Date and Time | Title | |
---|---|---|
Jan 23, 2025 8:00am - 8:09am (Central) | Opening Introductions | |
Jan 23, 2025 8:00am - 8:45am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 8:45am - 9:15am (Central) | FRSecure | A Complete Security Blueprint Do you know what’s next in your security program? Join Brad Nigh, FRSecure’s Consulting Team Strategist, as he discusses a pragmatic approach to determining what security efforts will give you the most impact. By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program. This is a session you won’t want to miss and there will probably be some dad humor! | ![]() |
Jan 23, 2025 9:15am - 9:45am (Central) | Strac | Data Security in a SaaS, Cloud and Gen AI Era: Lessons Learnt and Best Practices for CISOs and Security Practitioners As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all of which demand innovative solutions beyond traditional security tools. In this session, we’ll dive into: • Emerging risks in SaaS, cloud, and Gen AI environments, including real-world examples of breaches and misconfigurations. • Actionable strategies to gain full visibility into sensitive data, enforce compliance, and protect against insider and external threats. • Case studies highlighting successful approaches to securing sensitive data in Gen AI workflows and SaaS platforms. • Future trends such as Zero Trust principles and AI-driven security automation that will reshape how we protect organizational data. Designed for CISOs and security practitioners, this talk offers practical takeaways to enhance your data security posture while balancing productivity and compliance in a SaaS-first, AI-driven era. | ![]() |
Jan 23, 2025 9:45am - 10:15am (Central) | Halock & Reasonable Risk | Techniques to Evolve Risk Governance: How Executives Make Informed Cyber Decisions Regulators and standards bodies are requiring us to evolve cybersecurity governance. This session will help you understand how to make this work in your favor:
| ![]() |
Jan 23, 2025 10:15am - 10:45am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 10:45am - 11:15am (Central) | Aryaka | The Hidden Risks of GenAI: Challenges in Detecting Data Leaks in GenAI/LLM Transactions The rise of Generative AI (GenAI) and Large Language Models (LLMs) has transformed how businesses operate, but it also introduces new security risks. Sensitive data can inadvertently leak during interactions with these tools, as seen in high-profile incidents like the Samsung data leak (https://mashable.com/article/samsung-chatgpt-leak-details) Also, Traditional Data Loss Prevention (DLP) tools are ill-equipped to detect and prevent such leaks in LLM transactions, creating significant security blind spots. In this session, we will examine few real-world examples of AI-related data exposure, explore why LLM transactions pose unique challenges for existing security frameworks, and discuss practical approaches to mitigating these risks. Attendees will gain insights into evolving their DLP strategies to address the dynamic threats posed by GenAI tools in enterprise environments. | ![]() |
Jan 23, 2025 11:15am - 11:45am (Central) | Contrast Security | Rethinking Cybersecurity for Covert Application Risks Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security. | ![]() |
Jan 23, 2025 11:45am - 12:15pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 12:15pm - 1:15pm (Central) | Keynote | Strategic Security = Alignment to the Organization's Strategy | ![]() |
Jan 23, 2025 1:10pm - 1:40pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 1:40pm - 2:10pm (Central) | Lmntrix | SOC Strategies to Detect Earlier and Respond Faster | ![]() |
Jan 23, 2025 2:10pm - 2:40pm (Central) | Tidal Cyber | Using Threat-Informed Defense to Stop Boiling the Ocean | ![]() |
Jan 23, 2025 2:40pm - 2:55pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 2:55pm - 3:25pm (Central) | Cloudflare | Global Threat Trends and Resilience Strategies | ![]() |
Jan 23, 2025 3:23pm - 3:38pm (Central) | Stream Security | Filling the Void in SecOps Tools with Cloud Context As organizations migrate to the cloud, traditional security operations tools like EDR, SIEM, and XDR often fall short, as they are not designed to address the unique challenges and threats of cloud-native environments. Fragmented data, knowledge gaps, and tools designed for legacy and hybrid rather than cloud-native operations create weak points in threat detection and response. In this session, Stream.Security’s Samuel Galicia, Senior Solutions Architect, will discuss how to bridge these gaps by integrating cloud context into SecOps workflows. Learn how enriching existing tools with cloud context can equip your SOC to effectively combat today’s evolving threats – all while maintaining your security workflow, without the need for extensive retraining. During this session, you will learn:
| ![]() |
Jan 23, 2025 3:40pm - 4:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jan 23, 2025 4:00pm - 5:05pm (Central) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | ![]() |
Jan 23, 2025 5:05pm - 5:20pm (Central) | Closing Remarks |