Date and Time | Title | |
---|---|---|
Aug 22, 2024 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 8:00am - 8:09am (Eastern) | Opening Introductions | |
Aug 22, 2024 9:00am - 9:25am (Eastern) | DRTConfidence | Continuous Compliance (cATO) with ML and OSCAL Achieving continuous compliance (cATO) requires integration with development teams, security teams, security tools, authorizing officials, and DevOps platforms. A ‘common data fabric’ is necessary to enable standardized information exchange and automate analysis. OSCAL is the data fabric that allows for standardized data exchange across all security operations and sets the foundation for achieving a continuous compliance posture. Learn how security teams can transition to a robust cATO compliance framework. | |
Aug 22, 2024 9:25am - 9:55am (Eastern) | Myriad360 | Vendor Inventory & Security Sprawl Analysis (VISSA) | |
Aug 22, 2024 9:55am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 10:30am - 11:00am (Eastern) | Imperva, a Thales company | Why is Critical data being compromised? | |
Aug 22, 2024 11:00am - 11:30am (Eastern) | ESET | Cyber insurance is an important part of cyber resilience, but is it creating monoculture cybersecurity? Recent events have caused many companies to revisit their cyber resilience strategy – where cyber risk insurance is often seen as an essential element. Join us to gain a comprehensive insight into some of the recent major cyber-incidents, discoveries by researchers, the role insurers are playing in improving cybersecurity posture and their approach to managing risk. Understanding insurance requirements and how they change could provide valuable insight into risk reduction. We will also cover the increasing dangers of a monoculture cybersecurity ecosystem. | |
Aug 22, 2024 11:30am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 12:00pm - 1:05pm (Eastern) | Keynote | The changing dynamics of a CISO role in the age of AI | |
Aug 22, 2024 1:00pm - 1:30pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 1:30pm - 2:00pm (Eastern) | Contrast Security | What XDR Can't See: Detecting and Responding to Application and API Security Incidents Cybersecurity products detect and respond to incidents in production involving endpoints, servers, cloud, networks, and more. The glaring exception is the application layer. Enterprises have a massive application and API vulnerability backlog, over 1,100,000 according to Ponemon and fixing them with traditional application security programs will take years. So we need a strategy to prevent existing flaws from being exploited, not to mention new vulnerabilities and zero-days in open source libraries. In this session, we’ll explore application and API protection in the security operations ecosystem. Legacy approaches, like web application firewalls haven’t been very effective and don’t integrate into existing XDR, SIEM, and SOAR ecosystems. We’ll discuss the rise of Application Detection and Response (ADR) products and how they gather events by directly monitoring running applications and APIs, how they generate a “security blueprint” of every workload, and how they discover real attacks and prevent exploits. We’ll also discuss how ADR supports “shift left” efforts with the context needed to prioritize risks effectively in development and how ADR streamlines threat modeling and penetration testing to make them more cost effective. | |
Aug 22, 2024 2:00pm - 2:30pm (Eastern) | Gradient Cyber | AI-Infused MXDR and the Autonomous SOC MXDR helps organizations detect and respond to cyber-attacks before the attacker’s objective is completed. This presentation will cover:
How AI will drive the “Autonomous SOC” Our presentation will show how MXDR compresses mean-time-to-detect and mean-time-to-respond at the lowest possible cost, and how AI will soon collapse all three. | |
Aug 22, 2024 2:30pm - 2:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 2:45pm - 3:15pm (Eastern) | MySQL | “Data Breach Disasters: Tales from the Crypt of Insecure MySQL Servers and How to Avoid a Scary Ending In the age of digital transformation, data breaches are the modern-day boogeyman, lurking in the shadows of poorly secured databases. This presentation will take you on a thrilling journey through some of the most notorious data breaches in recent history—each a cautionary tale of what can go wrong when security is an afterthought. From ransomware rampages that crippled healthcare systems to massive leaks of sensitive information from unsecured MySQL databases, we’ll explore how these attacks unfolded and the costly consequences that followed. But fear not! We’ll also provide you with the ultimate toolkit to exorcise these demons from your systems. Learn practical, battle-tested strategies to secure your MySQL Server, including tips on encryption, access control, and timely patching. By the end of this session, you’ll be equipped with the knowledge to defend your organization’s data from even the most cunning cybercriminals. Don’t let your company’s data be the next ghost story—join us and turn these scary tales into lessons for a secure future! | |
Aug 22, 2024 3:15pm - 3:45pm (Eastern) | Cloudflare | Shadow AI: Reducing Risk while Driving Innovation Generative AI can be a catalyst for solving large complex social problems. As with any emerging technology, public sector organizations are grappling with how to harness those benefits while protecting the citizens they serve. In the face of growing legislation around the development, use and consumption of AI technologies, organizations need to understand how these technologies expose risk to not only for themselves, but also their constituency. The potential exposure of internal and citizen data to public insecure training data sets raises risk. These risks are forming the basis for emerging laws and regulations. “Shadow AI” must be addressed with a comprehensive approach to governance and control to allow the safe and responsible use of AI platforms. This session will discuss the implications of Shadow AI and factors that organizations and institutions need to consider in this space. The session will also outline various mitigation strategies and relevant controls to address the threat allowing for the safe consumption of AI as an innovation accelerator. | |
Aug 22, 2024 3:45pm - 4:10pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Aug 22, 2024 4:05pm - 5:05pm (Eastern) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | |
Aug 22, 2024 5:05pm - 5:20pm (Eastern) | Closing Remarks |