2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Threat Hunting 101

  Presented by CrowdStrike

Threats can come at you anytime and from any number of sources. In this session, Bradley Grandorff, Crowdstrike Systems Engineer, takes us through free form search and how he solved a real world incident that forced a customer to shut down their IT systems. Bradley will go in-depth on threat hunting techniques and help teach you what you need to be aware of. Learn tips from an expert with several decades of experience in information security working for companies such as Cisco, Splunk, and now Crowdstrike.

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Talent by Design: The Cybersecurity Workforce Lifecycle and Challenge

  Presented by Cloud Security Alliance North Texas Chapter

Cloud security and the evolving cybersecurity technologies require different skill sets than 15 years ago. Many companies and leaders talk about the talent shortage, skills gap, and necessity for the right kind of training for the right kind of talent.

People who are earning cross-certifications that combine skills – such as the Certified Cloud Security Professional (CCSP) co-created by (ISC)² and Cloud Security Alliance – are seeing a big boost in pay. If you have those skills, you’re in a good position to command those higher salaries.

But what steps can we as the industry take to bring our community closer together to build the foundation early and have a starting point for new entrants – whether just out of college, coming out of a specialized program, out of the military, etc.

During this session, dynamic experts will share ideas on how we can leverage all the education, mentorship programs, and training and leadership skills-based workshops available to better contribute to the workforce in an evolving cybersecurity landscape.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

A Regional Approach to Public Safety Infrastructure

  Presented by Bill Zielinski • Chief Information Officer, City of Dallas

Developing regional partnerships which leverage shared interests and common mission can create opportunities for significant cost savings, heightened capabilities and improved interoperability that can benefit the entire region. Join Bill Zielinski, CIO for the City of Dallas, as he discusses the model used in developing a regional Public Safety digital mobile radio network covering more than 1000 square miles across the greater Dallas area.

Bill Zielinski is the Chief Information Officer (CIO) for the City of Dallas, Texas where he directs IT operations for the 9th largest city in the United States, serving a population of more than 1.3 million people.

Most recently, Mr. Zielinski was the Assistant Commissioner for the Office of Information Technology Category (ITC) in GSA’s Federal Acquisition Service (FAS) where he managed a portfolio of government-wide IT acquisition contracts providing more than $25 billion in IT products and services from more than 5,000 providers to government at a Federal, State and Local level.

Mr. Zielinski formerly served as the Acting Unit Chief for Agency Oversight in the Office of the Federal Chief Information Officer (OCIO) in the Office of Management and Budget (OMB). There he provided oversight of the Federal Government’s Information Technology Capital Planning and Investment Control (CPIC) process on behalf of the Federal CIO. The Federal CIO is responsible for providing guidance on the formulation and oversight of an annual IT investment portfolio in excess of $85 billion.

Additionally, he has served as the Chief Information Officer for the Social Security Administration (SSA), where he was responsible for the delivery of IT solutions that allowed the Agency to effectively manage more than $800 billion in annual benefits to more than 60 million people around the world.

You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • HillBilly Hit Squad

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.