[1 CPE] Stopping Ransomware with Autonomous Response

  Presented by Darktrace

Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

[1 CPE] Stopping Zero-Day Ransomware with Autonomous Incident Response

  Presented by Airgap

New strains of ransomware are leaving organizations vulnerable and show no sign of slowing down; security teams are unable to respond proportionately to an attack, leading to cyber disruption across the organization. This can affect all industries including manufacturing, critical infrastructure, healthcare, or any organization like yours and mine.

Join this session to unpack some of 2022’s most advanced ransomware threats and their behavior. Also, you can learn how to fix network flaws from the core for connected OT/IT/IoT, and stop lateral threat movement in every stage of the Cyber Kill Chain. If you have concerns about Zero-Day exploits or are assigned with Zero Trust initiatives, don’t miss this opportunity to learn how you can take autonomous action with 24/7 availability to stop the threat on its track. We’ll discuss:

  • Recent ransomware threat trends, including double extortion and RDP attacks in OT and ICS
  • How Autonomous Response takes DEFCON action to contain an emerging zero-day attack unattended with Zero Trust policy enforcement
  • Real-world examples of ransomware detection through agentless segmentation and containment

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Automated Enforcement Advances: Protecting Against Ransomware

  Presented by Illumio

Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

There are new advancements that allow organizations to protect their key assets from cyberattacks and ransomware in minutes – across multi cloud, containers, hybrid and on-premises environments.

We’ll discuss how these innovations can help you:

  • Immediately enforce security policy across your organization to protect high-value assets.
  • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
  • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
  • Get real-time visibility and insights to create, enforce, and test security policy.
  • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.

[1 CPE] How to Stay Ahead of the Curve in the Ransomware Crisis

  Presented by Blumira

Unfortunately, ransomware is here to stay. Ransomware attacks are becoming more profitable, and ransomware-as-a-service operations continue to lower the barriers of entry for more cybercriminals to launch attacks.

Major attacks like Colonial Pipeline have put ransomware in the spotlight, but it’s not enough to simply be aware of ransomware. Security and IT professionals need to take action and be ahead of the curve to prevent ransomware.

Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:

  • An overview of the current ransomware threat landscape
  • Security tools and methods to have in your arsenal to detect signs of ransomware
  • Suspicious activity to look for in each step of the ransomware kill chain
  • How leaning into IT security fundamentals can prevent ransomware outbreaks

Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Metrics That Matter: Confidence and Resilience in Your Security Program

  Presented by ReliaQuest

CISOs say that what they need most in their security program is the confidence that people, processes, and technology are working and effective, and that controls are in place to ensure resiliency in the case of a major event. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge. In this session, we will discuss:

  • Actionable risk metrics, both for use inside the security function and with outside stakeholders
  • How the language and awareness of information security risk has evolved
  • How the right metrics will benefit the business and win investment for security

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

[1 CPE] Digital Pandemic: Risk Management & Ransomware

  Presented by INTERFACE Advisory Council

In the summer of 2020, as the world isolated from a pandemic, threat actors began targeting schools, hospitals, and critical public agencies with ransomware. In April of 2020, as the world transitioned overnight to telework, our agency became one of their early targets. In this case study, audiences will trace the attack and response, gain an understanding of the impact of a ransomware attack, learn about the recovery process, and explore commonalities that will allow them to apply our “lessons learned” to their own operations.

Speakers:
Clairmonte Cappelle • Executive Director, Puget Sound Educational Service District
Diana Brown • Director of Agency Technology, Puget Sound Educational Service District