Title |
Speakers |
Summary |
Topic Types |
Setting Common Language When Talking to Leadership About IT Risks |
Rick Doten
|
To be successful in presenting IT security to senior leadership, it’s important it is done ... |
|
Third-Party Risk: Creating and Managing a Program that Works! |
David Barton
|
Every organization is concerned with third-party risk. No one wants to be the next Target ... |
|
The Hunt for Cybersecurity Talent: It's Time to Rethink Your Organization's Recruitment Strategy |
Matt Donato
|
Thousands of organizations across the globe are experiencing “hunt fatigue” when it comes to finding ... |
|
[OPENING KEYNOTE] Living in a Resilient World |
Tammy Moskites
|
With over 25 years in Security and Technology and a Career CISO, Tammy Moskites, CEO ... |
|
Advisory Council Roundtable: Prioritizing Risk in an Ever Changing Threatscape |
N/a
|
N/A |
|
ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net |
Mike Muscatell
|
We always hear about the “Dark Web” and how various services advertise the use of ... |
|
[Attack]tive Directory: Compromising Domains via Active Directory Exploits in 2020 |
Ryan Hausknecht
|
As a red teamer and penetration tester, I’ve compromised several networks from small/medium businesses to ... |
|
Protecting You from You Is the #1 Challenge in the Age of SDE (Software Defined Everything) |
Grant Asplund
|
Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the ... |
|
SOCs Stink? |
N/a
|
The traditional SOC model employed by many organizations provides questionable efficacy at an ever increasing ... |
|
LUNCH KEYNOTE: Executive Leadership Panel: Topic: Establishing and Evaluating Effective Cybersecurity Programs |
Mike Brannon
,
Ben Schwering
,
Joel Lowe
|
N/A |
|
Offensive AI vs. Defensive AI: Battle of the Algorithms session level icon |
Melisa Ozcan
|
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ... |
|
[Panel] Emerging Threats – Hackers and Exploits and Phishing Attacks! Oh My! |
Jason Rader
,
Franco Negri
,
Miles Martin
,
Juan Marin
|
We all have heard email is the #1 attack vector. Based on the numbers we ... |
|
[Panel] The Current Threatscape - A Top 5 List |
Matt Rose
,
Tom Utley
,
Justin Bourgeois
,
Steve Gyurindak
,
Matt Fryer
|
Scammers are getting inventive. They are doing their homework. They use social media and Open ... |
|
Cloud Security: Securing Your Organization’s Digital Transformation |
James Asplund
|
What are the security issues that keep you up at night? Connect with peers who ... |
|
Responding to the Evolving Privacy Landscape |
Mike Brannon
|
N/A |
|
Securing Your (SD)-WAN Journey to Your Cloud |
Michael Butterfield
|
SD-WAN has evolved through three main stages to meet the business needs of its users. ... |
|
Penetration Testing The Cybersecurity Maturity Model (CMM) |
Mike Muscatell
|
Many organizations have heard or used the Cybersecurity Maturity Model (CMM) to help improve their ... |
|
Corporate Threat Actor Psychological Profiles: Towards a Formal Ontology for Automatic Detection of Psychological Risk Factors |
Tam Nguyen
|
Human psychology plays an important role in organizational performance. However, understanding our employees is a ... |
|
Building a Cybersecurity Program |
Andrew Dutton
|
Smaller organizations and first time program leads often struggle with the building blocks of a ... |
|
Pandemic Planning: What Security Professionals Need to Know |
Stephen Head
|
Managing operational resilience in today’s digital environment is extremely challenging, whether your organization is public, ... |
|
Connected Devices Need Connected Teams |
Lisa Tuttle
|
IoT security is a growing concern as the number of connected devices increases. California, Oregon ... |
|
[OPENING KEYNOTE]: The Cyberlous Mrs. Maisel: A Comedic (and Slightly Terrifying) Introduction to Information Warfare |
J. Smith
|
Like a dear family relative who won’t stop talking at Thanksgiving dinner, a backdoor exploit ... |
|
Prioritization of Top 20 Critical Security Controls |
N/a
|
N/A |
|
CISO's Guide to Proactive Breach Mitigation Using Threat Intelligence |
Juan Marin
|
Juan Marin, Sales Engineer Manager at IntSights will take you on a tour of the ... |
|
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready? |
Katie Hoover
|
To achieve better security across the US DIB supply chain, the DoD is developing the ... |
|
How Prepared Is Your Organization for a Ransomware Attack? |
Douglas Sudlow
|
While ransomware has become the new exploit of choice for adversaries, these attacks can usually ... |
|
The Cyber Resilience Imperative and the Role of Pervasive Email Security |
Justin Bourgeois
|
Security breaches, data leaks, and email-based attacks are a real threat to your organization. How ... |
|
[LUNCH KEYNOTE] Panel — Securing Democracy: Defending Our Votes in an Era of Cyber Warfare |
Torry Crass
,
Karen Brinson Bell
,
Michael Dickerson
,
Brian Neesby
|
N/A |
|
[Panel] Incident Response – Clean up on Aisle 9. Bring a Mop! |
Grant Asplund
,
Mark Stanford
,
Tom Tollerton
,
Oscar Minks
,
Allen O'rourke
|
Just about every week we hear about some new breach, attack, scheme, etc. Sadly, it’s ... |
|
Career Development: Becoming a CISO |
Rob Dalzell
|
N/A |
|
Communicating to the Board |
Jack Freund
|
N/A |
|
Maturing a Cybersecurity Program |
Andrew Dutton
|
Whether you are a small organization, single person on a cybersecurity team or inheriting a ... |
|
Are You Ready for the Convergence of IIoT, OT, and IT Security? |
Dr. John Opala
|
N/A |
|