The CCPA is Here: What’s Changed and What You Need to Know

  Presented by OneTrust

While the California Consumer Privacy Act (CCPA) is now law, many key amendments and details about the law only passed just before the law’s effective date – meaning privacy and security pros are still working to build CCPA-compliant programs. In this session, we’ll share all the latest news on the CCPA law, including which amendments passed and how that impacts your privacy program. We’ll share a 5-step plan for CCPA compliance and what to expect in the future for the CCPA.

The Human Element in Threat Detection: Endpoint Threats in 2020 and Beyond

  Presented by Malwarebytes

From ransomware to Mac threats, attacks are up this year. Join Malwarebytes Lab and your peers for an enlightening hour of discussion and interaction.

Pulling from our analysis of millions of attacks on endpoints each year, we’ll recap 2019 threats and outline emerging trends in 2020. Together we’ll cover:

  • Huge shifts from consumer attacks to organizations
  • Growth in mobile threats
  • Top attacks for PC, Mac, and Android
  • Global threats and detections
  • Top industries impacted
  • Rise in ransomware
  • 2020 cybersecurity prediction
  • Blending automation with human elements to keep endpoints operational

Ticket Harvesting: What Is It and Why Do I Care?

  Presented by Varonis

Dive into what exactly ticket harvesting is and how hackers use AD to facilitate an attack. In this presentation, we will look at what they are looking for and why it’s critical to make sure the security is in place to prevent this type of intrusion. With this knowledge. We will also walk through a real-life scenario where a local engineer exploits AD to elevate his access and steal confidential data. We will then take a deeper look into the behaviors that could have warned you that this attack was occurring.

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

How to Assess Your Organization’s Threat Hunting Readiness

  Presented by Corelight

Many organizations want to threat hunt, but don’t know where to begin, how to measure success, or how to scale an effective program. The bar to successful hunting can appear intimidatingly high, reachable by only the most sophisticated, well-staffed SOCs. But the reality is that existing staff–with the right data and some directional guidance–can begin hunting today and start making immediate security contributions to your organization.

Join Corelight for this session to learn about the threat hunting maturity model, obtain guidance on best practices, and see examples of threat hunting scenarios. We’ll also discuss how to assemble the systems, data, people and processes your organization needs to start hunting.

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

Presented by BlackBerry/Cylance & Structured

Take a journey with us, as we expose the mind of the enemy, revealing some of the latest methods that cybercriminals use to infiltrate modern security defenses, and how you can thwart them. You will learn about the ever-changing threat landscape and how you can prevent and respond to today’s most pervasive threats – including ones never seen before. With the best tools, expertise, and powerful AI-based technology, we will uncover the secrets behind today’s modern hacking arsenal and provide you with the means to protect your organization.

Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

The Current Malware Threat Landscape & Enterprise Grade Remediation

Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.