Event Schedule

Times for this Event are in Central Standard Time (CST)

  • Welcome
  • Governance, Risk Management, and Compliance - 2021 Hot Topics - Breakfast Briefing 8:25 am

    Presented by ProCircular, Inc.

    Join ProCircular CEO, Ty Hollins, as he discusses this year’s hot topics in Government, Risk Management, and Compliance (GRC).

    Click to Expand

    Panel Participants:

    Ty Hollins
    Ty Hollins

    Ty Hollins

    CISO - ProCircular

    Collapse This Item

  • Welcome / Introductions
  • Humans are the Weakest Link - CORONA EDITION 8:50 am

    Presented by Checkpoint

    Tell the dogs to lie down, grab a fresh coffee from the kitchen, kick your shoes off, and join CyberSecurity Evangelist and Podcast host Brian Linder for a journey into the dark corners of an interwoven mission of bad actors, SpongeBob, face masks, and a few other surprises. 

    Plan on leaving with: 

    • New perspectives on humans as the weakest link in Corona times, and in the next “Work From Anywhere” normal,
    • The opportunity multiplier effect of pandemic fatigue,
    • A look into a few cybersecurity “blind spots” which may have been revealed,
    • A peek into the minds of a global Cyber research powerhouse.
    • An interconnected and complex threat surface with roads that lead where nobody wants to go.

    Warning: You might be asked to raise your hand even though nobody can see you except the cat. We will be polling the cats afterwards, so your full cooperation is needed.

    Click to Expand

    Panel Participants:

    Brian Linder
    Brian Linder

    Brian Linder

    CyberSecurity Threat Evangelist

    Collapse This Item

  • Broken Authentication: Fixing one of the most critical web application security risks 9:20 am

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication
    • Why it’s so dangerous
    • The types of threats that can take advantage of this vulnerability
    • How you can prevent this most critical application security risk
    Click to Expand

    Panel Participants:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions

    Collapse This Item

  • A Modern Approach to Information Protection 9:40 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021?

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover:

    • Modern data security challenges
    • The convergence of data and threat protection to secure data from internal and external threats
    • How people-centric investigations lead to more rapid investigative outcomes
    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director

    Collapse This Item

  • Morning Coffee Break
  • Out of the Shadows: ​ Real-time Asset Visibility and Security for Every Connected Device 10:10 am

    Presented by Ordr

     For many years now, enterprises have seen an explosive rise in connected devices, from traditional IT devices like servers, workstations and PCs to new and more vulnerable IoT, IoMT, and OT like building systems, medical equipment and manufacturing machines.  This myriad of devices from different manufacturers, operating systems and protocols expand the attack surface. IoT, IoMT, and OT bring their own challenges as they are typically not designed with security in mind. The bad news? Security teams are still responsible for all of them. It’s time for a modern approach. In this session, Ordr’s Chief Strategy Officer Danelle Au outlines why connected device security should be on your security initiatives in 2021, and presents a framework that starts with real-time asset inventory and ends with scalable security. Learn best practices and implementation considerations for device discovery, profiling and segmentation as you start your connected device security journey.

    Click to Expand

    Panel Participants:

    Danelle Au
    Danelle Au

    Danelle Au

    Chief Strategy Officer

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:30 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • SolarWinds - Expert Panel Discussion 10:50 am

    SolarWinds Hack: What we Learned About Backdoor Supply Chain Attacks

    On Dec. 12, 2020, FireEye provided detailed information on a widespread attack campaign involving a backdoored component of the SolarWinds Orion platform, which is used by organizations to monitor and manage IT infrastructure. FireEye has given the campaign an identifier of UNC2452 and is further naming the trojanized version of the SolarWinds Orion component SUNBURST (Microsoft has used the “Solorigate” identifier for the malware and added detection rules to its Defender antivirus). SolarWinds has issued a separate advisory for the incident.

    What have we learned from there?  Our expert panelists will discuss separate facets of the breach, what it means for supply chain security, third party risk management, and cybersecurity in general.

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Brandon Potter
    Brandon Potter

    Brandon Potter

    CTO

    James Morrison
    James Morrison

    James Morrison

    Distinguished Technologist and Chief Evangelist

    Tim Keeler
    Tim Keeler

    Tim Keeler

    Founder & CEO - Remediant

    Collapse This Item

  • Morning Break
  • Automate or Die Trying: The New Cybersecurity Reality 11:35 am

    Presented by Armor Defense

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.

    Join our session to learn:

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Panel Participants:

    Ryan Smith
    Ryan Smith

    Ryan Smith

    Vice President of Product

    Collapse This Item

  • The SolarWinds Data Breach: A Whole New World 11:55 am

    Presented by Mitchell Hamline School of Law

    The 2020 data breach of the federal government ushers in a “brave new world” of cybercrime – here’s what we know so far. 

     The recently unveiled Cyber breach at the Federal government has been both disruptive and disturbing.  This presentation will review public sources and outline what we think we know so far.  We will discuss how the breach occurred, who was breached and the potential long term effects.  We would like to discuss some reasons that contributed to the breach and if this is the warfare frontier.

    Click to Expand

    Panel Participants:

    Steven Creason
    Steven Creason

    Steven Creason

    Adjunct/Affiliated Professor

    Collapse This Item

  • Lunch Break
  • Keynote: Navigating a Tripolar Data Privacy World in 2021 12:45 pm

    Jay Cline: U.S. Privacy Leader, Principal, PwC U.S.

    The past several years have seen the emergence of three perspectives on data privacy, with Beijing, Brussels, and the U.S. enshrining different policies and approaches to allow consumers to protect their data. 

    The U.S., which notably lacks federal privacy legislation, has seen state-level policymakers and regulators take the lead in establishing legislation and holding firms accountable that have been perceived to break the rules. In comparison, the European Union has legislated out of Brussels a series of stringent protections that enshrine data privacy as a consumer right. Lastly, China, which enacted privacy legislation in its civil code just this past year, has emphasized centralized control of data. 

    Jay will overview this emerging global tripolar data privacy environment and describe how societies around the world are being drawn into the gravitational pull of these three philosophies. Grounded in this understanding, he will detail the steps that multinational businesses with operations in one or more of these regions can take to not only position themselves to better manage an increasingly fragmented regulatory environment, but to use compliance as a competitive advantage. 

    Click to Expand

    Panel Participants:

    Jay Cline
    Jay Cline

    Jay Cline

    U.S. Privacy Leader and a Co-Leader, PwC U.S.

    Collapse This Item

  • Practical Cyber Fusion – Operationalizing Threat Intelligence 1:30 pm

    Presented by Anomali

    “Cyber Fusion Centers” have moved from radical concept to marketing hype in just a few years. However, the concept is still important. Don’t let the hype stop you from grasping the true value a cyber fusion center can provide.

    The cyber fusion center can be a worthwhile pursuit if the outcome is the ability to use threat intelligence to drive coordinated decisions across your security organization and functions to improve the overall security posture.

    Anomali Chief Product Officer, Mark Alba, reviews the basic principles of cyber threat intelligence (CTI) maturity levels and explores how a virtual cyber fusion center can be leveraged to support the effective operationalization of CTI.

    Click to Expand

    Panel Participants:

    Mark Alba
    Mark Alba

    Mark Alba

    Chief Product Officer

    Collapse This Item

  • Cloud Challenges with Database Security 1:45 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Panel Participants:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Afternoon Coffee Break
  • User-Centered Security - Expert Panel Discussion 2:15 pm

    User-Centered Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director

    Mandy Mckenzie
    Mandy Mckenzie

    Mandy Mckenzie

    Director of Product Management for Awareness Training

    Aaron Warner
    Aaron Warner

    Aaron Warner

    CEO

    Collapse This Item

  • 2020 Threats in Review 2:40 pm

    Presented by Darktrace

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.

    She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.

    Click to Expand

    Panel Participants:

    Brianna Leddy
    Brianna Leddy

    Brianna Leddy

    Director of Analysis

    Collapse This Item

  • Office, Home or Hybrid - manage and secure endpoints anywhere, anytime 3:00 pm

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Alex Peters
    Alex Peters

    Alex Peters

    Endpoint Security Executive

    Collapse This Item

  • Afternoon Break
  • Innovation in Cybersecurity - Expert Panel Discussion 3:35 pm

    Innovation in Cybersecurity - IoT, AI, ML

    So many quickly evolving technology advances are shaping the way we think about addressing most cybersecurity issues in 2021.  Artificial Intelligence (AI) and Machine Learning (ML) have the potential to automate and aid overworked Security Operations Centers (SOCs), The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.

    Our Expert Panel will discuss where these technologies are going, how fast they are advancing and what is coming next.

    Click to Expand

    Panel Participants:

    Kim Berry
    Kim Berry

    Kim Berry

    Principal Threat Intelligence Researcher - Auth0

    John Bloomer
    John Bloomer

    John Bloomer

    Office of the CTO

    Jay Cline
    Jay Cline

    Jay Cline

    U.S. Privacy Leader and a Co-Leader, PwC U.S.

    Steven Creason
    Steven Creason

    Steven Creason

    Adjunct/Affiliated Professor

    Collapse This Item

  • The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy 4:05 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense. 

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Lead

    Collapse This Item

  • CISO Panel 4:25 pm

    Panel Participants:

    Matt Ireland
    Matt Ireland

    Matt Ireland

    Chief Information Security Officer - NTT, Ltd.

    Patrick Joyce
    Patrick Joyce

    Patrick Joyce

    VP - Global Information Technology & CISO - Medtronic

    Tony Taylor
    Tony Taylor

    Tony Taylor

    CISO - Land O'Lakes, Inc.

    William Scandrett
    William Scandrett

    William Scandrett

    CISO - Allina Health

    Milinda Rambel Stone
    Milinda Rambel Stone

    Milinda Rambel Stone

    Vice President & CISO - Provation Medical

    Collapse This Item

  • Summit Final Closing Session