Event Schedule

Times for this Event are in Eastern Standard Time (EST)

  • Welcome
  • Breakfast Briefing 8:40 am

    Meet the Exhibitor

    Collapse This Item

  • Welcome / Introductions
  • Understanding and Combating Credential Stuffing Attacks 9:05 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    •       How credential stuffing attacks work
    •       What effect they can have on your company
    •       Steps to detect and mitigate these attacks
    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer

    Collapse This Item

  • Why do Small Businesses Need Big Protection? 9:30 am

    Presented by Cisco

    As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations.  The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.

    Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on.  At the base of many of these challenges lies DNS Security.  DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.

    Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.

    Click to Expand

    Panel Participants:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Management Lead

    Collapse This Item

  • Morning Coffee Break
  • Subject Matter Expert Session - More Details To Come 10:10 am

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Your 2020 Ransomware Hostage Rescue Guide 10:30 am

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion by 2021. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks.So, how can your organization avoid getting held hostage?

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate

    Collapse This Item

  • Expert Panel Discussion #1 10:50 am

    Session Details Coming Soon

    Click to Expand

    Panel Participants:

    Collapse This Item

  • Morning Break
  • Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 11:35 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Global Product Manager

    Collapse This Item

  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 11:55 am

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    • Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
    • So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded
    Click to Expand

    Panel Participants:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing 12:20 pm

    Meet the Exhibitor

    Collapse This Item

  • Keynote: 12:45 pm
  • The Intelligent SOC 1:30 pm

    Presented by Netenrich

    Are you ready for Intelligent SOC?

    The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC. Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

    Click to Expand

    Panel Participants:

    Brandon Hoffman
    Brandon Hoffman

    Brandon Hoffman

    CTO and Security Executive

    Collapse This Item

  • Why Zero Trust Architecture Will Be the New Normal in 2021 1:45 pm

    Presented by Cloudflare

    The COVID-19 pandemic brought changes no IT team was ready for: employees were sent home, customer interaction models changed, and cloud transformation efforts abruptly accelerated. Cloudflare recently commissioned Forrester Consulting to explore the impact of 2020 disruptions on security strategy and operations among companies of all sizes. To do so, they surveyed 317 global security decision makers from around the world.

    Join Brian Parks, for an in-depth discussion of the survey results, followed by practical guidance for next year’s planning.

    Key Takeaways:

    • How 2020’s disruptions created challenges and opportunities for security teams of all sizes
    • Specific challenges North American companies faced in securing the change
    • Why executive buy-in for Zero Trust security initiatives is higher than ever
    • What peer security leaders are prioritizing for Zero Trust initiatives in 2021
    • How to drive successful Zero Trust pilot projects with Cloudflare for Teams
    Click to Expand

    Panel Participants:

    Brian Parks
    Brian Parks

    Brian Parks

    Go-To-Market Leader

    Collapse This Item

  • Afternoon Coffee Break
  • Expert Panel Discussion #2 2:15 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Deciphering SOC 2 Compliance in Cloud-Native Environments 2:20 pm

    Presented by Capsule8

    How did a fairly straightforward endeavor – an IT audit – become that monster under the bed?

    Compliance projects all too often feel a massive box checking exercise. You may be pulling staff and co-workers into a vast abyss, mapping arcane compliance controls, deciphering audit speak, all to hopefully pass an audit and maybe shore up security. So how can you, the IT experts, quickly tease out the essence of what an auditor needs to give them confidence that you have passed an audit?

    In this presentation we will use the example of a SOC 2 Type 1 audit in a cloud-native environment to demystify all of the dots, dashes and control numbers, giving you a high level roadmap of key elements required to pass your own SOC 2 audit regardless of where you are on your cloud native or compliance journey.

    Click to Expand

    Panel Participants:

    Cynthia Burke
    Cynthia Burke

    Cynthia Burke

    Compliance Manager

    Collapse This Item

  • Challenges of cloud: How it makes an already difficult situation even harder 3:00 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Panel Participants:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Afternoon Break
  • Expert Panel Discussion #3 3:35 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 4:05 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • CISCO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Bernie Cowens
    Bernie Cowens

    Bernie Cowens

    Chief Security Officer - Utility Technology Solutions

    Stan Mierzwa
    Stan Mierzwa

    Stan Mierzwa

    Director & Lecturer, Center for Cybersecurity - Kean University

    Collapse This Item

  • Summit Final closing Session