The Rise of the Cyber Attack, How Can We Protect Ourselves?

  Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI

This presentation will highlight the rise in cyber-attacks coming from criminals, nation state actors, insiders, and terrorists. These attacks include ransomware, business email compromise, data theft, and theft of intellectual property. Supervisory Special Agent Schmutz will discuss ways in which these cyber adversaries are getting into our systems including current investigations being worked by the FBI’s Omaha Cyber Task Force. He will finish by providing ideas and resources that companies have used to reduce their vulnerability to these attacks.

Supervisory Special Agent (SSA) Schmutz graduated from Utah State University with a Bachelors and Masters degree in Information Systems. He worked for 13 years in the private sector for IT companies prior to joining the FBI in 2004. SSA Schmutz investigated computer intrusions his whole career which included his time in Seattle, Chicago and the FBI’s Cyber Division in Washington DC where he focused on cyber threats to the critical infrastructure. In August of 2012, he was transferred to the Omaha Field Division where he serves as the supervisor of the FBI’s Cyber Task Force (CTF).

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Hot Topics in ComPriSec

  Presented by INTERFACE Advisory Council

Compliance, Privacy, and Security (ComPriSec) Professionals struggle in their role with competing priorities and responsibilities. This panel of ComPriSec industry experts defines each role, provides management strategies, and explains solutions for common challenges. Any gaps are room for lawsuits, breaches, and leaked data. Here you will learn how to bridge the new normal worlds of ComPriSec.

Moderated by:
Ron Woerner, CISSP, CISM • Technology Professor for the College of Science and Technology, Bellevue University

Panelists:
Rob LaMagna-Reiter, CISSP, CISM, CDPSE, CHP, PCIP, Sec+ • Chief Information Security Officer, FNTS
Lisa McKee, CISA, CDPSE, PCIP, MSSL • Senior Manager Security and Privacy Solutions, Protiviti
Matt Morton, HCISPP, CISM, CISSP, CGEIT • Board Member for NebraskaCERT

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

How to Accelerate to the Cloud with Data Protection

  Presented by Clumio & Structured

Customers have a cloud-first mandate and SaaS is the easy button. Backup-as-a-Service is the easy button for Data Protection. To get to the cloud, you need seamless migration and a solid data protection strategy. In this session, we’ll talk about the challenges with current data protection approaches and why they can’t be used to protect your data in the cloud. You’ll learn how SaaS data protection that is built for the cloud replaces the cost and limitations of existing solutions helps customers overcome those challenges. With one agile, scalable and simple service, you can protect multiple datasources across clouds- on-premises, public cloud and SaaS.

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.