
Virtual Summit
Florida & Caribbean
Virtual Cybersecurity Summit
The Florida & Caribbean Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. Jun 16
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Affiliate Partners
Affiliate Partners
Event Schedule
Times for this Event are in Eastern Standard Time (EST)
- Welcome
-
Disrupting Lateral Movement by Securing Active Directory 9:05 am
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.
Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
-
How do you start a ML project? Finding the Breach with Infinity SOC 9:30 am
What is Machine Learning? Can you decipher buzzwords such as Artificial Intelligence, machine or deep learning, and differentiate between hype and fake news? Cyber-attacks are more prevalent than ever in our world today, with exponential, every-increasing variance, velocity, and volume of threat campaigns. This presentation aims to hopefully enable you to understand what lies beneath the words “AI-powered cloud” or more precisely “data driven security”.
The Security Operations Center (SOC) is often all that stands between an organization and a potentially financially devastating data breach. However, 98% of SOC teams face significant challenges in their mission to detect and shut down attacks. For many SOC teams, finding malicious activity inside their network is like finding a needle in a haystack. They are often forced to translate information from across a multitude of monitoring solutions and navigate through tens of thousands of daily alerts. This is a crossroad where machine learning and security align to equip security analysts with relevant and actionable information to prevent and respond to threats in real time.
Panel Participants:
- Morning Coffee Break
-
Subject Matter Expert Session - More Details To Come 10:10 am
Session Details Coming Soon
-
Automate or Die Trying: The New Cybersecurity Reality 10:30 am
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our session to learn:
- Key security considerations when implementing automation programs
- Advice for how companies can begin finding success with AI and machine learning
Panel Participants:
-
Expert Panel Discussion #1 10:50 am
Session Details Coming Soon
- Morning Break
-
Securely Connecting the Right People to the Right Technologies 11:35 am
As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.
Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.
Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.
Panel Participants:
-
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 11:55 am
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Panel Participants:
- Lunch Break
-
Keynote: 12:45 pm
Session Details Coming Soon
-
The Cloud Requires an Evolution Beyond the Secure Email Gateway 1:30 pm
Cloud email requires a new approach to security. If your corporate email relies on Microsoft or Google, you may have deployed (or are considering) a Secure Email Gateway (SEG). Originally designed as a perimeter solution for on-premise email, you should ask these questions:
- Why do you disable the native security in our platform?
- How can my configuration allow attackers to bypass the gateway?
- How do we block insider email attacks?
- How can we quarantine a compromised account?
- How can we prevent Business Email Compromise (BEC) or impersonation email attacks?
Our cloud security expert Jeff will explain where an SEG approach falls short protecting cloud-hosted email. Touch upon fundamental architectural weaknesses of a proxy design, and arm attendees to help them make smart decisions to protect their users.
Panel Participants:
- Subject Matter Expert Session - More Details To Come 1:45 pm
- Afternoon Coffee Break
-
Expert Panel Discussion #2 2:15 pm
Session Details Coming Soon
-
Why do Small Businesses Need Big Protection? 2:40 pm
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 3:00 pm
Session Details Coming Soon
Panel Participants:
- Afternoon Break
-
Expert Panel Discussion #3 3:35 pm
Session Details Coming Soon
-
The Rise of Secure Access Service Edge (SASE) 4:05 pm
Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:
- Why organizations need SASE
- The key components of SASE offerings
- How SASE architectures impact performance
Panel Participants:
-
Ciso Panel 4:25 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
- Summit Final closing Session
Registration
Wed. Jun 16
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).