Agenda

Date and TimeTitle
Feb 13, 2025
8:00am - 8:05am (Eastern)
Opening Introductions
Feb 13, 2025
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
9:00am - 9:30am (Eastern)
Cloudflare | Stacking Your Security: A Smarter Approach to Application Defense

Applications and websites are now prime targets for DDoS attacks, bot-driven abuse, and zero-day exploits. As threats grow more sophisticated and cheaper to launch, a single layer of security is no longer enough.

In this session, we’ll walk through why a stacked security approach is essential—starting with DDoS protection at the edge, moving through web application firewalls and bot management, and closing with rate limiting and origin security. 

Feb 13, 2025
9:30am - 10:00am (Eastern)
Cofense | Exposing Risk Exposure Gaps

In today’s rapidly evolving cybersecurity landscape, organizations face a broad spectrum of threats and risk exposures that are increasingly sophisticated and pervasive. With the constant emergence of new technologies and strategies, it is easy to become distracted by the latest trends and innovations, often overlooking security risks that hide in plain sight. However, the very areas we fail to recognize can provide valuable insights that threat actors can exploit to refine their attacks.
This session will focus on the often overlooked or hidden risk exposure gaps that adversaries leverage to gather intelligence on your organization. Through real-world examples, we will explore how threat actors identify and target these gaps to tailor their social engineering, phishing, and malware campaigns, ultimately working to breach your defenses. Attendees will gain actionable strategies to identify and mitigate these overlooked areas to help strengthen their organization’s security posture.

Feb 13, 2025
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
10:30am - 11:00am (Eastern)
Hughes Network Systems | The Convergence of Networking and Security
Feb 13, 2025
10:54am - 11:14am (Eastern)
ESET | Securing the Future: Cyber Risk Insurance Essentials in an AI-Driven Digital Landscape
Feb 13, 2025
11:14am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
12:00pm - 12:50pm (Eastern)
Keynote | The Cost of a Data Breach – Financial and Reputational Risks
Feb 13, 2025
12:50pm - 1:25pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
1:25pm - 2:00pm (Eastern)
Tidal Cyber | Using Threat-Informed Defense to Stop Boiling the Ocean
It’s a simple question at the root of what we do as security professionals: Can we defend our assets and infrastructure against a specific threat? Answering this question using traditional methods and without Threat-Informed Defense is time-consuming, expensive, and most likely just a guess.
Feb 13, 2025
2:00pm - 2:30pm (Eastern)
Druva | From Crisis to Confidence: How Data Protection Can Enhance Your Incident Response and Recovery
Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add yet another security tool.

Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. Learn what a data security and protection partner like Druva can do to help strengthen your security posture and streamline your incident response and recovery workflows. We will cover:

  • What typically occurs in each phase of a cyber attack
  • Common security coverage gaps in your data infrastructure
  • How to work better with your IT and backup teams
Feb 13, 2025
2:25pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
2:45pm - 3:15pm (Eastern)
Stream.Security | Filling the Void in SecOps Tools with Cloud Context

As organizations migrate to the cloud, traditional security operations tools like EDR, SIEM, and XDR often fall short, as they are not designed to address the unique challenges and threats of cloud-native environments. Fragmented data, knowledge gaps, and tools designed for legacy and hybrid rather than cloud-native operations create weak points in threat detection and response. In this session, Stream.Security’s Samuel Galicia, Senior Solutions Architect, will discuss how to bridge these gaps by integrating cloud context into SecOps workflows. Learn how enriching existing tools with cloud context can equip your SOC to effectively combat today’s evolving threats – all while maintaining your security workflow, without the need for extensive retraining.

 

During this session, you will learn:

  • How cloud threats have significantly shifted today’s threat landscape, impacting modern security defenses
  • Practical methods to complement your existing security stack with cloud-native context, adapting to the cloud threats
  • How to integrate Cloud Detection & Response (CDR) seamlessly into your security workflows
Feb 13, 2025
3:10pm - 3:40pm (Eastern)
Skybox Security | Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch

Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever, correlated to the importance of the asset or its exposure to potential attack across the network.

To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.

In this session, you will learn:

  • How your assets, networks, business, and security data visibility impacts vulnerability risk.
  • What scanners miss in discovery and prioritization, and how to fill the gaps.
  • How to reduce the scan-and-patch lag from weeks to hours.

Join Jessie Gibbons as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.

Feb 13, 2025
3:30pm - 4:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Feb 13, 2025
4:00pm - 5:00pm (Eastern)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Feb 13, 2025
4:58pm - 5:05pm (Eastern)
Closing Remarks