Event Schedule

Times for this Event are in Eastern Standard Time (EST)

  • Meet Our Partners
  • Welcome / Introductions
  • IoT Security Is Bad. It’s Time For a Different Approach 9:05 am

    Presented by Ordr

    For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach.

    In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.

    Click to Expand

    Speaker:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • A People-Centric Approach to Cyber Risk Management 9:30 am

    Presented by Proofpoint

    Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated. 

    Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks. 

    During this presentation, we’ll cover: 

    • The clearly defined risk areas that are frequently targeted in cyber-attacks, with clear examples and use cases
    • How organizations can implement a People-Centric security approach, decreasing their vulnerability to cyber threats.
    Click to Expand

    Panel Participants:

    Jack Johnson
    Jack Johnson

    Jack Johnson

    Sr. Systems Engineer

    Collapse This Item

  • Morning Coffee Break
  • Threat Hunting and the Rise of Targeted eCrime Intrusions 10:10 am

    Presented by Crowdstrike

    “Threat hunting” is a term getting thrown around a lot in the security industry, but there is still a lot of confusion about what it actually means. Does it mean responding to alerts? Is it another SOC? Is threat hunting the same thing as incident response? How would an organization start doing threat hunting?

    In this session, we will dive into what threat hunting means and how you can use it to actively find intrusions. We will discuss how to use it effectively and then look at techniques being used in actual intrusions.

    You will see intrusions that were executed by nation-states and eCrime groups. We will cover the exact command lines they executed, what the attacks accomplish, and how the bad guys attempted to avoid discovery.

    As we discuss each intrusion, we will discuss some threat hunting techniques that can be used to discover the attacks used. You can then use this information to start doing your own threat hunting.

    Attendees will learn:
    • What threat hunting is, it’s benefits and how it’s different than other activities
    • Targeted intrusion techniques recently observed in the wild
    • How to use threat hunting to discover threat actors before they accomplish their objectives

    Click to Expand

    Panel Participants:

    Jason Wood
    Jason Wood

    Jason Wood

    Senior Researcher, Tactical Intelligence

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:30 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Morning Break
  • 2021 Trends - Expert Panel Discussion 11:05 am

    2021 Trends & Directions

    What will define cybersecurity in 2021?  What carries over from 2020?

    Risk comes from all angles in 2020 users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the continent.

    Obviously, COVID and the associated rush to work-from-home played a big part. Beyond that, what are the key cybersecurity trends we need to watch out for in 2021?

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 11:45 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Global Product Manager

    Collapse This Item

  • The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy 12:05 pm

    Presented by Pure Storage

    Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense.

    Click to Expand

    Panel Participants:

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Director

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing 12:30 pm

    Meet the Exhibitor

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Keynote: JD Henry, DHS - CISA 12:50 pm

    Cyber Security Briefing – Cyber Fraud Task Force

    Session Details Coming Soon

    Click to Expand

    Panel Participants:

    JD Henry

    JD Henry

    Region VII Cybersecurity Advisor DHS - CISA

    Collapse This Item

  • Building Cyber Resilience: Finding Factors not Fault 1:40 pm

    Presented by eSentire

    Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

    Click to Expand

    Panel Participants:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Vice President Industry Security

    Collapse This Item

  • Practical Cyber Fusion – Operationalizing Threat Intelligence 2:05 pm

    Presented by Anomali

    “Cyber Fusion Centers” have moved from radical concept to marketing hype in just a few years. However, the concept is still important. Don’t let the hype stop you from grasping the true value a cyber fusion center can provide.

    The cyber fusion center can be a worthwhile pursuit if the outcome is the ability to use threat intelligence to drive coordinated decisions across your security organization and functions to improve the overall security posture.

    Anomali Chief Product Officer, Mark Alba, reviews the basic principles of cyber threat intelligence (CTI) maturity levels and explores how a virtual cyber fusion center can be leveraged to support the effective operationalization of CTI.

    Click to Expand

    Panel Participants:

    Mark Alba
    Mark Alba

    Mark Alba

    Chief Product Officer

    Collapse This Item

  • Afternoon Coffee Break
  • Protecting Users - Expert Panel Discussion 2:30 pm

    Protecting Users – Identity, Endpoints and Access Management

    The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?

    Click to Expand

    Collapse This Item

  • Institutionalizing Incident Response 3:05 pm

    Presented by Cloudflare

    The 3 keys for incident response are risk reduction, crisis preparation, and communication. Listen as Cloudflare CSO Joe Sullivan shares his thoughts on how security leaders can implement incident response in their organizations.

    Click to Expand

    Panel Participants:

    Joe Sullivan
    Joe Sullivan

    Joe Sullivan

    CSO

    Collapse This Item

  • Intro to MITRE ATT&CK for Assessing and Mitigating Risk 3:25 pm

    Presented by Morphisec

    The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for a personalized assessment and mitigation.

    Click to Expand

    Panel Participants:

    Daniel Petrillo
    Daniel Petrillo

    Daniel Petrillo

    Director of Security Strategy

    Collapse This Item

  • Afternoon Break
  • Subject Matter Expert Session - More Details To Come 3:55 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • CISO Panel 4:15 pm

    Panel Participants:

    Mitchell Parker
    Mitchell Parker

    Mitchell Parker

    CISO - Indiana University Health

    Jeffrey Ingalsbe
    Jeffrey Ingalsbe

    Jeffrey Ingalsbe

    Chief Information (Security) Officer - Flexible Plan Investments, Ltd.

    Doug Copley
    Doug Copley

    Doug Copley

    Founder & CEO - Data Protection Partners

    Rajiv Das
    Rajiv Das

    Rajiv Das

    Principal - Plante Moran

    Zahira (Zah) Rodriguez Gonzalvo
    Zahira (Zah) Rodriguez Gonzalvo

    Zahira (Zah) Rodriguez Gonzalvo

    SVP and Chief Information Security and Privacy Officer - Flagstar Bank

    Dan Mathis

    Dan Mathis

    Director, Compliance Center of Excellence - Indiana Office of Technology

    Collapse This Item

  • Summit Closing Session

Registration

Thu. Jan 28

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Register