Date and Time | Title | |
---|---|---|
May 23, 2024 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 8:00am - 8:09am (Eastern) | Opening Introductions | |
May 23, 2024 9:00am - 9:30am (Eastern) | Illumio | Breach Containment: Assuming breach and isolating threats. | |
May 23, 2024 9:30am - 10:00am (Eastern) | Imperva a Thales company | Why is Critical data being compromised? | |
May 23, 2024 10:00am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 10:30am - 11:00am (Eastern) | Cavelo | Advancing Cybersecurity in the AI Era: Embracing Vulnerability Management and Attack Surface Management | |
May 23, 2024 10:55am - 11:30am (Eastern) | Netwrix | Securing Tomorrow: Mitigating Risks Across Data, Identity, and Infrastructure Organizations today face unprecedented cybersecurity challenges, including sophisticated ransomware attacks, the exploitation of artificial intelligence, evolving compliance mandates, and the complexities of cyber insurance. This talk highlights solutions for protecting three critical security layers: data, identity, and infrastructure. We’ll address strategies and best practices that enable organizations of all sizes to identify, protect against, detect, respond to, and recover from cyber-attacks. | |
May 23, 2024 11:25am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 12:00pm - 12:45pm (Eastern) | Keynote | Ron Bevans Vice President, Technology & Data Protection Officer at BenefitHub | "Bridging the Gap between IT and the Business" | |
May 23, 2024 12:45pm - 1:15pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 1:15pm - 1:45pm (Eastern) | Proofpoint | Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses. | |
May 23, 2024 1:45pm - 2:06pm (Eastern) | Wiz | Accelerate AI innovation Securely As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely. | |
May 23, 2024 2:05pm - 2:25pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 2:25pm - 2:55pm (Eastern) | Netskope | Securing the Future: Enhancing Government Cybersecurity with Netskope's Unified Approach In an era where digital infrastructure and data integrity are foundational to national security and democratic processes, the significance of robust cybersecurity measures cannot be overstated. As we navigate through a critical election year, the vulnerability of state and federal agencies to cyber threats poses unprecedented challenges. Misconfigurations, vulnerabilities, third-party risks, and misuse of applications across SaaS, IaaS, or privately hosted services have opened avenues for both foreign and domestic adversaries to exploit. This presentation delves into the intricate landscape of cyber threats facing government agencies and outlines strategic measures to fortify defenses. Featuring Netskope’s Unified CASB (including SSPM, CSPM, and CASB), Cloud Confidence Index (CCI), and the implementation of Continuously Adaptive Access through its Security Service Edge (SSE) and Zero Trust Engine, participants will gain insights into pioneering approaches for safeguarding the nation’s digital frontiers. | |
May 23, 2024 2:55pm - 3:25pm (Eastern) | Forcepoint | AI is shaping our future In today’s digital landscape, where cyber security is synonymous with data security, safeguarding sensitive information is paramount across all sectors due to the prevalence of cyber threats and the increasing volume of data. To effectively address these challenges, a programmatic approach to data security is essential, encompassing a range of technical, procedural, and human-centric measures. This approach involves implementing a layered defense strategy that includes asking fundamental questions such as “What data do you really have?”, “Who should or shouldn’t have access?”, and “What should they be allowed to do?” Collaboration and information-sharing among organizations are also crucial for enhancing collective resilience against cyber threats. Presented by Jason Rice, Vice President with Forcepoint, this discussion underscores how adopting a programmatic approach to data security enables organizations to mitigate risks, bolster resilience, and maintain trust in an interconnected digital ecosystem where cyber security is fundamentally synonymous with data security. | |
May 23, 2024 3:25pm - 4:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 23, 2024 4:00pm - 5:00pm (Eastern) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | |
May 23, 2024 5:00pm - 5:10pm (Eastern) | Closing Remarks |