Event Schedule

Times for this Event are in Eastern Standard Time (EST)

  • Welcome
  • Breakfast Briefing 8:40 am

    Meet the Exhibitor

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Welcome / Introductions
  • Understanding and Combating Credential Stuffing Attacks 9:05 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    •       How credential stuffing attacks work
    •       What effect they can have on your company
    •       Steps to detect and mitigate these attacks
    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer

    Collapse This Item

  • A People-Centric Approach to Cyber Risk Management 9:30 am

    Presented by Proofpoint

    Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated. 

    Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks. 

    During this presentation, we’ll cover: 

    • The clearly defined risk areas that are frequently targeted in cyber-attacks, with clear examples and use cases
    • How organizations can implement a People-Centric security approach, decreasing their vulnerability to cyber threats.

     

    Click to Expand

    Panel Participants:

    Jack Johnson
    Jack Johnson

    Jack Johnson

    Sr. Systems Engineer

    Collapse This Item

  • Morning Coffee Break
  • IoT Security Is Bad. It’s Time For a Different Approach 10:10 am

    Presented by Ordr

    For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Securely Connecting the Right People to the Right Technologies 10:30 am

    Presented by Okta

    As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.

    Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.

    Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.

    Click to Expand

    Panel Participants:

    Shyam Rajaram
    Shyam Rajaram

    Shyam Rajaram

    Enterprise Sales Engineer

    Collapse This Item

  • IAM + WFH - Expert Panel Discussion 10:50 am

    IAM + WFH: Changing face of Identity in a WFH World

    By now, we’re tired of talking about how everyone had to do a rush job to prepare for everyone Working From Home (WFH). Many of us have hired new staff, who have never set foot in our office – and may never be on the corporate LAN.  Going forward, as this is the new reality – how will our security practices around identity and access management and in particular authentication and authorization change?

    Our panel are experts in these topics, and we will discuss various aspects of this challenge.

    Click to Expand

    Collapse This Item

  • Morning Break
  • Application Security Beyond Effective Bot Mitigation 11:35 am

    Presented by Shape Security

    The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms. 

     Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.

    Click to Expand

    Panel Participants:

    Gary Newe
    Gary Newe

    Gary Newe

    VP of Solutions Engineering - Shape Security Solutions

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 11:55 am

    Presented by Code42 Software

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing 12:20 pm

    Meet the Exhibitor

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Keynote: 12:45 pm
  • Subject Matter Expert Session - More Details To Come 1:30 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 1:45 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Afternoon Coffee Break
  • DR-PR Strategy - Expert Panel Discussion 2:15 pm

    When your DR strategy is a PR (Pandemic Recovery) Strategy

    Disaster Recovery is an area of security planning that aims to protect an organization from the effects of significant negative events.  Having a disaster recovery strategy in place enables an organization to quickly resume it’s critical functions following a disruption.  The goal of disaster recovery is for a business to continue operating as close to normal as possible.  Covid 19 put organizations at risk and disaster recovery plans were essential to help sustain business operations.  How did Covid 19 impact your business functions and do you believe your organization was prepared for such a pandemic?

    Click to Expand

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 3:00 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Afternoon Break
  • Cloud Security 2021 - Expert Panel Discussion 3:15 pm

    Cloud Security 2021: What’s New, What Changes

    Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers.  Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.

    This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed.

    Click to Expand

    Collapse This Item

  • Featured Keynote: The Dirty Truth Behind Breaking Into Cybersecurity 3:45 pm

    Naomi Buckwalter

    There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.

    But according to the data, these folks simply aren’t catching a break.

    In this talk, Naomi Buckwalter, career mentor and experienced cybersecurity professional, reveals the hard truths behind breaking into cybersecurity, some things we can do as an industry to try to fix this problem, and ways for cybersecurity hopefuls to finally land that first cybersecurity job. Based on a recent analysis of thousands of open positions, she digs through the data and lays out the facts in this eye-opening Feature Keynote discussion.

    Click to Expand

    Panel Participants:

    Naomi Buckwalter
    Naomi Buckwalter

    Naomi Buckwalter

    Director of Information Security & Privacy - Energage

    Collapse This Item

  • CISO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Robert Kemp
    Robert Kemp

    Robert Kemp

    VP, CISO - Federated Hermes

    Anthony Foust
    Anthony Foust

    Anthony Foust

    Global Chief Information Security Officer - Belron Group

    Ryan Mulhall
    Ryan Mulhall

    Ryan Mulhall

    Network Services Bureau Chief - Iowa Communications Network (ICN)

    Troy Stairwalt
    Troy Stairwalt

    Troy Stairwalt

    CISO - Westfield Insurance

    John W Graham
    John W Graham

    John W Graham

    Chief Information Security Officer - NetJets

    Collapse This Item

  • Summit Final Closing Session

Registration

Thu. Feb 18

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Register