Data Connectors is proud to host the Dallas Virtual Cybersecurity Summit.
Times for this Event are in Central Standard Time (CST)
Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromises. However, there are “red flags” you can look for when evaluating the security, privacy, and compliance programs of your vendors.
Why Zero Trust Architecture Will Be the New Normal in 2021
The COVID-19 pandemic brought changes no IT team was ready for: employees were sent home, customer interaction models changed, and cloud transformation efforts abruptly accelerated. Cloudflare recently commissioned Forrester Consulting to explore the impact of 2020 disruptions on security strategy and operations among companies of all sizes. To do so, they surveyed 317 global security decision makers from around the world.
Join Brian Parks, for an in-depth discussion of the survey results, followed by practical guidance for next year’s planning.
• How 2020’s disruptions created challenges and opportunities for security teams of all sizes
• Specific challenges North American companies faced in securing the change
• Why executive buy-in for Zero Trust security initiatives is higher than ever
• What peer security leaders are prioritizing for Zero Trust initiatives in 2021
• How to drive successful Zero Trust pilot projects with Cloudflare for Teams
Brian Parks has two decades of experience helping technology companies grow revenues including diverse responsibilities managing Direct and Channel Sales, Partnerships, Marketing, Customer Success, Product Management & Engineering.
Veteran’s Day (moment of silence)
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.
Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences.
Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader.
Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel’s leading academic institutions.
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy
Data protection is experiencing a resurgence. Historically it’s been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organizations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organization can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defense.
David joined Pure Storage in October 2018 as the Rapid Restore Solutions Director and is responsible for the
Rapid Restore solutions roadmap, working with our Data Protection partners (Veritas, Veeam, CommVault & Rubrik) and making sure the Pure sales field have all the tools and enablement they need to be successful. Previously,
David spent a year at Amazon Web Services building a competitive team to work directly with Amazon’s sellers and customers. Before that David spent 17 years at Veritas Technologies in a number of roles – SE, SE Manager and later was responsible for building
a Competitive Intelligence team. He left Veritas as the Director of Competitive and Market Intelligence in 2017.
IoT – Security at the Edge
The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.
The 2020 Cybersecurity Skills Shortage
The cybersecurity skills shortage is real and getting worse: according to ISC(2), nearly three million cybersecurity positions worldwide are currently unfilled, and Cyberseek reports that more than 300,000 positions are available just in the United States. A lack of cybersecurity analysts, researchers, and other security experts means that bad actors have even more of an upper hand because there are fewer people available to investigate potential threats, analyze attacks, and remediate security problems. The lockdowns arising from the COVID-19 pandemic has made the problem worse.
Osterman Research has conducted an in-depth study and produced a white paper focused squarely on this issue, and Michael Osterman will be presenting the results of that research. In this session you will learn:
Michael Osterman is the principal analyst of Osterman Research, a market research and consulting firm focused on understanding the technologies and processes involved in workplace communication and collaboration. Michael has been the head of Osterman Research for 19 years and in the tech-focused market research industry for many years before that. The company covers a number of topics related to security, security awareness training, content archiving and other areas that are focused on how people communicate and collaborate. The company is based in Washington State.
Q&A @ 1:10 PM
Developing Your Identity Strategy
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Rob is a veteran of the cybersecurity industry with over 20 years of experience. Throughout his career he has focused on Identity governance & access management, as well as APIs & microservices. Rob’s ability to address both business and technical requirements, and provide effective solutions has enabled him to become a trusted advisor for clients across multiple industries. Rob holds a Bachelor of Technology Management, a MSc in IT, and Advanced Certificates in Telecommunications Management and Enterprise Architecture. When not working with clients, he enjoys outdoor activities with family, gaming, and having lively conversations.
Hacking Exposed: Learning from the Adversaries
Fileless attacks and fileless malware have grown in sophistication, especially in their ability to obfuscate and hide from both traditional and next-generation anti-virus. Join us to discover the techniques being used by APT32/OceanLotus to attack their victims and learn how to replicate them to better test your defenses. In this very short demonstration, you will learn techniques to make a weaponized document that is designed to not just bypass AV but also human threat hunters through a sophisticated method of obfuscation and the use of built-in trusted tools. The document is capable of allowing the attacker to gain remote access to the victim system and exfiltrate sensitive data. You will get to see, firsthand, the attack compromise both a Windows PC as well as a MacOS.
Brian Robison is the Chief Evangelist at BlackBerry, where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack. Prior to joining Cylance, Robison spent five years helping secure corporate data on mobile devices—three years at Citrix as Director of Technical Marketing and two years driving enterprise product strategy at Good Technology. Before moving into the mobile security space, Robison’s career focused on endpoint security and risk and compliance. At McAfee, he led the effort to bring ePolicy Orchestrator into the modern age as well as managing the vulnerability management and policy compliance solutions. Prior to McAfee, Robison held many roles over his seven-year career at Tripwire, Inc.
CyberSecurity Author Interview: No Safe Harbor
In this interview, our CSO, Michael Hiskey, interviews Mark Sangster. Mark is the author of the recent book, No Safe Harbor: the inside truth about cyber crime and how to protect your business. In this short conversation, Michael talks with the author about the stories in the book, what the key takeaways are, and the process of writing it.
Wargaming: Who, What and How of a Strategic Tabletop
The last thing any captain wants to do while the ship is sinking is say, “Well I hope the emergency procedures work.” The last thing an organization wants to say in the midst of an incident is, “We hope our Incident Response Plan works!” Tabletop exercises have many different positive outcomes that a company can utilized to further develop their security and incident response program. Though this is seen and categorized as strategic planning, there are many technical and tactical components needed to ensure the tabletop is effective at all levels of implementation. The last thing anyone wants are untested processes, tools, and procedures when the ship is taking on water.
Joshua Harr studied MS Cybersecurity and Resilience at Northeastern University. In addition to his role at Rapid7 as a Senior Advisory Services Consultant, he is a Cyber Planner for Joint Force AFCYBER, Air Force Reserves. Joshua’s areas of expertise include incident response, threat hunting, industrial control systems, cybersecurity stregtic planning and security policy and development.
Surviving the Digital Storm – IoT Security Deluge
We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business processes with higher efficiency.
This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.
Joel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience deploying application protection and network-based security. Mr. Hollenbeck has been securing networks and systems since 1994, including developing and executing on strategies to connect some of the most sensitive networks for the Federal Government and Financial Institutions to the Internet in the earliest days of commercial internet connectivity. Mr. Hollenbeck has served as a consulting Security Architect with Check Point Software Technologies advising a wide variety of clients across many verticals on Security Best Practices, Security Architecture, and deriving the maximum value from investments in security, prior to joining Check Point, Mr. Hollenbeck has held various security engineering, leadership and executive roles within organizations local to St Louis.
Defense-in-Depth: 3rd Party Risk
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
The Dark Web: A New Underground Economy
How Dark Markets are Innovating and Why It Matters
Throughout history, underground economies thrive following war, natural disaster or political upheaval. While difficult to accurately discern, the underground economy in the U.S. is estimated to be 11-12% of GDP or $2.5 trillion–excluding illegal drug sales, gambling or prostitution! Over the last two years, dark web marketplaces and other underground commerce methods have been innovative and growing, preparing for a new economic reality. While drugs are still popular, malware and stolen data have become far more lucrative for sellers and buyers. In this session, analyst Michael Mayes will share the latest on dark web market innovation and activity, including the sale of COVID-19 related drugs and supplies.
Michael Mayes is a writer and cybersecurity threat researcher in Dallas, Texas. Since 2013, his work has focused on darknet anonymous markets and the technology, including Bitcoin, that makes them possible. His research on dark markets and ransomware has been featured in Forbes, Dark Reading, ZDNET and BusinessWeek.
Feature Keynote Q&A @ 4:20 PM
Solution Showcase Open until 6:00
Don’t get Phished! See How IRONSCALES Self-Learning Email Security Platform Stops Tomorrow’s Phishing Attacks Today!
Cyber Criminals don’t care. From holiday seasons, elections, tax-day or our current pandemic COVID-19. They’re ready to exploit people’s vulnerability.
Email phishing is their weapon of choice. 10 years ago, traditional solutions like secure email gateways (SEGs) or in-built security from mailbox providers were enough to stop cyber criminals from gaining access to our accounts. In 2020, attackers are more sophisticated and are changing tactics just as rapidly as businesses are moving to Office 365 and G-Suite.
In the face of this evolving threat, how can you stay ahead of micro-targeted attacks and defend against malicious emails before they gain access to your confidential data? How do you protect end-users confronted by fake login pages (after all, it’s not their job to determine what looks real and what doesn’t)? How do you ensure that your SOC team isn’t overwhelmed by the burden of identifying and remediating phishing threats?
Join IRONSCALES and learn about:
Upon joining IRONSCALES, Ian brought over 20 years of extensive industry experience in the Information Security, Technology and Communications fields and has held various positions including both individual contributor and systems engineering management roles. Ian has regularly presented at various industry events on security topics such as threat prevention, ransomware, and best practices. His last position was Americas Director of Data Center Sales for NetApp covering Canada, Latin America and the US. Ian has worked for large multinational technology companies such as Palo Alto Networks, Foundry Networks/Brocade, Alcatel Lucent, and Fore Systems/Marconi. Ian is originally from South Africa, and now resides in the United States.
Data Connectors is proud to host Day 2 of the Dallas Virtual Cybersecurity Summit.
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices
For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
Join Ordr CSO in this webinar to learn:
Jeff Horne is currently the CSO at Ordr where he is responsible for security direction both within Ordr products and internal security.
He was the VP of Information Security for Optiv where he was responsible for all Security Operations, Governance Risk and Compliance, Endpoint, Internal Incident Response, Physical Security, and Employee Security Awareness groups.
Jeff was the Senior Director of Information Security for SpaceX where he was responsible for the overall security strategy of SpaceX and managing the Information Security, Compliance (ITAR), Security Operations, and Physical Security groups.
Jeff was the Vice President of R&D and Chief Architect for Accuvant LABS where he managed teams of researchers and consultants specializing in reverse engineering, malicious code, incident response, breach analysis, and vulnerability assessment.
Jeff was the Director of Threat Research at Webroot Software where he led several teams of malware researchers, reverse engineers, and a development organization specializing in creating anti-malware functionality and detection signatures for all Webroot products.
Jeff began his career as a Vulnerability Researcher at Internet Security Systems where he was responsible for vulnerability discovery, exploit creation, IDS evasion research, and behavioral detection of malware. Jeff is well known for his insight in interviews for numerous news channels and publications, speaking roles at various security conferences, as well as authoring several vulnerability disclosures and patents.
Understanding and Combating Credential Stuffing Attacks
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
Chris Scott is a Senior Solutions Engineer at Auth0. Leveraging his past experience in both software development and enterprise sales, Chris provides education and guidance to security professionals looking to strengthen their identity strategy.
A new Spin on Securing Active Directory
CISOs, Penetration Testers, and Incident Responders all agree that Active Directory is a primary target for attackers. So why isn’t AD defended more effectively? Join us in this session to learn who is attacking AD, why AD Security has traditionally been so difficult, and some groundbreaking new techniques for securing Active Directory.
Tom Atkins is a veteran Information Security professional with over 25 years of experience. Tom specializes in guiding young technology companies successfully into new markets. He works closely with leading companies to identify and resolve their core security challenges. At FireEye, he was the first customer-facing employee for the East Coast and at OpenDNS held a similar role building the Enterprise sales organization and strategy and managing the transition through the acquisition by Cisco in 2015. Tom is currently leading the East sales team for Attivo Networks, the leading deception company in the market.
Data Minimization: How to Use ML to Reduce Risk on Duplicate Data
With data growing exponentially, data sources spread across disparate data sources, centers, and clouds, it’s more difficult than ever to proactively reduce risk, classify, and protect critical and sensitive data.
One of the largest sources of risk comes from duplicate and redundant sensitive data migrating across multiple data sources and stores. Blind spots into your derivative data can create unnecessary data exposure risks, stall cloud migration initiatives, data minimization initiatives, and M&A processes, and present an additional layer of compliance challenges across the board.
Join Michael Long from BigID to explore these risks – and how to apply ML and NLP to discover, identify, and minimize duplicate and similar data.
Michael Long is a Senior Solution Architect at BigID, with a background stretching across the data and information management space. Having previously held positions at Splunk as a Senior Sales Engineer, IBM in Sales Engineering and Partner Enablement and numerous roles at HP in Sales, Consulting and Customer Success. Originally from the UK, he’s now based in Florida – where he enables customers to understand and experience how BigID’s Data Intelligence Platform can accelerate and surface sensitive data across the enterprise to gain insight and value.
Managing all Types of Risk in Today’s Cybersecurity Landscape
Risk comes from all angles in 2020 users, vendors, partners, systems. In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the Midwest.
Lunch Briefing – Starts at 12:00 pm
Complying with reduced TLS/SSL Certificate Lifetimes
Join Andrew Sheedy, PKI Services Director at Entrust, as he navigates the pain points in the TLS/SSL Certificate landscape.
In April of 2020, a decision was made that TLS certificates issued on or after September 1st, 2020 must have a validity period of no more than 398 days. We will cover the impacts this decision has on your company and the industry as a whole, as well as other current trends.
Andrew Sheedy has 25 years of experience in the CyberSecurity Industry including almost a year at Entrust as PKI Services Director.
Lunch / Solutions Showcase Open
Cyber Threats, Not If but When
SA Bishea will address cyber threat trends, how the FBI combats cyber threats, what you can do and resources available.
Special Agent Gregory Bishea has been with the FBI over 25 years. He began his career as a Forensic Chemist and has worked counterterrorism in Los Angeles, New York, and Washington, D.C. SA Bishea holds several graduate degrees, including a doctorate in chemistry. For the past several years he has focused on digital forensics and cyber investigations.S
WPA3: The New Standard for Wi Fi Security
The Wi-Fi Alliance has recently announced a new standard in wireless, Wi-Fi CERTIFIED WPA3TM. WPA3 (Wi-Fi Protected Access) is designed as the successor to widely used WPA2 and brings a number of core enhancements to improve security protections and onboarding procedures across personal, public, and enterprise networks.
Security issues on the network range widely for IT and personal users alike – from malicious attackers and unknown devices to risks posed by a misconfigured network. The rise in IoT devices exacerbate these problems, especially in enterprise networks. In the home and small business space, open and lightly protected networks are attractive targets for attackers out to gain access to the network or sniff out potentially sensitive information sent in the clear. WPA2-Personal is particularly susceptible to offline dictionary attacks, while WPA2-Enterprise is very hard to the provision because it has so many options.
This is where standards-based designs, much like an API-compatible, multivendor network architecture, steps in to enable a high degree of adoption of new features and technologies to improve end-user protections and IT capabilities.
As we walk through what WPA3 does, please note, WPA3 does not replace your existing enterprise-grade security solution. Security must be taken holistically and integrate capabilities ranging from a user, device, and application-level granularity.
With that, WPA3 aims to solve these key problems:
Problem: Wireless traffic is passed in the clear (open networks)
Solution: With WPA3, there are no more open networks! OWE, or Opportunistic Wireless Encryption encrypts all wireless traffic on formerly Open networks.
The most likely relatable scenario typically involves networks you commonly connect to in small businesses such as coffee shops, private auto shops, and restaurants, where Wi-Fi is not a gated asset. If these are Open networks or even if they use a shared and public PSK (such as written on a chalkboard or on the menu in a restaurant) your Wi-Fi traffic can be decrypted by attackers on the network. OWE raises the bar on security and protects against these passive attacks.
An OWE network provides users with a seamless experience. It looks like an Open network in the list of available networks, but under the covers, OWE provides improved security.
Problem: PSK can be methodically hacked with an offline dictionary attack
Solution: PSK mode is replaced by SAE, or Simultaneous Authentication of Equals, which is resistant to active, passive, and dictionary attacks. Offline dictionary attacks observe a single WPA2-PSK exchange and then cycle through all possible combinations of a Wi-Fi password, seeing if the guessed one was used in the exchange, until the right password is found. The more complex you make your password the better, but complex passwords are hard for people to manage and enter with a low probability of error. Putting the burden of network security on users is never a good idea. With WPA3-SAE, the protocol is secured and retains its security even when used with PSKs that would be deemed too weak for WPA2-PSK.
With WPA3-SAE, users need not learn about new security procedures (or know what a dictionary attack is). The UI for SAE is identical to a PSK network. Users are comfortable entering a password when prompted and nothing changes from their point-of-view but under the covers they get a truly secure connection.
Problem: Mix-and-match nature of WPA2-Enterprise can result in less-than-optimal security
Solution: WPA3 introduces 256-bit encryption, CNSA (Suite B) security capabilities, and baseline rules to ensure consistent security.
While enterprises deploy highly secure networks using WPA2-Enterprise configurations, there are still too many options during implementation that can result in less-than-secure deployments. For instance, should you use RSA key exchanges? 1024-bit authenticating 2048-bit? TLS 1.0? SHA1? With new WPA3-CNSA, EAP-TLS uses Suite B TLS ciphersuites, and also introduces 192-bit security commonly deployed in high-security Wi-Fi networks in government, defense, and industrial verticals. These ciphersuites combine all of the various options—cipher mode, hash algorithm, key exchange, authentication method—into a single suite that provides consistent security for each user connection. No more mixing and matching of options and no more worries about clients “negotiating down” the security of an EAP-TLS connection, whether intentionally or unintentionally
Dan Harkins is a researcher in the field of applied cryptography at Aruba, a Hewlett Packard Enterprise Company, as well as a technical Fellow. He specializes in designing secure protocols for network access and device communication. He is the author of numerous RFCs in the field of authentication and secure key establishment. His current focus of research is in robust and misuse resistant cryptography and in ways to provision trust in per-user or per-device credentials that scale from the home network to the enterprise.
Dan has been designing secure key exchange protocols for over 20 years at almost every layer of the stack, and he is a recognized security professional in the IETF, IEEE 802.11, and the Wi-Fi Alliance. His research in robust and “misuse resistant” cryptography has resulted in scalable and secure innovations for HPE Aruba. For network security professionals, Dan is of course well known as the primary author of RFC 2409, the Internet Key Exchange (IKE). IKE is a fundamental building block of IPsec and is still widely used today within Aruba products and millions of other IT products to build secure communication channels. More recently, Dan’s innovations form the backbone of the newly announced WPA3-Personal and Enhanced Open certifications from Wi-Fi Alliance. These are Simultaneous Authentication of Equals (SAE) which performs an authenticated key exchange using a simple password (RFC 7664) and that replaces WPA2-PSK mode; and Opportunistic Wireless Encryption (OWE) which provides automatic encryption of “open” SSIDs with no user action (RFC 8110). He also completely rearchitected the support password system used in Aruba WLAN products to provide per-engineer one time use credentials, and worked with Engineering and PLM to deploy it across the portfolio. From IKE to WPA3, Dan has been inventing and designing security solutions to make networks more secure and more robust and to scale from small IoT networks to large enterprise networks.
Why do Small Businesses Need Big Protection?
As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations. The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.
Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on. At the base of many of these challenges lies DNS Security. DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.
Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.
Rohit Sawhney leads the DNS Product Management team for Cloud Security at Cisco, with expertise in Cisco Umbrella and surrounding technologies. Rohit has vast experience in product development disciplines in leading global hi-tech organizations for over 20 years. Rohit has rich experience in presenting breakout sessions at Cisco Live events and representing Cisco at numerous other customer and partner events, trade shows, and exhibitions. Rohit holds degrees in Electrical & Computer Engineer and a Business MBA.
Introduction to Proactive Prevention
Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer. Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
Netta Schmeidler, VP Product at Morphisec, has more than 25 years of experience delivering complex enterprise applications and managing global development groups and product teams. Her broad expertise includes all aspects of defining, building and successfully bringing solutions to market. Prior to Morphisec, Netta held senior product management and engineering roles at VMware (Digital Fuel), BMC, Identify Software, and Mercury. She received an MBA from Tel Aviv University, and a BSc in Computer Science from Hebrew University.
Implementing True Zero Trust Control on the Endpoint
In this presentation, ThreatLocker CEO, Danny Jenkins will reveal his approach to managing 3 critical layers of cybersecurity. During this session, you will learn critical security measures you should implement to protect these 3 layers against today’s cyber threats.
Danny Jenkins is an entrepreneur with deep expertise in corporate IT and cybersecurity. He is the CEO & Co-Founder of ThreatLocker and has over two decades of experience in building and securing corporate networks. Before taking the reins at ThreatLocker, Danny held CEO and CTO positions at multiple IT companies and founded a few cybersecurity businesses of his own.
Identity: the New Perimeter?
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?
Solution Showcase Open Until 6:00 pm