culture of ongoing enhancement and employing red teaming to stimulate innovation and strategic planning. Furthermore, we will emphasize the significance of creating an environment of confidence and openness with relevant parties while ensuring seamless integration of red teaming into broader risk management applications.

May 2, 2024
11:00am - 11:15am (Central)
Cloudflare | Moving Towards a Zero Trust Mindset
Moving Towards a Zero Trust Mindset focuses on the shift from a traditional perimeter-based security to a more granular and adaptive approach. By implementing robust authentication/authorization mechanisms and dynamic access controls, organizations can fortify their defenses against evolving cyber threats and safeguard sensitive data effectively.
May 2, 2024
11:15am - 12:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
12:00pm - 1:00pm (Central)
Keynote | Michael Rogers CISO/Director Information Security and Compliance at Hormel Foods | Instant Replay and Cyber Incidents
May 2, 2024
1:00pm - 1:30pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
1:30pm - 2:00pm (Central)
Arctic Wolf | 2024 Threat Report

To build an effective cyber defense, you must understand the offense you will likely face. Who is the adversary? What are their methods? How are they having success? What techniques are they leveraging? In this session, Arctic Wolf will review a summary of their 2024 Threat Report. This recently released report is based on research conducted by the Arctic Wolf Labs Threat Intelligence team and provides a summary of the thousands of IR cases they have performed. After this session, please visit our booth to learn how Arctic Wolf can help you defend against these adversaries and their methods

May 2, 2024
2:02pm - 2:24pm (Central)
Wiz | Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

May 2, 2024
2:20pm - 2:41pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
2:40pm - 3:00pm (Central)
Seemplicity | Optimizing DevSecOps: A Blueprint for Communications and Automation
May 2, 2024
3:00pm - 3:30pm (Central)
Netskope | The Ever Changing Threat Landscape
May 2, 2024
3:30pm - 4:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

May 2, 2024
4:00pm - 5:02pm (Central)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
May 2, 2024
5:00pm - 5:10pm (Central)
Closing Remarks