Event Schedule

Times for this Event are in Pacific Standard Time (PST)

  • Welcome
  • Welcome / Introductions
  • Using Security Testing to know What’s Working 8:30 am

    Presented by Cymulate

    The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.

    Click to Expand

    Panel Participants:

    Mike DeNapoli
    Mike DeNapoli

    Mike DeNapoli

    Sr. Security Architect

    Collapse This Item

  • Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore 9:00 am

    Presented by OneTrust

    For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromises. However, there are “red flags” you can look for when evaluating the security, privacy, and compliance programs of your vendors. ​

    TAKE AWAYS​:

    •       How to spot “red flags” from risky vendors​
    •       What leading third-party risk professionals look for when evaluating vendors​
    •       How to evaluate vendors using assessment communities and shared due diligence data​
    Click to Expand

    Panel Participants:

    Randy Ferree
    Randy Ferree

    Randy Ferree

    CSO

    Collapse This Item

  • Morning Coffee Break
  • IoT Security Is Bad. It’s Time For a Different Approach 9:40 am

    Presented by Ordr

    For many years now, enterprises have seen an explosive rise in unmanaged, IoT and IoMT devices. These devices are hard to discover, often run obsolete operating systems, and can be in service for years. They cannot be protected by typical agent-based security technologies. It’s time for a modern approach. In this session, Ordr CISO Jeff Horne discusses a modern framework for connected device security. This includes real-time, continuous asset inventory, monitoring of device behavior and risks, and automated Zero Trust policies to allow device access while limiting exposure.

    Click to Expand

    Panel Participants:

    Jeff Horne
    Jeff Horne

    Jeff Horne

    CSO

    Collapse This Item

  • Presentation Title: Automate or Die Trying: The New Cybersecurity Reality 10:00 am

    Presented by Armor Defense

    As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process. 

    Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes. 

    Join our session to learn: 

    • Key security considerations when implementing automation programs
    • Advice for how companies can begin finding success with AI and machine learning
    Click to Expand

    Panel Participants:

    Ryan Smith
    Ryan Smith

    Ryan Smith

    Vice President of Product

    Collapse This Item

  • Morning Break
  • Expert Panel Discussion #1 10:45 am

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Securely Connecting the Right People to the Right Technologies 11:15 am

    Presented by Okta

    As global enterprises adapt to the new reality of cloud-first infrastructure, the rise of different types of accounts and identities has asymmetrically complicated things. Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices.

    Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth.

    Join us for this short presentation to learn how optimizing your IAM provides a seamless way to manage user identities and access while protecting against credential-focused attacks.

    Click to Expand

    Panel Participants:

    Shyam Rajaram
    Shyam Rajaram

    Shyam Rajaram

    Enterprise Sales Engineer

    Collapse This Item

  • Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 11:40 am

    Presented by Zerto

    Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Global Product Manager

    Collapse This Item

  • Lunch Break
  • Lunch Sponsor / Briefing 12:00 pm

    Presented by Cisco

    Collapse This Item

  • Keynote: Cyber Security Briefing – Cyber Fraud Task Force 12:25 pm

    Presented by US Secret Service

    Cyber Security Briefing – Cyber Fraud Task Force – United States Secret Service

    Click to Expand

    Panel Participants:

    Collapse This Item

  • Application Security Beyond Effective Bot Mitigation 1:10 pm

    Presented by Shape Security

    The past twelve months have been punctuated by soaring data breaches, new attack patterns and phishing scams catalyzed by COVID-19 with Credential Stuffing and other brute force attacks resulting in hard losses surpassing billions of dollars. Now, more so than ever in this digital-first world, must organizations seek cross-functional, convergent platforms with strong digital fraud solutions to combat the relentless sources of cybercrime that continue to abuse our online platforms.

     Join Shape to explore how truly effective digital transformation journeys must transcend traditional bot mitigation and understand why defending our web and mobile applications without harming user experience or hampering revenue growth and brand reputation will become organizing principles for 2021 and beyond.

    Click to Expand

    Panel Participants:

    Gary Newe
    Gary Newe

    Gary Newe

    VP of Solutions Engineering - Shape Security Solutions

    Collapse This Item

  • The Cloud Requires an Evolution Beyond the Secure Email Gateway 1:30 pm

    Presented by Avanan

    Cloud email requires a new approach to security. If your corporate email relies on Microsoft or Google, you may have deployed (or are considering) a Secure Email Gateway (SEG). Originally designed as a perimeter solution for on-premise email, you should ask these questions:

    • Why do you disable the native security in our platform?
    • How can my configuration allow attackers to bypass the gateway?
    • How do we block insider email attacks?
    • How can we quarantine a compromised account?
    • How can we prevent Business Email Compromise (BEC) or impersonation email attacks?

    Our cloud security expert Jeff will explain where an SEG approach falls short protecting cloud-hosted email. Touch upon fundamental architectural weaknesses of a proxy design, and arm attendees to help them make smart decisions to protect their users.

    Click to Expand

    Panel Participants:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Sales Engineer

    Collapse This Item

  • Afternoon Coffee Break
  • Expert Panel Discussion #2 2:10 pm
  • The Intelligent SOC 2:30 pm

    Presented by Netenrich

    Are you ready for Intelligent SOC?

    The Security Operations Center (SOC) is under attack like never before, from both inside and out. Endless threats and alerts, analyst fatigue, too few resources, and a chronic lack of executive support top today’s list of challenges. Intelligent SOC from Netenrich right-sizes investments to transform the inefficiencies, skills gaps, and budget constraints that undermine the traditional SOC. Invoked by experts, Intelligent SOC solves today’s problems (and tomorrow’s issues) better and faster by going beyond the SIEM—and even beyond AI—to combine threat intelligence (TI), attack surface management (ASM), and pay-as-you-grow SOC-as-a-Service. Join us to hear how this expansive approach transforms your security investments and operations into better ROI and safer outcomes—in hours or days versus weeks, months, or years.

    Click to Expand

    Panel Participants:

    Brandon Hoffman
    Brandon Hoffman

    Brandon Hoffman

    CTO and Security Executive

    Collapse This Item

  • Why Zero Trust Architecture Will Be the New Normal in 2021 2:50 pm

    Presented by Cloudflare

    The COVID-19 pandemic brought changes no IT team was ready for: employees were sent home, customer interaction models changed, and cloud transformation efforts abruptly accelerated. Cloudflare recently commissioned Forrester Consulting to explore the impact of 2020 disruptions on security strategy and operations among companies of all sizes. To do so, they surveyed 317 global security decision makers from around the world.

    Join Brian Parks, for an in-depth discussion of the survey results, followed by practical guidance for next year’s planning.

    Key Takeaways:

    • How 2020’s disruptions created challenges and opportunities for security teams of all sizes
    • Specific challenges North American companies faced in securing the change
    • Why executive buy-in for Zero Trust security initiatives is higher than ever
    • What peer security leaders are prioritizing for Zero Trust initiatives in 2021
    • How to drive successful Zero Trust pilot projects with Cloudflare for Teams
    Click to Expand

    Panel Participants:

    Brian Parks
    Brian Parks

    Brian Parks

    Go-To-Market Leader

    Collapse This Item

  • Afternoon Break
  • The Roadmap to Becoming A Cybersecurity Author 3:25 pm

    Presented by John Helmus

    Are you a security-minded professional who wants to write a book, but you do not know where to start? Have a manuscript collecting dust and just don’t know what publishers you can submit your work to? Perhaps you really want to write a book and just need want to know a little more about the process of writing a book – rather than learning as you go with the grueling flow of writing a book. Maybe you even have an excellent topic to write about but are worried that it is redundant because someone already wrote about it.  These common points are some of the largest reasons why many aspiring cybersecurity authors never fully lift on with writing a book. Writing a book is a journey that you will often learn as you go; however, that doesn’t mean that getting started can be overwhelming. 

    In this talk, Jon Helmus (Hacker and Author) will share insights on the steps that aspiring cybersecurity authors need to take to get their ideas from their minds to paper! Attendees will learn the “why,” “what,” and “how” to get started and write a cybersecurity book. Jon will also share his own stories from writing his book “AWS Penetration Testing” and what he learned from his own experiences. 

     

    Click to Expand

    Panel Participants:

    Jonathan Helmus
    Jonathan Helmus

    Jonathan Helmus

    Manager of Pentest Community - Cobalt.io

    Collapse This Item

  • Challenges of cloud: How it makes an already difficult situation even harder 3:50 pm

    Presented by Imperva

    Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.

    Click to Expand

    Panel Participants:

    Marc Gamache
    Marc Gamache

    Marc Gamache

    Solution Engineer

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 4:10 pm

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • CISO Panel 4:35 pm

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Robert Thomas
    Robert Thomas

    Robert Thomas

    CISO - 180AConsulting.com

    Ian Fitzgerald
    Ian Fitzgerald

    Ian Fitzgerald

    Chief Information Officer - Truckee Donner Public Utility District

    Hadas Cassorla
    Hadas Cassorla

    Hadas Cassorla

    Principal and CISO - Scale Security Group

    Collapse This Item

  • Summit Final closing Session