Session Details Coming Soon

Virtual Summit
Chicago Virtual Cybersecurity Summit
The Chicago Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Tue. Apr 20 — Wed. Apr 21
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Central Standard Time (CST)
- Welcome
- Breakfast Briefing 8:55 am
- Welcome / Introductions
-
Understanding and Combating Credential Stuffing Attacks 9:25 am
Presented by Auth0
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
- How credential stuffing attacks work
- What effect they can have on your company
- Steps to detect and mitigate these attacks
Panel Participants:
-
Using Security Testing to know What’s Working 9:45 am
Presented by Cymulate
The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.
Panel Participants:
- Morning Coffee Break
-
Why do Small Businesses Need Big Protection? 10:20 am
Presented by Cisco
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Panel Participants:
-
IoT Security Is Bad. It’s Time For a Different Approach 10:45 am
Presented by Ordr
For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.
Panel Participants:
- Expert Panel Discussion #1 11:05 am
- Lunch Break
-
Lunch Sponsor/Briefing 11:50 am
Session Details Coming Soon
-
Keynote: 12:15 pm
Session Details Coming Soon
-
Automate or Die Trying: The New Cybersecurity Reality 1:10 pm
Presented by Armor Defense
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our session to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 1:30 pm
Session Details Coming Soon
- Afternoon Coffee Break
-
Securely Connecting the Right People to the Right Technologies 2:05 pm
Presented by Okta
As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.
Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.
Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.
-
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 2:30 pm
Presented by Remediant
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
- Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
- So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Panel Participants:
-
Expert Panel Discussion #2 2:50 pm
Session Details Coming Soon
- Afternoon Break
-
Subject Matter Expert Session - More Details To Come 3:35 pm
Session Details Coming Soon
-
Guest Keynote: 3:55 pm
Session Details Coming Soon
- Day One Closing Session
- Day Two
- Breakfast Briefing 8:55 am
- Welcome / Introductions
-
Subject Matter Expert Session - More Details To Come 9:25 am
Session Details Coming Soon
-
The Cloud Requires an Evolution Beyond the Secure Email Gateway 9:45 am
Presented by Avanan
Cloud email requires a new approach to security. If your corporate email relies on Microsoft or Google, you may have deployed (or are considering) a Secure Email Gateway (SEG). Originally designed as a perimeter solution for on-premise email, you should ask these questions:
- Why do you disable the native security in our platform?
- How can my configuration allow attackers to bypass the gateway?
- How do we block insider email attacks?
- How can we quarantine a compromised account?
- How can we prevent Business Email Compromise (BEC) or impersonation email attacks?
Our cloud security expert Jeff will explain where an SEG approach falls short protecting cloud-hosted email. Touch upon fundamental architectural weaknesses of a proxy design, and arm attendees to help them make smart decisions to protect their users.
Panel Participants:
- Morning Coffee Break
-
Subject Matter Expert Session - More Details To Come 10:20 am
Session Details Coming Soon
- Subject Matter Expert Session - More Details To Come 10:45 am
- Expert Panel Discussion #3 11:05 am
- Lunch Break
-
Lunch Sponsoring / Briefing 11:50 am
Session Details Coming Soon
- Keynote: 12:15 pm
- Subject Matter Expert Session - More Details To Come 1:10 pm
- Subject Matter Expert Session - More Details To Come 1:30 pm
- Afternoon Coffee Break
-
Subject Matter Expert Session - More Details To Come 2:05 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 2:30 pm
Session Details Coming Soon
-
Expert Panel Discussion #4 2:50 pm
Session Details Coming Soon
- Afternoon Break
- Subject Matter Expert Session - More Details To Come 3:30 pm
-
CISO Panel 3:55 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
- Summit Final closing Session