Event Schedule

Times for this Event are in Eastern Standard Time (EST)

The Summit will be open from 8AM to 6PM.

  • Welcome
  • Understanding and Combating Credential Stuffing Attacks 8:50 am

    Presented by Auth0

    Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

    In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

    Join Auth0 to learn:

    •       How credential stuffing attacks work
    •       What effect they can have on your company
    •       Steps to detect and mitigate these attacks
    Click to Expand

    Panel Participants:

    Chris Scott
    Chris Scott

    Chris Scott

    Sr. Solutions Engineer

    Collapse This Item

  • Why do Small Businesses Need Big Protection? 9:10 am

    Presented by Cisco

    As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations.  The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.

    Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on.  At the base of many of these challenges lies DNS Security.  DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.

    Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.

    Click to Expand

    Panel Participants:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Morning Coffee Break
  • Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 9:50 am

    Presented by Proofpoint

    Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.

    Join our session and learn about:

    • What is BEC and EAC? And how do they work?
    • What are the common attack tactics regarding this new form of email threats?
    • Best practices to defend against BEC and EAC
    Click to Expand

    Panel Participants:

    Ash Valeski
    Ash Valeski

    Ash Valeski

    Email Security Product Evangelist

    Collapse This Item

  • Your 2020 Ransomware Hostage Rescue Guide 10:10 am

    Presented by KnowBe4

    Ransomware attacks are on the rise and are estimated to cost global organizations $20 billion by 2021. As ransomware attacks become more targeted and more damaging, your organization faces increased risk that can leave your networks down for days or even weeks.So, how can your organization avoid getting held hostage?

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he looks at concerning features of new ransomware strains, provides actionable info that you need to prevent infections, and gives you tips on what to do when you are hit with ransomware.

    In this webcast we will cover:

    • What new scary ransomware strains are in the wild
    • Am I infected?
    • I’m infected, now what?
    • Proven methods of protecting your organization
    • How to create your human firewall

    Don’t get held hostage and become a statistic!

    Click to Expand

    Panel Participants:

    Erich Kron
    Erich Kron

    Erich Kron

    Security Awareness Advocate

    Collapse This Item

  • Users-Centric Security - Expert Panel Discussion 10:30 am

    Users-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

    Click to Expand

    Panel Participants:

    Collapse This Item

  • Morning Break
  • Intro to MITRE ATT&CK for Assessing and Mitigating Risk 11:20 am

    Presented by Morphisec

    The MITRE ATT&CK framework has been growing dramatically in both popularity and scope in recent years. Their adversary emulation planning, evaluations, and matrices can offer great value to businesses as they assess their risk and plan their defense strategies. However, it is often difficult for organizations to know where to begin, especially when every business has unique constraints, assets, and threats to manage. This talk offers pragmatic guidance on how any organization can begin using MITRE ATT&CK for a personalized assessment and mitigation.

    Click to Expand

    Panel Participants:

    Daniel Petrillo
    Daniel Petrillo

    Daniel Petrillo

    Director of Security Strategy

    Collapse This Item

  • Shifting PAM into High Gear with Zero Standing Privilege (ZSP) 11:40 am

    Presented by Remediant

    Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.

    • Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
    • So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded
    Click to Expand

    Panel Participants:

    Paul Lanzi
    Paul Lanzi

    Paul Lanzi

    COO

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing : SEI 12:05 pm
  • Keynote: Dr. Kristen Pedersen 12:25 pm

    Panel Participants:

    Dr. Kristen Pederson
    Dr. Kristen Pederson

    Dr. Kristen Pederson

    Associate Vice President - NUARI

    Collapse This Item

  • Are You Ready for Intelligent SOC? 1:05 pm

    Presented by Netenrich

    Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

    Click to Expand

    Panel Participants:

    Brandon Hoffman
    Brandon Hoffman

    Brandon Hoffman

    Head of Security Strategy & CISO

    Collapse This Item

  • Why Zero Trust Architecture Will Be the New Normal in 2021 1:25 pm

    Presented by Cloudflare

    The COVID-19 pandemic brought changes no IT team was ready for: employees were sent home, customer interaction models changed, and cloud transformation efforts abruptly accelerated. Cloudflare recently commissioned Forrester Consulting to explore the impact of 2020 disruptions on security strategy and operations among companies of all sizes. To do so, they surveyed 317 global security decision makers from around the world.

    Join Brian Parks, for an in-depth discussion of the survey results, followed by practical guidance for next year’s planning.

    Key Takeaways:

    • How 2020’s disruptions created challenges and opportunities for security teams of all sizes
    • Specific challenges North American companies faced in securing the change
    • Why executive buy-in for Zero Trust security initiatives is higher than ever
    • What peer security leaders are prioritizing for Zero Trust initiatives in 2021
    • How to drive successful Zero Trust pilot projects with Cloudflare for Teams
    Click to Expand

    Panel Participants:

    Brian Parks
    Brian Parks

    Brian Parks

    Go-To-Market Leader

    Collapse This Item

  • Afternoon Coffee Break
  • Cybersecurity Landscape - Expert Panel Discussion 2:00 pm

    Managing all Types of Risk in Today's Cybersecurity Landscape

    Risk comes from all angles in 2021. Users, vendors, partners, systems.  In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the region.

    Click to Expand

    Collapse This Item

  • Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 2:25 pm

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Challenges of cloud: How it makes an already difficult situation even harder 2:45 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Panel Participants:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Afternoon Break
  • Ransomware - Expert Panel Discussion 3:25 pm

    Recover from Ransomware/Ransomware Ex Post Facto: Coming Back After an Attack

    Whether you chose to pay the ransomware or not, industry experts tell you to treat your entire network as contaminated.  Rebuilding images, devices, re-formatting storage, and all the rest is part of this process.  In this panel, our experts will talk about what to do first – and what to avoid, and where the traps may lie.

    Click to Expand

    Collapse This Item

  • How do you start a ML project? Finding the Breach with Infinity SOC 3:50 pm

    Presented by Check Point

    What is Machine Learning? Can you decipher buzzwords such as Artificial Intelligence, machine or deep learning, and differentiate between hype and fake news? Cyber-attacks are more prevalent than ever in our world today, with exponential, every-increasing variance, velocity, and volume of threat campaigns. This presentation aims to hopefully enable you to understand what lies beneath the words “AI-powered cloud” or more precisely “data driven security”. 

    The Security Operations Center (SOC) is often all that stands between an organization and a potentially financially devastating data breach. However, 98% of SOC teams face significant challenges in their mission to detect and shut down attacks. For many SOC teams, finding malicious activity inside their network is like finding a needle in a haystack. They are often forced to translate information from across a multitude of monitoring solutions and navigate through tens of thousands of daily alerts. This is a crossroad where machine learning and security align to equip security analysts with relevant and actionable information to prevent and respond to threats in real time.

    Click to Expand

    Panel Participants:

    Elie Klein
    Elie Klein

    Elie Klein

    Security Engineer

    Collapse This Item

  • Changing Cyber Landscapes: The Battle of the Algorithms 4:10 pm

    Presented by Darktrace

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. Mounted at speed and scale, AI-powered cyber-attacks will drastically increase yield for cyber-criminals, and may even result in the subtle manipulation or distortion of information or data. 

    In the face of offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. 

    In this session, learn about: 

    • Paradigm shifts in the cyber-threat landscape 
    • Advancements in offensive AI attack techniques 
    • How defensive AI can fight back 
    • Real-world examples of emerging threats that were stopped with Cyber AI
    Click to Expand

    Panel Participants:

    Andrew Hudson
    Andrew Hudson

    Andrew Hudson

    Cyber Security Account Manager

    Collapse This Item

  • CISO Panel 4:25 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Bernie Cowens
    Bernie Cowens

    Bernie Cowens

    Chief Security Officer - Utility Technology Solutions

    Stan Mierzwa
    Stan Mierzwa

    Stan Mierzwa

    Director & Lecturer, Center for Cybersecurity - Kean University

    Gene Barskiy
    Gene Barskiy

    Gene Barskiy

    Head of IT and Security - Fisk Alloy

    Demond Waters

    Demond Waters

    Chief Information Security Officer - New York City Department of Education

    Suresh Chawdhary
    Suresh Chawdhary

    Suresh Chawdhary

    Head of Security and Privacy - NOKIA

    Christopher Frenz
    Christopher Frenz

    Christopher Frenz

    AVP of IT Security

    Tim Rohrbaugh
    Tim Rohrbaugh

    Tim Rohrbaugh

    CISO - JetBlue Airways

    Collapse This Item

  • Summit Final closing Session

Registration

Wed. Mar 24

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Register