
Virtual Summit
Capital Region
Virtual Cybersecurity Summit
The Capital Region Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Tue. Jun 22
-
Partners
Gold Partners
Silver Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Eastern Standard Time (EST)
The Summit will be open from 8AM to 6PM.
- Welcome
-
Securely Connecting the Right People to the Right Technologies 9:05 am
As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.
Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.
Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.
Panel Participants:
-
Why do Small Businesses Need Big Protection? 9:30 am
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Panel Participants:
- Morning Coffee Break
-
IoT Security Is Bad. It’s Time For a Different Approach 10:10 am
For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.
Panel Participants:
-
Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 10:30 am
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
- What is BEC and EAC? And how do they work?
- What are the common attack tactics regarding this new form of email threats?
- Best practices to defend against BEC and EAC
Panel Participants:
-
Expert Panel Discussion #1 10:50 am
Session Details Coming Soon
- Morning Break
-
Subject Matter Expert Session - More Details To Come 11:35 am
Session Details Coming Soon
-
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 11:55 am
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Panel Participants:
- Lunch Break
-
Keynote: 12:45 pm
Session Details Coming Soon
- Subject Matter Expert Session - More Details To Come 1:30 pm
- Subject Matter Expert Session - More Details To Come 1:45 pm
- Afternoon Coffee Break
-
Expert Panel Discussion #2 2:15 pm
Session Details Coming Soon
-
2020 Threats in Review 2:40 pm
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm.
Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year.
She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 3:00 pm
Session Details Coming Soon
- Afternoon Break
-
Expert Panel Discussion #3 3:35 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 4:05 pm
Session Details Coming Soon
-
Ciso Panel 4:25 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
- Summit Final closing Session
Registration
Tue. Jun 22
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).