
Virtual Summit
Capital Region
Virtual Cybersecurity Summit
The Capital Region Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Tue. Jun 22
-
Partners
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Summit will be open from 8AM to 6PM.
- Welcome
-
Securely Connecting the Right People to the Right Technologies 9:05 am
As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.
Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.
Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.
Panel Participants:
-
Why do Small Businesses Need Big Protection? 9:30 am
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Panel Participants:
- Morning Coffee Break
-
IoT Security Is Bad. It’s Time For a Different Approach 10:10 am
For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.
Panel Participants:
-
Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 10:30 am
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
- What is BEC and EAC? And how do they work?
- What are the common attack tactics regarding this new form of email threats?
- Best practices to defend against BEC and EAC
Panel Participants:
-
Expert Panel Discussion #1 10:50 am
Session Details Coming Soon
- Morning Break
-
Subject Matter Expert Session - More Details To Come 11:35 am
Session Details Coming Soon
-
Disrupting Lateral Movement by Securing Active Directory 11:55 am
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
- Lunch Break
-
Keynote: 12:45 pm
Session Details Coming Soon
-
Rethinking your data protection strategy in the age of ransomware. 1:30 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Establishing a Risk Culture in the Enterprise 1:45 pm
With data exposure events on the rise in 2021, CISOs everywhere are faced with the increasing challenges of instituting a successful insider risk strategy. Security needs to be moving at the speed of business where time to market and speed of innovation are critical outcomes. By attending this session, executive teams will learn how establishing a risk aware culture in the Enterprise can reduce the complexities of data security while promoting healthy collaboration
Panel Participants:
- Afternoon Coffee Break
-
Expert Panel Discussion #2 2:15 pm
Session Details Coming Soon
-
2020 Threats in Review 2:40 pm
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 3:00 pm
Session Details Coming Soon
- Afternoon Break
-
Expert Panel Discussion #3 3:35 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 4:05 pm
Session Details Coming Soon
-
Ciso Panel 4:25 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
- Summit Final closing Session
Registration
Tue. Jun 22
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).