Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Own Your Data

  Presented by Commvault

Take ownership of data that already belongs to you.

Today organizations are storing their corporate data across multiple locations and platforms. On prem data centers, co-lo facilities, hybrid/multi cloud, SaaS and endpoint devices. With company data being so widely dispersed it’s difficult to know if you have full visibility, access and the flexibility to move data and workloads across locations and platforms. Protecting your data is only one component to maintaining ownership of your data. Along with having a robust data protection platform for on prem data you would also need the same level of control/protection of data assets that live outside the data center.

To truly own your data you must:

  • Protect and secure your data regardless of location or platform
  • Have access to it all
  • Have the tools to move your data/workloads where it makes sense for the business today and the flexibility adjust as business circumstances change.
    (On-Prem, hybrid/multi cloud, SaaS)
  • Have insight into your data, not only to understand the “what and where” but to provide governance and compliance

We will discuss what this all means and why you should rethink your approach to data management.

2020 Aftermath and Beyond: Top Focus Areas on Cybersecurity, Privacy and Business Risk

  Presented by INTERFACE Advisory Council

2020 has been a transformational year. The COVID-19 pandemic certainly has made a big impact and expedited our business-IT efforts in different areas within our organizations. Cybersecurity, privacy, business risk received more attention from leadership. So, what happened and what is next? Join to our highly distinguished panel for an engaging discussion and walk away with valuable insight on top focus areas that every business executive needs to know and be prepared for in this coming year.

Moderated by:

Tolgay Kizilelma PhD. • Chief Information Security Officer, UC Merced

Panelists:

Jack Freund PhD. • Head of Cyber Risk Methodology, VisibleRisk

Jimmy Sanders • Head of Information Security, Netflix

Melissa Bendana • Information Security, Governance and Risk Management, Blue Shield of CA

Rand Morimoto PhD. • CISSP, Convergent Computing

Read more
about our Moderator and Panelists >>

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Seizing the Castle: A Medieval Battle Technique Workshop

  Presented by Chris Roberts • vCISO, Researcher, Hacker – HillBilly Hit Squad

The cybersecurity industry is not at a loss when it comes to cheesy castle analogies or quoting Sun Tzu whenever it gets the chance (keys to the kingdom, crown jewels, the art of war); you name it we’ve butchered it. But what if we took some time to look at the whole medieval warfare a little differently. ARE there actually lessons we CAN learn from all those who’ve gone before? Do we have something to use today that was true on the battlefield of yesteryear?

I’d argue that taking some time to study the techniques used by the Vikings, Mongols, Huns, and so on IS something we want to do. From an adversarial perspective, as well as those charged with defending the enterprise and those most prized digital assets, we CAN learn something from our hairy warmongering ancestors.

Throughout the ages we’ve spent time, effort and plenty of money defending our castles from all manner of intruders, and arguably with each passing year new tactics, weapons and techniques were (and continue to be) employed against our efforts…unfortunately, often to good effect despite our best efforts.

Join me for an unconventional workshop where we’ll chat about new and emerging cyberattacks without actually talking about “cyber” at all. We’ll be making parallels between the Medieval world and our own to learn something, hopefully. Or, at the very least we’ll end up working out how far we can throw a Cisco or Palo Alto firewall with a trebuchet.

Chris is currently serving as a vCISO or advisor for a number of entities and organizations around the globe. His most recent projects are focused within the deception, identity, cryptography, Artificial Intelligence, and services space. Over the years, he’s founded or worked with a number of folks specializing in OSINT/SIGING/HUMINT research, intelligence gathering, cryptography, and deception technologies. These days he’s working on spreading the risk, maturity, collaboration and communication word across the industry. (Likely while coding his EEG driven digital clone that’s monitoring his tea and biscuit consumption!)

Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against various types of attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures while doing his best to avoid getting shot at too often. (Before that, he managed to get various computers confiscated by a number of European entities.)

He’s considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry. He’s also getting a name for himself in the transportation arena, basically anything with wings, wheels, tracks, tyres, fins, props or paddles has been the target for research for the last 10-15 years…to interesting effect.

As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media.

And worst case, to jog the memory, Chris was the researcher who gained global attention in 2015 for demonstrating the linkage between various aviation systems, both on the ground and while in the air that allowed the exploitation of attacks against flight control system.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

Putting AI to Work to Help Fight Cyberattacks

  Presented by Palo Alto

Hackers are increasingly automating their attacks, enabling them to exploit vulnerabilities more quickly. Cybersecurity software vendors are responding by turning to machine learning technology, a subset of artificial intelligence (AI), to try to stay one step ahead of the bad guys. This presentation will talk about how machine learning is used to help identify variations of known threats and patterns in attacks in order to predict the next stages of an attack, then automatically create and implement protections for customers in near real-time.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.