Event Schedule

Times for this Event are in Eastern Standard Time (EST)

  • Welcome
  • Broken Authentication: Fixing One of the Most Critical Web Application Security Risks 9:05 am

    Presented by Auth0

    Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.

     This session will provide:

    • An overview of broken authentication; 
    • Why it’s so dangerous;
    • The types of threats that can take advantage of this vulnerability;
    • How you can prevent this most critical application security risk.
    Click to Expand

    Panel Participants:

    Andrew Akers
    Andrew Akers

    Andrew Akers

    Senior Manager, Solutions

    Collapse This Item

  • A Modern Approach to Information Protection 9:25 am

    Presented by Proofpoint

    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021? 

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover: 

    • Modern data security challenges 
    • The convergence of data and threat protection to secure data from internal and external threats 
    • How people-centric investigations lead to more rapid investigative outcomes
    Click to Expand

    Panel Participants:

    Mike Stacy
    Mike Stacy

    Mike Stacy

    Global Cloud and Information Protection Director

    Collapse This Item

  • Morning Coffee Break
  • Out of the Shadows: Real-Time Asset Visibility and Security for Every Connected Device 10:05 am

    Presented by Ordr

     For many years now, enterprises have seen an explosive rise in connected devices, from traditional IT devices like servers, workstations and PCs to new and more vulnerable IoT, IoMT, and OT like building systems, medical equipment and manufacturing machines.  This myriad of devices from different manufacturers, operating systems and protocols expand the attack surface. IoT, IoMT, and OT bring their own challenges as they are typically not designed with security in mind. The bad news? Security teams are still responsible for all of them. It’s time for a modern approach. In this session, Ordr’s Chief Strategy Officer Danelle Au outlines why connected device security should be on your security initiatives in 2021, and presents a framework that starts with real-time asset inventory and ends with scalable security. Learn best practices and implementation considerations for device discovery, profiling and segmentation as you start your connected device security journey.

    Click to Expand

    Panel Participants:

    Danelle Au
    Danelle Au

    Danelle Au

    Chief Strategy Officer

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:25 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • IAM + WFH - Expert Panel Discussion 10:45 am

    IAM + WFH: Changing Face of Identity in a WFH World

    By now, we’re tired of talking about how everyone had to do a rush job to prepare for everyone Working From Home (WFH). Many of us have hired new staff, who have never set foot in our office – and may never be on the corporate LAN.  Going forward, as this is the new reality – how will our security practices around identity and access management and in particular authentication and authorization change?

    Our panel are experts in these topics, and we will discuss various aspects of this challenge.

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Sivan Tehila
    Sivan Tehila

    Sivan Tehila

    Director of Solution Architecture

    Collapse This Item

  • Morning Break
  • Application Security Beyond Effective Bot Mitigation 11:25 am

    Presented by Shape Security

    The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms.

    Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.

    Click to Expand

    Panel Participants:

    Gary Newe
    Gary Newe

    Gary Newe

    VP of Solutions Engineering - Shape Security Solutions

    Collapse This Item

  • Establishing a Risk Culture in the Enterprise 11:45 am

    Presented by Code42 Software

    With data exposure events on the rise in 2021, CISOs everywhere are faced with the increasing challenges of instituting a successful insider risk strategy. Security needs to be moving at the speed of business where time to market and speed of innovation are critical outcomes. By attending this session, executive teams will learn how establishing a risk aware culture in the Enterprise can reduce the complexities of data security while promoting healthy collaboration.

    Click to Expand

    Panel Participants:

    Tommy Todd
    Tommy Todd

    Tommy Todd

    Vice President of Security

    Collapse This Item

  • Lunch Break
  • Keynote: Regional FBI Briefing: 2021 Cyber Threat for the Ohio Valley 12:35 pm

    Three local FBI Agents will detail a specialized briefing for organizations in the Ohio Valley.  From trending threats and mitigation strategies to recent interactions with the private sector, this attendee-eyes-only presentation will divulge the latest (TLP: White) intelligence sharable in this forum to include the investigative and forensic resources available to Ohio businesses as well as partnership options for engagement. 

    Attendees are advised to take notes, as recordings and materials downloads will not be allowed.

    Click to Expand

    Panel Participants:

    David Condo
    David Condo

    David Condo

    FBI Special Agent

    Adam Lawson

    Adam Lawson

    FBI Supervisory Special Agent

    Michael Brian

    Michael Brian

    FBI Supervisory Special Agent

    Collapse This Item

  • Threat Hunting and the Rise of Targeted eCrime Intrusions 1:25 pm

    Presented by CrowdStrike

    “Threat hunting” is a term getting thrown around a lot in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? Is threat hunting the same thing as incident response? How would an organization start doing threat hunting? 

    In this session, we will dive into what threat hunting means and how you can use it to actively find intrusions. We will discuss how to use it effectively and then look at techniques being used in actual intrusions. 

    You will see intrusions that were executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplish, and how the bad guys attempted to avoid discovery. 

    As we discuss each intrusion, we will discuss some threat hunting techniques that can be used to discover the attacks used. You can then use this information to start doing your own threat hunting. 

    Attendees will learn: 

    • What threat hunting is, it’s benefits and how it’s different than other activities 
    • Targeted intrusion techniques recently observed in the wild 
    • How to use threat hunting to discover threat actors before they accomplish their objectives
    Click to Expand

    Panel Participants:

    Jason Wood
    Jason Wood

    Jason Wood

    Senior Researcher, Tactical Intelligence

    Collapse This Item

  • Office, Home or Hybrid - Manage and Secure Endpoints Anywhere, Anytime 1:45 pm

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Alex Peters
    Alex Peters

    Alex Peters

    Endpoint Security Executive

    Collapse This Item

  • Afternoon Coffee Break
  • Cloud Security 2021 - Expert Panel Discussion 2:15 pm

    Cloud Security 2021: What’s New, What Changes

    Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers.  Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.

    This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed.

    Click to Expand

    Panel Participants:

    Dane Grace
    Dane Grace

    Dane Grace

    Cybersecurity Evangelist

    Daniel Petrillo
    Daniel Petrillo

    Daniel Petrillo

    Director of Security Strategy

    Gary Southwell
    Gary Southwell

    Gary Southwell

    General Manager

    David Telehowski
    David Telehowski

    David Telehowski

    Principal Security Architect - Auth0

    Collapse This Item

  • The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy 2:40 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense. 

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Lead

    Collapse This Item

  • Intro to MITRE ATT&CK for Assessing and Mitigating Risk 3:00 pm

    Presented by Morphisec

    The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for a personalized assessment and mitigation.

    Click to Expand

    Panel Participants:

    Daniel Petrillo
    Daniel Petrillo

    Daniel Petrillo

    Director of Security Strategy

    Collapse This Item

  • Afternoon Break
  • Featured Keynote: The Dirty Truth Behind Breaking Into Cybersecurity 3:30 pm

    Presented by Naomi Buckwalter

    There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.

    But according to the data, these folks simply aren’t catching a break.

    In this talk, Naomi Buckwalter, career mentor and experienced cybersecurity professional, reveals the hard truths behind breaking into cybersecurity, some things we can do as an industry to try to fix this problem, and ways for cybersecurity hopefuls to finally land that first cybersecurity job. Based on a recent analysis of thousands of open positions, she digs through the data and lays out the facts in this eye-opening Feature Keynote discussion.

    Click to Expand

    Panel Participants:

    Naomi Buckwalter
    Naomi Buckwalter

    Naomi Buckwalter

    Director of Information Security & IT - Beam Dental

    Collapse This Item

  • Cybersecurity Jobs - Expert Panel Discussion 3:45 pm

    Cybersecurity Jobs - “The Dirty Truth”

    Continuing the discussion from our Feature Keynote today, this Expert Panel Discussion will further explore the issues around cybersecurity jobs.  From breaking into the field, as Naomi discussed to the relative need for certifications, formal education, on-the-job training and more.  Our experts will discuss the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage

    Click to Expand

    Panel Participants:

    Naomi Buckwalter
    Naomi Buckwalter

    Naomi Buckwalter

    Director of Information Security & IT - Beam Dental

    John McClure
    John McClure

    John McClure

    Chief Information Security Officer

    Michael Osterman
    Michael Osterman

    Michael Osterman

    Principle Analyst - Osterman Research

    Cecil Pineda
    Cecil Pineda

    Cecil Pineda

    Cybersecurity and Data Privacy - Critical Start

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 4:15 pm

    Presented by Veeam Software

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Panel Participants:

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy

    Collapse This Item

  • CISO Panel 4:35 pm

    Panel Participants:

    Chris Clymer
    Chris Clymer

    Chris Clymer

    Director & CISO - MRK Technologies

    Anthony Foust
    Anthony Foust

    Anthony Foust

    Global Chief Information Security Officer - Belron Group

    John W Graham
    John W Graham

    John W Graham

    Chief Information Security Officer - NetJets

    Robert Kemp
    Robert Kemp

    Robert Kemp

    VP, CISO - Federated Hermes

    John McClure
    John McClure

    John McClure

    Chief Information Security Officer

    Ryan Mulhall
    Ryan Mulhall

    Ryan Mulhall

    Network Services Bureau Chief - Iowa Communications Network (ICN)

    Troy Stairwalt
    Troy Stairwalt

    Troy Stairwalt

    CISO - Westfield Insurance

    Collapse This Item

  • Summit Final Closing Session