Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!
Date and Time | Title | |
---|---|---|
Sep 22, 2021 8:00am - 8:04am (Central) | Opening Introductions | |
Sep 22, 2021 8:00am - 8:55am (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win prizes! | |
Sep 22, 2021 8:55am - 9:33am (Central) | SentinelIPS | CIS Controls in the Real World | Ted Gruenloh, Chief Operating Officer As a vendor, we witness first-hand the tangible effect that best practices like the CIS Controls have on our customers’ network security. From our perspective, it’s easy to see who is on top of their security game … and who could really benefit from the guidance these controls provide. In this discussion, we’ll walk through several of the CIS Controls, review the changes to the new V8, and provide real-world case studies to illustrate how different security tools and services can work together – sometimes in not-so-obvious ways – to reduce risk, and keep your network safe and secure. | |
Sep 22, 2021 9:33am - 10:01am (Central) | Check Point | A Strategy For Securing Your Everything; How Non-Integrated Solutions Challenge Overall Enterprise Security | Grant Asplund Chief Cyber Security Evangelist Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies. These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices. Join Grant Asplund, Growth Technologies Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:
| |
Sep 22, 2021 10:00am - 10:30am (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win prizes! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! | |
Sep 22, 2021 10:30am - 11:35am (Central) | Keynote | SentinelOne | What Elon Musk and SpaceX Can Teach Us About Ransomware and Cybersecurity | Morgan Wright Cyberterrorism and Cybercrime Analyst, Network Television Chief Security Advisor, SentinelOne | |
Sep 22, 2021 11:30am - 12:15pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win prizes! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! | |
Sep 22, 2021 12:15pm - 12:31pm (Central) | Okta | Build vs. Buy: Advantages of a Pre-Built Solution | John Wilke, Senior Product Marketing Manager In this session John Wilke will guide you through the advantages of a pre-built identity solution. He will review how identity used to be a cost center and now it is viewed as a business enabler and strategic initiative. He will also help you compare the options when looking to build out a modern identity solution. We look forward to seeing you! | |
Sep 22, 2021 12:31pm - 1:00pm (Central) | Malwarebytes | Protecting Your Organization from the Business of Ransomware | Robert Zamani, Senior Director of Engineering Ransomware attacks are estimated to be occurring every 11 seconds. Their frequency and complexity continue to increase as threat actors double down on ransomware attacks. But why? Because ransomware is a business for many. The profitability of ransomware grow as we continue to troubleshoot by paying the ransom. But what’s the alternative? Join this session to learn more about:
| |
Sep 22, 2021 1:00pm - 1:15pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win prizes! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! | |
Sep 22, 2021 1:15pm - 1:44pm (Central) | Infoblox | Transitioning DNS from IT Utility to Security Strategy | Jeff Miller Specialist | |
Sep 22, 2021 1:44pm - 2:15pm (Central) | Beyond Trust | Best Practices: PAM Security & Data Privacy | Christopher Hills, Deputy Chief Technology Officer What is best practice? Best practices range from organization to organization as a result of each organizations risk appetite and risk tolerance. Learn about an effective approach to the most often asked questions surrounding access management strategy, maturity and priorities, and security risks. In this revealing presentation you’ll learn how to answer the question of what, how and why: | |
Sep 22, 2021 2:15pm - 2:30pm (Central) | Sponsor Networking Time | Chat with a sponsor for the chance to win prizes! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! | |
Sep 22, 2021 2:30pm - 2:55pm (Central) | Bitglass | Rise of Secure Access Service Edge (SASE) | Kevin Sheu, Senior VP of Marketing Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:
| |
Sep 22, 2021 2:55pm - 3:20pm (Central) | Microsoft | Transforming the Employee Experience with a Zero Trust Strategy | Sue Bohn Vice President of Program Management | Ann Johnson Corporate Vice President - Security, Compliance, & Identity Support your employees working remotely by providing more secure access to corporate resources through continuous assessment and intent-based policies. Listen to Sue Bohn and Ann Johnson explain Zero Trust. | |
Sep 22, 2021 3:20pm - 3:30pm (Central) | Virtual Closing Remarks | Prize Drawing Winners Announced |