Date and Time | Title | |
---|---|---|
Apr 21, 2021 8:00am - 8:05am (Central) | Opening Introductions | Start the Event Game! | |
Apr 21, 2021 8:05am - 8:55am (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 8:55am - 9:00am (Central) | Session Kickoff with Kim Hakim | |
Apr 21, 2021 9:00am - 9:30am (Central) | Exabeam | Why SOC’s Fail: The Maturity Model Required for Cyber Resiliency | Stephen Moore, Vice President and Chief Security Strategist & Luke Voigt, Vice President, Customer Success Billions of dollars are spent annually to set up SOCs across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are SOCs failing? Listen as Exabeam’s Steve Moore and Luke Voigt talk about why SOCs always fail when built under the current operating model. And what to do to make SOCs more cyber resilient using a simple maturity model based on outcomes and use cases. Key Learnings:
| ![]() |
Apr 21, 2021 9:30am - 10:03am (Central) | Red Canary | 5 Critical Pillars for the SOC of the Future | Keith McCammon, Chief Security Officer & Co-Founder This year has seen nearly everything change to some degree—including within the Security Operations Center (SOC). Not only are we seeing a fast-evolving and surging threat landscape with which we must keep up, but we’re also contending with the business’s shifting priorities, budgets, and headcounts—all of which impact how the SOC can operate. To ensure we can continue to stave off threats in this new world, we must make sure the foundational elements of our SOC are in place:
This session will cover considerations for CISOs and infosec leaders within each of these five critical pillars. We’ll explore how organizations can make the most of limited resources and close skills gaps by carefully balancing their internal team’s competencies with outside expertise. Learn the steps you can take to establish a modern, efficient, and ultimately successful SOC of the future. | ![]() |
Apr 21, 2021 10:00am - 10:15am (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 10:15am - 11:25am (Central) | Keynote | "The Biggest Breaches and What They Mean for the Future of Cybersecurity" | Dr. Neil Daswani, Director, Stanford University Advanced Security This talk covers the key lessons learned and root causes from the biggest mega-breaches over the past several years, and analyzes their correlation to the over $45 billion invested in cybersecurity thus far. Based on hard data of over 4,000 cybersecurity companies that have been funded thus far, and what they have focused on to-date, some hypotheses on where future investment is required will be presented. Whether you’re interested in how your current company is positioned for the future of cybersecurity, considering a job change, or even potentially starting a cybersecurity company yourself, this talk will arm you with the information that you need about the security landscape, both on the business and technology fronts. Future trends in cybersecurity will also be discussed. | ![]() |
Apr 21, 2021 11:15am - 11:30am (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 11:30am - 11:50am (Central) | Accellion | Conquering Cyber Risk in 3rd Party Communications | Bob Ertl, Sr. Director, Product Marketing The Enterprise Content Firewall To do their jobs, employees must share IP, PII, PHI, and all means of sensitive content with customers, suppliers, partners and a broad ecosystem of trusted 3rd parties. However, they put the organization at risk when they communicate across untrusted devices, networks, applications and identities. How can you prevent beaches and compliance violations from everyday 3rd party communications when you can’t even see what’s going on? This session explores the need for a next-generation “content firewall” that rises above packets and traffic to inspect content and communication, and thereby ensure confidentiality, compliance and control of risky 3rd party business processes. | ![]() |
Apr 21, 2021 12:00pm - 1:05pm (Central) | CISO Panel | “The Race to Secure Your Supply Chain” | Laureen Smith VP Global Strategic Alliances | Helen Mohrmann CISO | John L. Sullivan Global CISO and Resiliency Officer | Jason Lewkowicz Global CISO Join this panel of industry experts for tips on how to implement a third-party risk management program and reduce your exposure to a supply chain breach. | ![]() |
Apr 21, 2021 1:00pm - 1:15pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 1:15pm - 1:45pm (Central) | Blumira | Building Intentional Security in a Time of Complexity | Matthew Warner, CTO & Co-Founder The information security industry has hit an inflection point of complexity at the same time as ransomware is rising to become a $20 billion industry for cybercriminals. Why is information security so hard? Why hasn’t it been solved yet? And what is a good approach to building an intentional security strategy in the midst of all this chaos? This session explores what exactly makes infosec so complicated, and how companies can start to solve those challenges through a positive and thoughtful security approach. | ![]() |
Apr 21, 2021 1:45pm - 2:17pm (Central) | Duo | Past, Present, Future: Zero Trust Architecture | J. Wolfgang Goerlich, Advisory CISO and Strategist In this webinar you will learn:
Data breaches grab headlines. Good security is steady. As organizations expand their perimeter beyond the firewall through software-as-a-service (SaaS) and hybrid applications, it becomes more important than ever to have a strategy covering user access regardless of location. But alongside developments in new tools, data privacy laws have also developed and add to compliance requirements for managing these data and tool. Meanwhile, modernization efforts are introducing new risks as well. While many industries have adopted zero-trust strategies to address these challenges of the expanded perimeter, many admins remain wary of this trend and question if it is a fit for environments which often have a hefty legacy technology footprint. However, many of these “new” strategies remain firmly rooted in tried-and-true best practices admins have followed for decades. The principles of logical segmentation, least-permissive access, economy of mechanism, adaptive policy controls, and strong authentication are simply evolving to accommodate new use cases rather than being replaced. Join this session with Duo Security Advisory CISO Wolfgang Goerlich for a grounded discussion of the unique needs and concerns for modern IT teams based on real-world examples, and how concepts like device trust and context-aware access can improve security design without leaving crucial inherited or legacy systems out in the cold. | ![]() |
Apr 21, 2021 2:17pm - 2:30pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 2:30pm - 2:55pm (Central) | Illumio | Securing Apps in SDN & Hybrid-Cloud Environments | Nathanael Iversen, Chief Evangelist | ![]() |
Apr 21, 2021 2:55pm - 3:25pm (Central) | Crowdstrike | Securing the Cloud Control Plane - How to Make Security Predictable in the Cloud | Spencer Parker, Senior Director of Product Management & Sowmya Karmali, Director of Product Management More than ever, organizations are grappling with how to secure cloud-native applications. Protecting these applications — a combination of containers, virtual machines, APIs and serverless functions — from development to runtime requires reworking the approach many organizations take toward security. In a new survey from Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments. Join CrowdStrike’s session to learn how to make security more predictable in the cloud. Spencer Parker and Sowmya Karmali will highlight best practices that DevOps and SecOps teams can employ to secure your applications in the cloud. Attendees will:
| ![]() |
Apr 21, 2021 3:25pm - 3:40pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 3:40pm - 4:10pm (Central) | ReversingLabs | The Malware Lab: Rethinking Enterprise File Analysis | Chip Epps, Director of Product & Solutions Cyberthreats represent one of the most significant risks to modern businesses. Malware is pervasive; embedded in videos, hidden in software updates, and uploaded by unsuspecting customers. Yet the tools to investigate these threats are often manual and burdensome to maintain. Organizations recognize these challenges, but simply don’t know how to get started. This session is a great opportunity to hear about a growing trend from one of ReversingLabs experts, Chip Epps. Chip will discuss centralizing the challenging tasks of investigating files and providing actionable intelligence to the entire organization. Some other areas of focus include:
| ![]() |
Apr 21, 2021 4:10pm - 4:20pm (Central) | Sponsor Networking Time | Sponsor Prize Drawing must be in attendance to win | |
Apr 21, 2021 4:20pm - 4:40pm (Central) | Darktrace | Faking It: Stopping Impersonation Attacks with Cyber AI | Mariana Pereira, Director of Email Security Products Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session. | ![]() |
Apr 21, 2021 4:40pm - 5:05pm (Central) | Tenable | Seeing the forest through the trees - A risked based approach to maturing your VMP | Rob Walk, Sr. Security Engineer | ![]() |
Apr 21, 2021 5:05pm - 5:15pm (Central) | Last Chance | Sponsor Networking Time | Chat with a sponsor for the chance to win a Nintendo Switch Lite Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with a sponsor for the chance to win a Nintendo Switch Lite | |
Apr 21, 2021 5:15pm - 5:25pm (Central) | Closing Remarks | Sponsor Prize Drawing |