Agenda

Date and TimeTitle
Dec 4, 2024
8:00am - 8:11am (Central)
Opening Introductions
Dec 4, 2024
8:00am - 8:45am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
8:55am - 9:25am (Central)
Radware | The New Digital Cold War

The global threat landscape is rapidly changing as cybersecurity threats evolve into more sophisticated forms. The proliferation of ransomware groups, the complexity of cloud infrastructure, and the growth in online applications provide more opportunities for criminals than ever. Coupled with the rise of remote work due to the pandemic, information stealing, and social engineering attacks have become more prevalent. Governments and organizations worldwide are heightening their defenses, while some nations are exploring the contentious domain of offensive cyber forces.

The surge in cyberattacks in 2022 can be linked to geopolitical tensions, escalating patriotic hacktivist operations, increased state-sponsored cyber espionage activities, and the global shift to digitalization. However, a new threat landscape emerged in 2023 – religiously and politically motivated hacktivist groups disrupted organizations around the globe through a surge in Distributed Denial of Service (DDoS) attacks. As their influence expands, it poses a potential threat of being co-opted as a proxy for state-controlled cyber activities.

This presentation delves into the shifting cyber threat landscape, the rise of hacktivism, and its implications on global cybersecurity strategies. It further investigates the likelihood of nation-states exploiting hacktivism as a cyber weapon and the possible onset of a new digital cold war.

Dec 4, 2024
9:25am - 9:55am (Central)
TPx | Ancient Wisdom, Modern Warfare: Sun Tzu's Influence on Cybersecurity Defense and Offense

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow CIOs as we explore Sun Tzu’s teachings and their impact on today’s digital battleground. Through examples and case studies, we delve into how his strategies inform our cybersecurity defense and offense tactics, equipping us with the knowledge to stay one step ahead of cyber adversaries. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

Dec 4, 2024
9:55am - 10:25am (Central)
Novacoast | Preventing Scams, Fraud, Theft, and International Espionage with Identity Proofing

What do new hires, customer interactions, and internal communications to the helpdesk all have in common? They are all vulnerable to a rapidly increasing threat from scams, fraud, theft, and even international espionage. They are also all solvable with properly designed identity proofing workflows that leverage the right types of proofing at the right moments. Chris Barngrover, Identity & Access Management Expert from Novacoast,  provides identity proofing best practices for 3 critical uses cases: new hires, customer calls, internal calls.

Dec 4, 2024
10:21am - 10:55am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
10:50am - 11:20am (Central)
Forescout | The Current Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Dec 4, 2024
11:15am - 11:45am (Central)
Myriad360 | Evolving Threats, Unified Defenses: Mastering API and SaaS Security for 2025

As organizations embrace SaaS platforms and API-driven architectures, attackers are rapidly exploiting vulnerabilities in these interconnected systems. This session will explore how the convergence of API security and SaaS Security Posture Management (SSPM) is reshaping cybersecurity strategies. Attendees will gain a deep understanding of:

  • SaaS Security Challenges: The risks inherent in SaaS applications, from misconfigurations to data leakage, and their impact on operational resilience.
  • API Security Threats: Why APIs remain prime targets and how attackers exploit them to infiltrate broader ecosystems.
  • Interdependencies Between APIs and SaaS: How APIs serve as the gateways for SaaS functionality—and potential exploits—highlighting the need for integrated security strategies.

By examining real-world scenarios and emerging trends, this session will empower security leaders to anticipate and address these evolving threats, ensuring they stay ahead of attackers in 2025 and beyond.

Dec 4, 2024
11:47am - 12:15pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
12:15pm - 1:15pm (Central)
Keynote | Staying Cool in the Kitchen
Dec 4, 2024
1:00pm - 1:30pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
1:30pm - 2:00pm (Central)
Proofpoint | Beyond SIEMs, TIPs, and Feeds: Threat Intelligence as a Strategic Tool

Threat intelligence has become the latest requirement for organizations looking to bolster their security practices. Buy a feed or three, suck them into your SIEM, automate blocking IOCs, and check the box. And in many ways, that addresses a sizable chunk of the tactical and operational value of threat intel. However, a growing number of organizations are realizing that threat intel can also inform strategy: how and why we train our users, where we should be investing our security resources, and what kinds of conversations executive leadership should actually be having to avoid becoming the latest cautionary tale used to sell more feeds. Join Proofpoint to learn about the increasingly strategic role of threat intelligence modern businesses.

Dec 4, 2024
2:00pm - 2:30pm (Central)
Imperva, a Thales Company | Redefining Priorities in Data Security: Why Protecting 'Low-Risk' Data is Key to Safeguarding High-Value Assets

In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Thales is at the forefront of redefining this paradigm, asserting the vital importance of safeguarding all data including that categorized as ‘low-risk.’

This counterintuitive strategy of prioritizing low-risk data protection is not just a wise allocation of resources, but a pivotal element in a more effective overall data security strategy. It is particularly crucial for safeguarding high-value and regulated data. In this session, we will explore potent, actionable strategies for successful data security programs. So join us to gain essential insights and tools that will revolutionize your approach to data security.

Dec 4, 2024
2:30pm - 2:45pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
2:45pm - 3:15pm (Central)
Cloudflare | Moving Towards a Zero Trust Mindset

With cyber threats becoming more sophisticated, relying on traditional security models leaves organizations exposed. The Zero Trust mindset challenges these outdated approaches by enforcing continuous trust verification across all resources. Learn how adopting dynamic authentication, real-time monitoring, and a Secure Access Service Edge can minimize breach risks and strengthen your security posture. This session offers insights into building a resilient framework that meets today’s security demands

Dec 4, 2024
3:17pm - 3:39pm (Central)
Wiz | Accelerate AI innovation Securely

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.​

Dec 4, 2024
3:38pm - 4:05pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Dec 4, 2024
4:05pm - 5:05pm (Central)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Workforce Challenges as Latest Cyber Risk."
Dec 4, 2024
5:14pm - 5:23pm (Central)
Closing Remarks