Why Protecting Crypto Keys is More Important Than the Data They are Protecting

  Presented by nCipher

In Part 1 Mr. Beutlich talked about the history of cryptography. As Brad discussed, throughout history, the weakest link of every encryption solution (no matter how simple or complex) was exchanging and protecting the cryptographic key. In Part 2 of this series, Brad will discuss in detail why, in the 21st century, the creation and protection of a crypto key is even more important than it’s ever been. Join Brad for another lively presentation on how important it is to protect crypto keys.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Structured & Aruba

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

What You Don’t Understand About Crypto Can Hurt You

  Presented by nCipher

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

An Appeal for Cybersecurity Consolidation

  Presented by Fortinet

Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.

Identity Crisis: The Past, Present, and Future of Authentication

  Presented by Structured

This presentation reviews historical methods of verifying identity and integrity, as well as the current challenges we face around authentication and authorization. We will also examine lessons learned to see what the future might hold when it comes to Identity and Access Management (IAM).

Building a Foundation for Defense in Depth: 10 Security Proficiencies

  Presented by Atmosera

Expectations for information security and data protection are increasing, and so is the complexity. The stakes are higher than ever before due to compliance requirements and potential consequences on a company’s reputation. This presentation is designed to demystify the process of developing a strong security framework by getting started with a Defense in Depth approach based on 10 basic proficiencies.

Join this session and gain key strategies to:

  • Evaluate your current information security profile
  • Implement a comprehensive Defense in Depth security framework with technology and people
  • Develop a roadmap to strengthen your organization’s security and compliance

Presenters:
Sean Ventura • CISO, Atmosera
Byron Anderson • InfoSec Engineer, Atmosera

How’s Your Cyber Hygiene?

  Presented by INTERFACE Advisory Council

Every company has become more dependent upon IT departments to run business operations. When it comes to a company’s Cyber profile, has enough thought been put into protecting the company? What is the process for managing social media accounts? Who has access and passwords? Do you have continuity of messaging and processes?

The hygiene of your Cyber profile has effects on many operations of business. Join us for an interactive conversation about the role IT needs to play in protecting intellectual property and more.

Just Another Day on The Internet: Today’s Threat Landscape

  Presented by Palo Alto Networks

Sometimes, the best offense is a really great defense. This can be especially true in the world of cyber threat hunting and prevention. With all that lurks on the dark side of the internet, it is comforting to know you can improve your defensive posture with actionable intelligence. Join this session to receive a detailed picture of today’s actual threat landscape — brought to you by a seasoned professional with one of the world’s preeminent global threat intelligence teams, Palo Alto Networks’ Unit 42.

I’m From the Feds: We’re Here to Help!

  Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security

You know at some point you will experience a cyber incident, if you haven’t already! The extent of the impact may not always be immediately obvious, however being adequately prepared makes the difference between chaos and responding effectively. This presentation provides an overview of federal cyber security services to assist private and public sector entities in improving their cyber monitoring, controls, incident response, awareness, and overall security posture. There are a number of assessments that will help organizations better understand their risks and inform decisions on prioritizing resources and funding. Whether large or small, all organizations are potential targets, and all employees have an important role in information security. Bad actors, whether criminals or nation states, are using more sophisticated techniques and tactics to infiltrate systems. Organizations must be prepared to react quickly and effectively, no entity is an island or immune from a cyber-attack. The federal government is committed to helping through sharing intel in a timely manner and offering relevant programs that can make a significant difference. Cyber resources and assistance can be expensive, however, there are a variety of federal cyber services available and all are free of charge. Take advantage of them!

Ms. Masse is a Cyber Security Advisor in Region X (Alaska, Idaho, Oregon, Washington) for the US Dept. of Homeland Security. Prior to that, she served as the Chief Information Security Officer (CISO) for the Port of Portland for 5+ years. Theresa was the first CISO for the State of Oregon and served in that capacity for 10 years. Previous to that, she worked in the private sector as the Senior Director for Information & Corporate Security at Cummins Inc., an international Fortune 500 company.

Ms. Masse has a Top-Secret security clearance. She is a former member of the executive committee for the State, Local, Tribal and Territorial Government Coordinating Council and was chair of the Cyber Security subcommittee. Theresa also served on the Cyber Security Advisory Board at Mount Hood Community College. She is a past member of the executive committee of the Multi-State-Information Sharing and Analysis Center (MS-ISAC) and currently serves as a co-chair of the mentoring program. Theresa has a Masters degree with a major in Management.