Event Schedule

Times for this Event are in Central Standard Time (CST)

  • Welcome
  • Breakfast Briefing 8:40 am

    Meet the Exhibitor

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Welcome /Introductions
  • Understanding and Combating Credential Stuffing Attacks 9:05 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    •       How credential stuffing attacks work
    •       What effect they can have on your company
    •       Steps to detect and mitigate these attacks
    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer

    Collapse This Item

  • A People-Centric Approach to Cyber Risk Management 9:30 am

    Presented by Proofpoint

    Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated. 

    Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks. 

    During this presentation, we’ll cover:

    • The clearly defined risk areas that are frequently targeted in cyber-attacks, with clear examples and use cases
    • How organizations can implement a People-Centric security approach, decreasing their vulnerability to cyber threats.

     

    Click to Expand

    Panel Participants:

    Jack Johnson
    Jack Johnson

    Jack Johnson

    Sr. Systems Engineer

    Collapse This Item

  • Morning Coffee Break
  • IoT Security Is Bad. It’s Time For a Different Approach 10:10 am

    Presented by Ordr

    For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 10:30 am

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Identity & Access 2021 - Expert Panel Discussion 10:50 am

    Identity & Access 2021

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?

    Click to Expand

    Collapse This Item

  • Morning Break
  • Moving Beyond Password to Delight & Secure Users 11:35 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Automate or Die Trying: The New Cybersecurity Reality 11:55 am

    Presented by Armor Defense

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.

    Join our session to learn:

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Panel Participants:

    Ryan Smith
    Ryan Smith

    Ryan Smith

    Vice President of Product

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing 12:20 pm

    Meet the Exhibitor

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Keynote: Navigating a Tripolar Data Privacy World in 2021 12:45 pm

    Jay Cline: U.S. Privacy Leader, Principal, PwC U.S.

    The past several years have seen the emergence of three perspectives on data privacy, with Beijing, Brussels, and the U.S. enshrining different policies and approaches to allow consumers to protect their data. 

    The U.S., which notably lacks federal privacy legislation, has seen state-level policymakers and regulators take the lead in establishing legislation and holding firms accountable that have been perceived to break the rules. In comparison, the European Union has legislated out of Brussels a series of stringent protections that enshrine data privacy as a consumer right. Lastly, China, which enacted privacy legislation in its civil code just this past year, has emphasized centralized control of data. 

    Jay will overview this emerging global tripolar data privacy environment and describe how societies around the world are being drawn into the gravitational pull of these three philosophies. Grounded in this understanding, he will detail the steps that multinational businesses with operations in one or more of these regions can take to not only position themselves to better manage an increasingly fragmented regulatory environment, but to use compliance as a competitive advantage. 

    Click to Expand

    Panel Participants:

    Jay Cline
    Jay Cline

    Jay Cline

    U.S. Privacy Leader and a Co-Leader, PwC U.S.

    Collapse This Item

  • The SolarWinds Data Breach: A Whole New World 1:30 pm

    The 2020 data breach of the federal government ushers in a “brave new world” of cybercrime - here’s what we know so far.

    The 2020 data breach of the Federal Government: What we know and how it ushers in a brave new world.

    Click to Expand

    Panel Participants:

    Steven Creason
    Steven Creason

    Steven Creason

    Adjunct/Affiliated Professor

    Collapse This Item

  • Practical Cyber Fusion – Operationalizing Threat Intelligence 1:45 pm

    Presented by Anomali

    “Cyber Fusion Centers” have moved from radical concept to marketing hype in just a few years. However, the concept is still important. Don’t let the hype stop you from grasping the true value a cyber fusion center can provide. 

    The cyber fusion center can be a worthwhile pursuit if the outcome is the ability to use threat intelligence to drive coordinated decisions across your security organization and functions to improve the overall security posture. 

    Anomali Chief Product Officer, Mark Alba, reviews the basic principles of cyber threat intelligence (CTI) maturity levels and explores how a virtual cyber fusion center can be leveraged to support the effective operationalization of CTI.

    Click to Expand

    Panel Participants:

    Mark Alba
    Mark Alba

    Mark Alba

    Chief Product Officer

    Collapse This Item

  • Afternoon Coffee Break
  • User-Centered Security - Expert Panel Discussion 2:15 pm

    User-Centered Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Click to Expand

    Collapse This Item

  • Challenges of cloud: How it makes an already difficult situation even harder 2:40 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Panel Participants:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 3:00 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Afternoon Break
  • Innovation in Cybersecurity - Expert Panel Discussion 3:35 pm

    Innovation in Cybersecurity - IoT, AI, ML

    So many quickly evolving technology advances are shaping the way we think about addressing most cybersecurity issues in 2021.  Artificial Intelligence (AI) and Machine Learning (ML) have the potential to automate and aid overworked Security Operations Centers (SOCs), The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.

    Our Expert Panel will discuss where these technologies are going, how fast they are advancing and what is coming next.

    Click to Expand

    Panel Participants:

    Kim Berry
    Kim Berry

    Kim Berry

    Principal Threat Intelligence Researcher - Auth0

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 4:05 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • CISO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Matt Ireland
    Matt Ireland

    Matt Ireland

    Chief Information Security Officer - NTT, Ltd.

    Patrick Joyce
    Patrick Joyce

    Patrick Joyce

    VP - Global Information Technology & CISO - Medtronic

    Collapse This Item

  • Summit Final Closing Session

Registration

Wed. Feb 10

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Register