Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

The Anatomy of the SolarWinds Attack

  Presented by CyberArk

In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including several government agencies and high-value companies around the world.

Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

In this session we’ll cover:

  • The rise of the digital supply chain attack
  • An attacker’s perspective on Orion
  • An end-to-end review of the attack flow
  • How the attackers managed to trojanize SolarWinds code
  • What the attackers did during months of seeming inactivity
  • A review of the Golden SAML technique
  • The big picture – what ‘Solorigate’ means for attackers and defenders

The Case for Automation: Why Every Business Needs It

  Presented by Aruba Networks

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Not all AI is Created Equal: Understand the Differences of AI/ML/DL

  Presented by Deep Instinct

Machine learning is a big step forward in combatting cyberattacks but is still no silver bullet. Many traditional cybersecurity solutions available today are causing huge operational challenges as they are not adequately fighting against today’s complex and sophisticated threats. Detection and response-based solutions are no longer sufficient as damage can already be done while waiting for the execution of an attack. Executives and security leaders need to start adopting a preventative approach to cybersecurity, which is made possible through Deep Learning.

Fortunately, AI technologies are advancing, and deep learning is proven to be the most effective cybersecurity solution, resulting in unmatched prevention rates with proven lowest false positive rates. As you evaluate new technologies for your organization, understand the differences and benefits of AI/ML/DL.

Hacking Exposed: A Look Inside Hafnium

  Presented by BlackBerry

In this session, we will discuss the latest updates in the Hafnium/ProxyLogon exploits that target on-premises Microsoft Exchange servers. We will also help you understand the threat and potential impact on your organization. In true Hacking Exposed style, we will give a first-hand look at how the exploit works with Brian Robison, Sr. Director Product Marketing & Chief Evangelist, as he walks through and shows what can be done by attackers to a vulnerable server.

Cybersecurity Beyond the SIEM

  Presented by Secureworks

For forward-looking organizations, SIEM technology promised to identify security blind spots, reduce noise and alert fatigue, and simplify the detection and response to complex attacks. How well has it lived up to the promise? What gaps have emerged as the pandemic accelerated our digital transformation and adoption of cloud services? In this session, we’ll explore these issues and identify new ways to think about cybersecurity, threat detection, telemetry, and the converging technology needed to meet the challenges of the current threat landscape.

Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

The Importance of a Risk-Aware Culture

  Presented by Code42

As companies double down on time to innovation, time to market, time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data. Add the complexities of working from home and off the corporate network; more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.

Join us to discuss the growing insider risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Assessment offering:
Schedule an assessment, and you will receive a complimentary Fortinet branded Basecamp Rapids Wireless Speaker. Once the assessment has been completed, will receive a pair of FortiVans (limit 50). Note that SLED customers may not be eligible for giveaway items.

Completing Security Visibility with NDR

  Presented by Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions and help SOCs complete their security architecture.

In this session, we discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.