Not all AI is Created Equal: Understand the Differences of AI/ML/DL

  Presented by Deep Instinct

Machine learning is a big step forward in combatting cyberattacks but is still no silver bullet. Many traditional cybersecurity solutions available today are causing huge operational challenges as they are not adequately fighting against today’s complex and sophisticated threats. Detection and response-based solutions are no longer sufficient as damage can already be done while waiting for the execution of an attack. Executives and security leaders need to start adopting a preventative approach to cybersecurity, which is made possible through Deep Learning.

Fortunately, AI technologies are advancing, and deep learning is proven to be the most effective cybersecurity solution, resulting in unmatched prevention rates with proven lowest false positive rates. As you evaluate new technologies for your organization, understand the differences and benefits of AI/ML/DL.

Hacking Exposed: A Look Inside Hafnium

  Presented by BlackBerry

In this session, we will discuss the latest updates in the Hafnium/ProxyLogon exploits that target on-premises Microsoft Exchange servers. We will also help you understand the threat and potential impact on your organization. In true Hacking Exposed style, we will give a first-hand look at how the exploit works with Brian Robison, Sr. Director Product Marketing & Chief Evangelist, as he walks through and shows what can be done by attackers to a vulnerable server.

Completing Security Visibility with NDR

  Presented by Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions and help SOCs complete their security architecture.

In this session, we discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara and Converge Technology Solutions

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Don’t Adopt the Monkey: Leadership Secrets for You, Your Team, and Your Projects

  Presented by Saby Waraich • Chief Information Officer, Clackamas Community College

How do you develop an ability to lead from any position in an organization? How can you be more adept in influencing those over whom you have little or no authority? What are the key skills that are needed for a successful leader? Knowing how to influence and lead others, often without direct authority, is critical in successfully managing projects. Most of us aren’t natural leaders. The good news is that leadership skills can be learned. The best makes the journey from manager to leader using their innate talents and through continuous learning and improvement. Don’t rely on the school of hard knocks. Discover the secrets to exceptional leadership and the mistakes to avoid on your own road to success.

Energetic … engaging … lively … enthusiastic … inspiring … words that are often used to describe Saby. A speaker with the uncanny ability to look at the normal and see something quite different, Saby shares his life stories and has a fun way to look at life as well as live life. You are guaranteed to learn a thing or two on your journey from his unique perspective. He is a Technology Leader, Angel Investor, Professor, Mentor, Coach, Project & Program Management Expert, Change Leader and Volunteer Leader with a diverse experience of over 20 years in both public and private sector.

An internationally recognized speaker, trainer and coach, Saby has led multiple diverse clients in their business transformation through project successes, bolstering communications across various departments, and assisted customers in creating effective solutions to complex problems. Saby is currently working as CIO at Clackamas Community College. He speaks four languages, enjoys working with people and brings enthusiasm, inspiration & leadership qualities.

Cybersecurity Beyond the SIEM

  Presented by Secureworks

For forward-looking organizations, SIEM technology promised to identify security blind spots, reduce noise and alert fatigue, and simplify the detection and response to complex attacks. How well has it lived up to the promise? What gaps have emerged as the pandemic accelerated our digital transformation and adoption of cloud services? In this session, we’ll explore these issues and identify new ways to think about cybersecurity, threat detection, telemetry, and the converging technology needed to meet the challenges of the current threat landscape.