Session Details Coming Soon

Virtual Summit
Minneapolis & Des Moines Virtual Cybersecurity Summit
The Minneapolis & Des Moines Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. Feb 10
Event Schedule
Times for this Event are in Central Standard Time (CST)
- Welcome
- Breakfast Briefing 8:40 am
- Welcome /Introductions
-
Understanding and Combating Credential Stuffing Attacks 9:05 am
Presented by Auth0
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
- How credential stuffing attacks work
- What effect they can have on your company
- Steps to detect and mitigate these attacks
Panel Participants:
-
A People-Centric Approach to Cyber Risk Management 9:30 am
Presented by Proofpoint
Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated.
Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks.
During this presentation, we’ll cover:
- The clearly defined risk areas that are frequently targeted in cyber-attacks, with clear examples and use cases
- How organizations can implement a People-Centric security approach, decreasing their vulnerability to cyber threats.
Panel Participants:
- Morning Coffee Break
-
IoT Security Is Bad. It’s Time For a Different Approach 10:10 am
Presented by Ordr
For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 10:30 am
Session Details Coming Soon
-
Identity & Access 2021 - Expert Panel Discussion 10:50 am
Identity & Access 2021
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?
- Morning Break
-
Moving Beyond Password to Delight & Secure Users 11:35 am
Presented by Okta
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
-
Automate or Die Trying: The New Cybersecurity Reality 11:55 am
Presented by Armor Defense
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our session to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
Panel Participants:
- Lunch Break
- Lunch Sponsor / Briefing 12:20 pm
-
Keynote: Navigating a Tripolar Data Privacy World in 2021 12:45 pm
Jay Cline: U.S. Privacy Leader, Principal, PwC U.S.
The past several years have seen the emergence of three perspectives on data privacy, with Beijing, Brussels, and the U.S. enshrining different policies and approaches to allow consumers to protect their data.
The U.S., which notably lacks federal privacy legislation, has seen state-level policymakers and regulators take the lead in establishing legislation and holding firms accountable that have been perceived to break the rules. In comparison, the European Union has legislated out of Brussels a series of stringent protections that enshrine data privacy as a consumer right. Lastly, China, which enacted privacy legislation in its civil code just this past year, has emphasized centralized control of data.
Jay will overview this emerging global tripolar data privacy environment and describe how societies around the world are being drawn into the gravitational pull of these three philosophies. Grounded in this understanding, he will detail the steps that multinational businesses with operations in one or more of these regions can take to not only position themselves to better manage an increasingly fragmented regulatory environment, but to use compliance as a competitive advantage.
Panel Participants:
-
The SolarWinds Data Breach: A Whole New World 1:30 pm
The 2020 data breach of the federal government ushers in a “brave new world” of cybercrime - here’s what we know so far.
The 2020 data breach of the Federal Government: What we know and how it ushers in a brave new world.
Panel Participants:
-
Practical Cyber Fusion – Operationalizing Threat Intelligence 1:45 pm
Presented by Anomali
“Cyber Fusion Centers” have moved from radical concept to marketing hype in just a few years. However, the concept is still important. Don’t let the hype stop you from grasping the true value a cyber fusion center can provide.
The cyber fusion center can be a worthwhile pursuit if the outcome is the ability to use threat intelligence to drive coordinated decisions across your security organization and functions to improve the overall security posture.
Anomali Chief Product Officer, Mark Alba, reviews the basic principles of cyber threat intelligence (CTI) maturity levels and explores how a virtual cyber fusion center can be leveraged to support the effective operationalization of CTI.
Panel Participants:
- Afternoon Coffee Break
-
User-Centered Security - Expert Panel Discussion 2:15 pm
User-Centered Security
Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?
-
Challenges of cloud: How it makes an already difficult situation even harder 2:40 pm
Presented by Imperva
Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 3:00 pm
Session Details Coming Soon
- Afternoon Break
-
Innovation in Cybersecurity - Expert Panel Discussion 3:35 pm
Innovation in Cybersecurity - IoT, AI, ML
So many quickly evolving technology advances are shaping the way we think about addressing most cybersecurity issues in 2021. Artificial Intelligence (AI) and Machine Learning (ML) have the potential to automate and aid overworked Security Operations Centers (SOCs), The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.
Our Expert Panel will discuss where these technologies are going, how fast they are advancing and what is coming next.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 4:05 pm
Session Details Coming Soon
-
CISO Panel 4:25 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Final Closing Session
Registration
Wed. Feb 10
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).