Event Schedule

Times for this Event are in Eastern Standard Time (EST)

The Summit will be open from 8AM to 6PM.

  • Welcome
  • Cybersecurity and Duty of Care 8:50 am

    Presented by Logically

    2020 was an unprecedented year for cyber risk. Work from home, a fluid regulatory environment, increased cyber-attacks and ballooning litigation expenses underscore the new paradigm facing IT and Cyber Security management. Traditional risk management and effective investment will become increasingly difficult in this paradigm. IT and Cyber Security leaders will have to focus on prioritization of risk and risk mitigation in context of the impact to the organization. This presentation will introduce you to the concept of cyber security “Duty of Care” and provide guidance on how leadership can leverage it to reduce risk in the environment in the future.

    Click to Expand

    Panel Participants:

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance

    Collapse This Item

  • Establishing a Risk Culture in the Enterprise 9:10 am

    Presented by Code42 Software

    With data exposure events on the rise in 2021, CISOs everywhere are faced with the increasing challenges of instituting a successful insider risk strategy. Security needs to be moving at the speed of business where time to market and speed of innovation are critical outcomes. By attending this session, executive teams will learn how establishing a risk aware culture in the Enterprise can reduce the complexities of data security while promoting healthy collaboration

    Click to Expand

    Panel Participants:

    Tommy Todd
    Tommy Todd

    Tommy Todd

    Vice President of Security

    Collapse This Item

  • Morning Coffee Break
  • Practical Cyber Fusion – Operationalizing Threat Intelligence 9:50 am

    Presented by Anomali

    “Cyber Fusion Centers” have moved from radical concept to marketing hype in just a few years. However, the concept is still important. Don’t let the hype stop you from grasping the true value a cyber fusion center can provide.

    The cyber fusion center can be a worthwhile pursuit if the outcome is the ability to use threat intelligence to drive coordinated decisions across your security organization and functions to improve the overall security posture.

    Anomali Chief Product Officer, Mark Alba, reviews the basic principles of cyber threat intelligence (CTI) maturity levels and explores how a virtual cyber fusion center can be leveraged to support the effective operationalization of CTI.

    Click to Expand

    Panel Participants:

    Mark Alba
    Mark Alba

    Mark Alba

    Chief Product Officer

    Collapse This Item

  • Rethinking your data protection strategy in the age of ransomware. 10:10 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Ransomware - Expert Panel Discussion 10:30 am

    Ransomware - to Pay, or Not to Pay? /Rescue from Ransomware - what to know before you get that nasty email

    Ransomware was a hot topic in 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response.  Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.

    Click to Expand

    Panel Participants:

    Van Flowers
    Van Flowers

    Van Flowers

    Solution Strategist and Ransomware Evangelist

    Avi Rembaum
    Avi Rembaum

    Avi Rembaum

    VP of Security Solutions

    David Huskisson
    David Huskisson

    David Huskisson

    Rapid Restore Solutions Lead

    Dennis Underwood
    Dennis Underwood

    Dennis Underwood

    CEO

    Collapse This Item

  • Morning Break
  • Moving Beyond Password to Delight & Secure Users 11:20 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Latest network-layer DDoS trends and the rise of ransom-driven attacks 11:40 am

    Presented by Cloudflare

    Session Details Coming Soon

    Click to Expand

    Panel Participants:

    Brian Parks
    Brian Parks

    Brian Parks

    Go-To-Market Leader

    Trey Guinn
    Trey Guinn

    Trey Guinn

    Head of Solution Engineering

    Collapse This Item

  • Lunch Break
  • Small businesses deserve big protection - Lunch Sponsor / Briefing 12:10 pm

    Presented by Cisco Umbrella

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Rohit Sawhney from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Keynote: Cyber Security - Threats and the FBI Perspective 12:25 pm

    Presented by FBI

    The FBI has recently been tasked with prioritizing the prevention and punishment of cyber crime but this can’t be done without digging into how cyber criminals operate. Supervisory Special Agent, Cindy Starns will break down the latest intel on how cyber criminals have adapted to current events in order to maximize their financial gain and damage the US infrastructure.  

    Join the exclusive live in depth look at how the FBI is combating these threats and imposing consequences on bad actors.  See real local North and South Carolina trends in cyber crimes with a focus on BEC, Ransomware, and why a common corporate response to cyber intrusions might not be the best course of action.

    Click to Expand

    Panel Participants:

    Cindy Starns
    Cindy Starns

    Cindy Starns

    Supervisory Special Agent - FBI Columbia Division - Cyber Squad

    Collapse This Item

  • Get beyond compliance and achieve real data security 1:05 pm

    Presented by Imperva

    To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future.We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.

    Click to Expand

    Panel Participants:

    Terry Ray
    Terry Ray

    Terry Ray

    SVP Strategy and Imperva Fellow

    Collapse This Item

  • Office, Home or Hybrid - manage and secure endpoints anywhere, anytime 1:25 pm

    Presented by baramundi

    Cyberattacks have quadrupled since the beginning of the pandemic. Lots of endpoints are currently on their own when it comes to being managed and protected. What will happen when these machines come back to the office, or are they coming back at all? This presentation will address the different scenarios that companies may encounter and how to resolve them by automating their endpoint management.

    Click to Expand

    Panel Participants:

    Alex Peters
    Alex Peters

    Alex Peters

    Endpoint Security Executive

    Collapse This Item

  • Afternoon Coffee Break
  • Feature Keynote: The Cybersecurity Skills Shortage 2:00 pm

    The Cybersecurity Skills Shortage

    The cybersecurity skills shortage is real and getting worse: according to ISC(2), nearly three million cybersecurity positions worldwide are currently unfilled, and Cyberseek reports that more than 300,000 positions are available just in the United States. A lack of cybersecurity analysts, researchers, and other security experts means that bad actors have even more of an upper hand because there are fewer people available to investigate potential threats, analyze attacks, and remediate security problems. The lockdowns arising from the COVID-19 pandemic has made the problem worse.

    Osterman Research has conducted an in-depth study and produced a white paper focused squarely on this issue, and Michael Osterman will be presenting the results of that research. In this session you will learn:

    •  The seriousness with which your peers are taking the cybersecurity skills shortage.
    • What they’re doing to address it.
    • How executive management and employees view their organizations’ cybersecurity function.
    • How cybersecurity professionals are dealing with the stresses of doing their job.
    • How the cybersecurity skills shortage might be solved, both in the near-term and longer term.
    Click to Expand

    Panel Participants:

    Michael Osterman
    Michael Osterman

    Michael Osterman

    Principle Analyst - Osterman Research

    Collapse This Item

  • Why do Small Businesses Need Big Protection? 2:25 pm

    Presented by Duo Security

    As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations.  The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.

    Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on.  At the base of many of these challenges lies DNS Security.  DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.

    Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.

    Click to Expand

    Panel Participants:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Enduring from Home: COVID-19’s Impact on Business Security 2:45 pm

    Presented by Malwarebytes

    All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

    Click to Expand

    Panel Participants:

    Adam Gates
    Adam Gates

    Adam Gates

    Senior Engineer

    Collapse This Item

  • Afternoon Break
  • Cloud Security - Expert Panel Discussion 3:15 pm

    Cloud Security 2021: What’s New, What Changes

    Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers.  Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.

    This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed

    Click to Expand

    Panel Participants:

    Dane Grace
    Dane Grace

    Dane Grace

    Cybersecurity Evangelist

    Andrew Homer
    Andrew Homer

    Andrew Homer

    VP of Security Strategy

    Greg Manson
    Greg Manson

    Greg Manson

    VP of Security, Audit, and Compliance

    Collapse This Item

  • 2020 Threats in Review 3:45 pm

    Presented by Darktrace

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    2020 was a year of uncertainty, drastic change, and unprecedented challenge for businesses. Security leaders, in particular, have had to adapt their strategies fast, as remote and hybrid workforces become the norm. 

    Join Brianna Leddy, Director of Analysis at Darktrace, as she looks back at 2020’s most important threat trends, reflects on how the landscape has evolved, and discuss proactive solutions to the cyber challenges faced this year. 

    She will present insights on the most significant threats discovered by self-learning Cyber AI in 2020, including advanced email phishing campaigns, SaaS account hijacks, and APT41.

    Click to Expand

    Panel Participants:

    Brianna Leddy
    Brianna Leddy

    Brianna Leddy

    Director of Analysis

    Collapse This Item

  • Extortionware: Your Privacy Problems Made Public 4:05 pm

    Presented by OneLogin

    Over the last decade, ransomware has increasingly become the most popular option for hackers to monetize the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.

    Click to Expand

    Panel Participants:

    Lonnie Benavides
    Lonnie Benavides

    Lonnie Benavides

    Head of Infrastructure and Application Security

    Collapse This Item

  • CISO Break
  • CISO Panel 4:30 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Swamy Sriperumbudur
    Swamy Sriperumbudur

    Swamy Sriperumbudur

    COO/CIO - Infomerica, Inc.

    Kenneth “Scott” Dickinson CISSP/CCSP
    Kenneth “Scott” Dickinson CISSP/CCSP

    Kenneth “Scott” Dickinson CISSP/CCSP

    Virtual Chief Information Security Officer - The South Carolina Department of Administration

    Robert Reynolds
    Robert Reynolds

    Robert Reynolds

    Chief Information Security Officer - Town of Chapel Hill

    Kareem Briggs
    Kareem Briggs

    Kareem Briggs

    CISO & Privacy Officer - South Carolina Department of Disabilities & Special Needs

    Collapse This Item

  • Summit Final Closing Session